このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
次で利用可能:
Cloud SIEM
|
CSM Threats
Overview
Suppressions are specific conditions for when a signal should not be generated, which can improve the accuracy and relevance of the signals that are generated.
Suppression routes
You can set up a suppression query within an individual detection rule, or define a separate suppression rule to suppress signals across one or more detection rules.
Detection rules
When you create or modify a detection rule, you can define a suppression query to prevent a signal from getting generated. For example, add a rule query to determine when a detection rule triggers a security signal. You can also customize the suppression query to suppress signals for a specific attribute value.
Suppression rules
Use suppression rules to set general suppression conditions across multiple detection rules instead of setting up suppression conditions for each individual detection rule. For example, you can set up a suppression rule to suppress any signal that contains a specific IP.
Suppressions configuration
Suppression list
The suppression list provides a centralized and organized way for you to manage suppressions across multiple detection rules.
Create a suppression rule
- Navigate to the Suppressions page.
- Click + New Suppression.
- Enter a name for the suppression query.
- Add a description to provide context on why this suppression is being applied.
- Optionally, add an expiration date on which this suppression will be deactivated.
- Select the detection rules you want to apply this suppression to. You can select multiple detection rules.
- In the Add Suppression Query section, you have the option to enter suppression queries so that a signal is not generated when the values are met. For example, if a user
john.doe
is triggering a signal, but their actions are benign and you no longer want signals triggered from this user, input the log query: @user.username:john.doe
.Suppression rule queries are based on signal attributes. - Additionally, you can add a log exclusion query to exclude logs from being analyzed. These queries are based on log attributes. Note: The legacy suppression was based on log exclusion queries, but it is now included in the suppression rule’s Add a suppression query step.
Restrict edit permissions
By default, all users have view and edit access to suppressions. To use granular access controls to limit the roles that may edit a suppression rule:
- Click the vertical three-dot menu for the rule and select Permissions.
- Click Restrict Access. The dialog box updates to show that members of your organization have Viewer access by default. Use that dropdown menu to select one or more roles, teams, or users that may edit the suppression rule.
- Click Add.
- Click Save.
Note: To maintain your edit access to the rule, Datadog requires you to include at least one role that you are a member of before saving.
To restore access to a rule:
- Click the vertical three-dot menu for the rule and select Permissions.
- Click Restore Full Access.
- Click Save.
Further reading