Skip to content

Commit d918757

Browse files
committed
Removed suppression alerts (FOR NOW)
1 parent 3e0d188 commit d918757

File tree

1 file changed

+0
-15
lines changed

1 file changed

+0
-15
lines changed

articles/security-center/release-notes.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -41,21 +41,6 @@ This update brings the following changes to this feature:
4141
[Learn more about the JIT access feature](security-center-just-in-time.md).
4242

4343

44-
### Alert suppression rules (preview)
45-
46-
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.
47-
48-
Alerts that match your enabled suppression rules will still be generated, but their state will be set to dismissed. You can see the state in the Azure portal or however you access your Security Center security alerts.
49-
50-
Suppression rules define the criteria for which alerts should be automatically dismissed. Typically, you'd use a suppression rule to:
51-
52-
- suppress alerts that you've identified as false positives
53-
54-
- suppress alerts that are being triggered too often to be useful
55-
56-
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
57-
58-
5944
### Custom recommendations have been moved to a separate security control
6045

6146
One of the security controls introduced with the enhanced secure score was "Implement security best practices". Any custom recommendations created for your subscriptions were automatically placed in that control.

0 commit comments

Comments
 (0)