Skip to content

Commit 991a0ec

Browse files
authored
Merge pull request #223348 from bmansheim/fresh-alerts-suppression
Refresh the alerts suppression page
2 parents fea5a65 + efef95f commit 991a0ec

File tree

3 files changed

+37
-60
lines changed

3 files changed

+37
-60
lines changed
Lines changed: 37 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Using alerts suppression rules to suppress false positives or other unwanted security alerts in Microsoft Defender for Cloud
3-
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts
4-
ms.date: 11/09/2021
2+
title: Suppressing false positives or other unwanted security alerts - Microsoft Defender for Cloud
3+
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts, such as false positives
4+
ms.date: 01/09/2023
55
ms.topic: how-to
66
ms.author: benmansheim
77
author: bmansheim
@@ -15,113 +15,90 @@ This page explains how you can use alerts suppression rules to suppress false po
1515
|Aspect|Details|
1616
|----|:----|
1717
|Release state:|General availability (GA)|
18-
|Pricing:|Free<br>(Most security alerts are only available with [enhanced security features](enable-enhanced-security.md))|
18+
|Pricing:|Free<br>(Security alerts are generated by [Defender plans](enable-enhanced-security.md))|
1919
|Required roles and permissions:|**Security admin** and **Owner** can create/delete rules.<br>**Security reader** and **Reader** can view rules.|
2020
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
2121

22-
23-
2422
## What are suppression rules?
2523

26-
The various Microsoft Defender plans detect threats in any area of your environment and generate security alerts.
24+
The Microsoft Defender plans detect threats in your environment and generate security alerts. When a single alert isn't interesting or relevant, you can manually dismiss it. Suppression rules let you automatically dismiss similar alerts in the future.
2725

28-
When a single alert isn't interesting or relevant, you can manually dismiss it. Alternatively, use the suppression rules feature to automatically dismiss similar alerts in the future. Typically, you'd use a suppression rule to:
26+
Just like when you identify an email as spam, you want to review your suppressed alerts periodically to make sure you're not missing any real threats.
2927

30-
- Suppress alerts that you've identified as false positives
28+
Some examples of how to use suppression rule are:
3129

30+
- Suppress alerts that you've identified as false positives
3231
- Suppress alerts that are being triggered too often to be useful
3332

34-
Your suppression rules define the criteria for which alerts should be automatically dismissed.
35-
36-
> [!CAUTION]
37-
> Suppressing security alerts reduces the effectiveness of Defender for Cloud's threat protection. You should carefully check the potential impact of any suppression rule, and monitor it over time.
38-
3933
:::image type="content" source="./media/alerts-suppression-rules/create-suppression-rule.gif" alt-text="Create alert suppression rule.":::
4034

4135
## Create a suppression rule
4236

43-
There are a few ways you can create rules to suppress unwanted security alerts:
44-
45-
- To suppress alerts at the management group level, use Azure Policy
46-
- To suppress alerts at the subscription level, you can use the Azure portal or the REST API as explained below
47-
48-
> [!NOTE]
49-
> Suppression rules don't work retroactively - they'll only suppress alerts triggered _after_ the rule is created. Also, if a specific alert type has never been generated on a specific subscription, future alerts of that type won't be suppressed. For a rule to suppress an alert on a specific subscription, that alert type has to have been triggered at least once before the rule is created.
50-
51-
To create a rule directly in the Azure portal:
52-
53-
1. From Defender for Cloud's security alerts page:
37+
You can apply suppression rules to management groups or to subscriptions.
5438

55-
- Select the specific alert you don't want to see anymore, and from the details pane, select **Take action**.
39+
- To suppress alerts for a management group, use [Azure Policy](/azure/governance/policy/overview).
40+
- To suppress alerts for subscriptions, use the Azure portal or the [REST API](#create-and-manage-suppression-rules-with-the-api).
5641

57-
- Or, select the **suppression rules** link at the top of the page, and from the suppression rules page select **Create new suppression rule**:
42+
Alert types that were never triggered on a subscription or management group before the rule was created won't be suppressed.
5843

59-
![Create new suppression rule** button.](media/alerts-suppression-rules/create-new-suppression-rule.png)
44+
To create a rule for a specific alert in the Azure portal:
6045

61-
1. In the new suppression rule pane, enter the details of your new rule.
62-
- Your rule can dismiss the alert on **all resources** so you don't get any alerts like this one in the future.
63-
- Your rule can dismiss the alert **on specific criteria** - when it relates to a specific IP address, process name, user account, Azure resource, or location.
46+
1. From Defender for Cloud's security alerts page, select the alert you want to suppress.
47+
1. From the details pane, select **Take action**.
48+
1. In the **Suppress similar alerts** section of the Take action tab, select **Create suppression rule**.
49+
1. In the **New suppression rule** pane, enter the details of your new rule.
6450

65-
> [!TIP]
66-
> If you opened the new rule page from a specific alert, the alert and subscription will be automatically configured in your new rule. If you used the **Create new suppression rule** link, the selected subscriptions will match the current filter in the portal.
67-
68-
[![Suppression rule creation pane.](media/alerts-suppression-rules/new-suppression-rule-pane.png)](media/alerts-suppression-rules/new-suppression-rule-pane.png#lightbox)
69-
1. Enter details of the rule:
51+
- **Entities** - The resources that the rule applies to. You can specify a single resource, multiple resources, or resources that contain a partial resource ID. If you don't specify any resources, the rule applies to all resources in the subscription.
7052
- **Name** - A name for the rule. Rule names must begin with a letter or a number, be between 2 and 50 characters, and contain no symbols other than dashes (-) or underscores (_).
7153
- **State** - Enabled or disabled.
72-
- **Reason** - Select one of the built-in reasons or 'other' if they don't meet your needs.
54+
- **Reason** - Select one of the built-in reasons or 'other' to specify your own reason in the comment.
7355
- **Expiration date** - An end date and time for the rule. Rules can run for up to six months.
74-
1. Optionally, test the rule using the **Simulate** button to see how many alerts would have been dismissed if this rule had been active.
75-
1. Save the rule.
7656

57+
1. You select **Simulate** to see the number of previously received alerts that would have been dismissed if the rule was active.
58+
1. Save the rule.
59+
60+
You can also select the **Suppression rules** button in the Security Alerts page and select **Create suppression rule** to enter the details of your new rule.
61+
62+
:::image type="content" source="media/alerts-suppression-rules/create-new-suppression-rule.png" alt-text="Screenshot of the Create suppression rule button in the Suppression rules page.":::
7763

7864
## Edit a suppression rule
7965

80-
To edit a rule you've created, use the suppression rules page.
66+
To edit a rule you've created from the suppression rules page:
8167

82-
1. From Defender for Cloud's security alerts page, select the **suppression rules** link at the top of the page.
83-
1. The suppression rules page opens with all the rules for the selected subscriptions.
68+
1. From Defender for Cloud's security alerts page, select **Suppression rules** at the top of the page.
8469

85-
[![Suppression rules list.](media/alerts-suppression-rules/suppression-rules-page.png)](media/alerts-suppression-rules/suppression-rules-page.png#lightbox)
70+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-button.png" alt-text="Screenshot of the suppression rule button in the Security Alerts page.":::
8671

87-
1. To edit a single rule, open the ellipsis menu (...) for the rule and select **Edit**.
88-
1. Make the necessary changes and select **Apply**.
72+
1. The suppression rules page opens with all the rules for the selected subscriptions.
8973

90-
## Delete a suppression rule
74+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-page.png" alt-text="Screenshot of the Suppression rules page where you can review the suppression rules and create new ones." lightbox="media/alerts-suppression-rules/suppression-rules-page.png":::
9175

92-
To delete one or more rules you've created, use the suppression rules page.
76+
1. To edit a single rule, open the three dots (...) at the end of the rule and select **Edit**.
77+
1. Change the details of the rule and select **Apply**.
9378

94-
1. From Defender for Cloud's security alerts page, select the **suppression rules** link at the top of the page.
95-
1. The suppression rules page opens with all the rules for the selected subscriptions.
96-
1. To delete a single rule, open the ellipsis menu (...) for the rule and select **Delete**.
97-
1. To delete multiple rules, select the check boxes for the rules to be deleted and select **Delete**.
98-
![Deleting one or more suppression rules.](media/alerts-suppression-rules/delete-multiple-alerts.png)
79+
To delete a rule, use the same three dots menu and select **Remove**.
9980

10081
## Create and manage suppression rules with the API
10182

102-
You can create, view, or delete alert suppression rules via Defender for Cloud's REST API.
83+
You can create, view, or delete alert suppression rules using the Defender for Cloud REST API.
10384

10485
The relevant HTTP methods for suppression rules in the REST API are:
10586

10687
- **PUT**: To create or update a suppression rule in a specified subscription.
107-
10888
- **GET**:
10989

11090
- To list all rules configured for a specified subscription. This method returns an array of the applicable rules.
111-
11291
- To get the details of a specific rule on a specified subscription. This method returns one suppression rule.
113-
11492
- To simulate the impact of a suppression rule still in the design phase. This call identifies which of your existing alerts would have been dismissed if the rule had been active.
11593

11694
- **DELETE**: Deletes an existing rule (but doesn't change the status of alerts already dismissed by it).
11795

118-
For full details and usage examples, see the [API documentation](/rest/api/defenderforcloud/).
119-
96+
For details and usage examples, see the [API documentation](/rest/api/defenderforcloud/).
12097

12198
## Next steps
12299

123100
This article described the suppression rules in Microsoft Defender for Cloud that automatically dismiss unwanted alerts.
124101

125-
For more information on security alerts, see the following pages:
102+
Learn more about security alerts:
126103

127-
- [Security alerts and the intent kill chain](alerts-reference.md) - A reference guide to the security alerts you might get from Defender for Cloud.
104+
- [Security alerts generated by Defender for Cloud](alerts-reference.md)
10.2 KB
Loading
16.5 KB
Loading

0 commit comments

Comments
 (0)