Connect an AI Application
Navigate to the Applications tab and click New Application to add your AI application or LLM model.- Application Details
- Evaluation
- Monitoring
- Guardrails
Application Name– e.g., MyUniqueAppDescription (optional)– Adds clarity: “Streamlines project management by integrating task tracking, team collaboration, and progress reporting.”Encrypt Output- When enabled, Trusys automatically encrypts any PII (Personally Identifiable Information) detected in AI responses. This prevents exposure of sensitive user data and helps ensure compliance with privacy and data protection regulations.Recommended for applications handling user-generated content, customer data, or regulated information.
Application List Overview
The Application List offers a centralized view of all AI applications and LLM models linked to your project. This list allows you to quickly access key information, including:- Functional Evaluations – Count of performance tests
- Security Evaluations – Count of security audits
- Production Monitoring – Indicates whether the app is currently monitored live
Application Details
Clicking on a specific application within the Application List will take you to the Application Details page, offering an in-depth view of its configuration, evaluation results, and monitoring settings.View Functional and Security Evaluation Details
Access a comprehensive list of the functional and security evaluations performed on your application. This includes insights from TRU EVAL (functional performance, accuracy, etc.) and TRU SCOUT (security vulnerabilities, compliance adherence). Click on each test evaluation list to view the report and details of each test run.Connection Details for Evaluation and Monitoring
This section displays all the parameters and credentials used to connect your AI application or LLM model to Trusys for both evaluation and continuous monitoring.View Monitoring Settings
This part of the Application Details page outlines the specific configurations for live monitoring of your production application. It includes details such as:Sampling RatesFrequency of data collection.Monitored MetricsPII Leak, hallucination, and specific AI performance indicators.Monitored Security CategoriesHate speech, data leakage, adversarial attacks.