@Jennifer_Dungan The documentation is a bit inconsistent. According to the visual provided on the page, it shows IP obfuscation happening before the processing rules.
Yet in the description on the page, it says: "If your organization has opted to obfuscate IP addresses in raw data, it is done after ...