You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/alerts-suppression-rules.md
+65-13Lines changed: 65 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,19 +12,18 @@ ms.topic: conceptual
12
12
13
13
# Suppressing alerts from Azure Security Center's threat protection
14
14
15
+
## Introduction to suppression rules (preview)
16
+
15
17
The threat protection components of Azure Security Center detect threats in any area of your environment and generate security alerts.
16
18
17
-
When a single alert isn't interesting or relevant, you can dismiss it. Alternatively, use the suppression rules (preview) feature to automatically dismiss such alerts in the future. Typically, you'd use a suppression rule for:
19
+
When a single alert isn't interesting or relevant, you can manually dismiss it. Alternatively, use the suppression rules (preview) feature to automatically dismiss similar alerts in the future. Typically, you'd use a suppression rule to:
18
20
19
-
- alerts that you know are false positives
21
+
-suppress alerts that you've identified as false positives
20
22
21
23
- alerts that are being triggered too often to be useful
22
24
23
25
Your suppression rules define the criteria for which alerts should be automatically dismissed.
24
26
25
-
> [!TIP]
26
-
> Alerts that match your enabled suppression rules will still be generated, but their state will be set to **dismissed**. You can see the state in the Azure portal or however you access your Security Center security alerts.
27
-
28
27
[](media/alerts-suppression-rules/alerts-screen-with-options.png#lightbox)
29
28
30
29
## Creating a suppression rule
@@ -41,35 +40,79 @@ To create a rule directly in the Azure portal:
41
40
42
41
1. From Security Center's security alerts page:
43
42
44
-
- Locate the specific alert you don't want to see any more, and from the ellipsis menu (...) for the alert, select **Auto-dismiss in the future**:
43
+
- Locate the specific alert you don't want to see anymore, and from the ellipsis menu (...) for the alert, select **Create suppression rule**:
45
44
46
-
[](media/alerts-suppression-rules/auto-dismiss-in-future-option.png#lightbox)
- Or, select the **suppression rules** link at the top of the page, and from the suppression rules page select **Create new suppression rule**:
49
48
50
49
[](media/alerts-suppression-rules/create-new-suppression-rule.png#lightbox)
51
50
52
51
1. In the new suppression rule pane, enter the details of your new rule.
53
52
53
+
- Your rule can dismiss the alert on **all resources** so you don't get any alerts like this one in the future.
54
+
55
+
- Your rule can dismiss the alert **on specific criteria** - when it relates to a specific IP address, process name, user account, Azure resource, or location.
56
+
54
57
> [!TIP]
55
-
> If you opened the new rule page from a specific alert, the alert type and subscription will be automatically configured in your new rule. If you used the **Create new suppression rule** link, the selected subscriptions will match the current filter in the portal.
58
+
> If you opened the new rule page from a specific alert, the alert and subscription will be automatically configured in your new rule. If you used the **Create new suppression rule** link, the selected subscriptions will match the current filter in the portal.
-**Name** - A name for the rule. Rule names must begin with a letter or a number, be between 2 and 50 characters, and contain no symbols other than dashes (-) or underscores (_).
65
+
-**State** - Enabled or disabled.
66
+
-**Reason** - Select one of the built-in reasons or 'other' if they don't meet your needs.
67
+
-**Expiration date** - An end date and time for the rule. Rules can run for up to six months.
68
+
69
+
1. Optionally, test the rule using the **Simulate** button to see how many alerts would have been dismissed if this rule had been active.
70
+
71
+
1. Save the rule.
59
72
60
-
- Your rule can dismiss **all instances** of an alert types.
61
-
- Your rule can dismiss **some instances** of an alert types based on one or more defined entity options. You can dismiss an alert if it relates to a specific IP address, process name, user account, Azure resource, or location.
73
+
## Editing suppression rules
62
74
63
-
1. Optionally, test the rule using the **Simulate** button to see how many alerts that have already been triggered would have been dismissed if this rule had been active.
75
+
To edit the rules you've created, use the suppression rules page.
64
76
65
-
1.Save your alert.
77
+
1.From Security Center's security alerts page, select the **suppression rules** link at the top of the page.
66
78
67
-
## Editing suppression rules
79
+
1. The suppression rules page opens listing all available rules according to the subscriptions currently selected.
1. To edit a single rule, open the ellipsis menu (...) for the rule and select **Edit**.
84
+
85
+
1. Make the necessary changes and select **Apply**.
68
86
69
87
## Deleting suppression rules
70
88
89
+
To delete one or more rules you've created, use the suppression rules page.
90
+
91
+
1. From Security Center's security alerts page, select the **suppression rules** link at the top of the page.
92
+
93
+
1. The suppression rules page opens listing all available rules according to the subscriptions currently selected.
94
+
95
+
1. To delete a single rule, open the ellipsis menu (...) for the rule and select **Delete**.
96
+
97
+
1. To delete multiple rules, select the check boxes for the rules to be deleted and select **Delete**.
98
+
99
+
[](media/alerts-suppression-rules/deleting-multiple-alerts.png#lightbox)
100
+
101
+
71
102
## Viewing alerts that have been suppressed
72
103
104
+
Alerts that match your enabled suppression rules will still be generated, but their state will be set to **dismissed**. You can see the state in the Azure portal or however you access your Security Center security alerts.
105
+
106
+
> [!TIP]
107
+
> [Azure Sentinel](https://azure.microsoft.com/services/azure-sentinel/) won't create incidents for suppressed alerts. For other SIEMs, you can filter suppressed alerts by using the alerts' state ('dismissed').
108
+
109
+
Use Security Center's filter to view alerts that have been dismissed by your rules.
110
+
111
+
* From Security Center's security alerts page, open the filter options and select **Dismissed**.
## Using the REST API to create and manage suppression rules
74
117
75
118
You can create, view, or delete alert suppression rules via Security Center's REST API.
@@ -90,3 +133,12 @@ The relevant HTTP methods for suppression rules in the REST API are:
90
133
91
134
For full details and usage examples, see the [API documentation](https://docs.microsoft.com/api/securitycenter/).
92
135
136
+
137
+
## Next steps
138
+
139
+
This article described the suppression rules in Azure Security Center that automatically dismiss unwanted alerts.
140
+
141
+
For more information on security alerts in Azure Security Center, see the following pages:
142
+
143
+
-[Security alerts and the intent kill chain](alerts-reference.md) - A reference guide for the security alerts you might see in Azure Security Center's Threat Protection module.
144
+
-[Threat protection in Azure Security Center](threat-protection.md) - A description of the many aspects of your environment monitored by Azure Security Center's Threat Protection module.
0 commit comments