이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.
Join the Preview!

Vulnerability Pipeline is in Preview. To enroll in the Preview for mute rules, click Request Access.

Request Access

Configure mute rules to streamline security alerts by automatically filtering out non-urgent findings. This approach helps reduce noise from known false positives and accepted risks, allowing you to focus on addressing the most critical threats.

Create a mute rule

  1. On the Vulnerability Pipeline page, click Add a New Rule and select Mute.
  2. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
  3. Use the following boxes to configure the rule criteria:
    • Any of these types: The types of findings that the rule should check for. Available types include Misconfiguration, Attack Path, Identity Risk, and API Security Finding.
    • Any of these tags or attributes: The resource tags or attributes that must match for the rule to apply.
  4. To add severity criteria to the rule, click Add Severity.
  5. Specify the mute reason and duration:
    • Reason for muting: The reason for muting the finding. Available reasons include Duplicate, External solution, Pending fix, False positive, Internal solution, No fix available, Accepted risk, and Other.
    • Rule expiration: The date on which the rule expires.
    • Further description for muting reason: Optional box for additional details.
  6. Click Save.

Rule matching order

When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of mute rules. Starting with the first rule, if there’s a match, Datadog mutes the vulnerability for the specified duration and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.