Suppress specific detections or fields in Splunk Enterprise Security
Suppress specific detections or fields in detections
Suppress specific detections or fields in a detection for a period of time to prevent undesired findings from being added to a specific investigation.
Follow these steps to suppress a detection or specific fields in a detection:
- In Splunk Enterprise Security, go to the Analyst queue.
- Select the investigation for which you want to suppress the detection.
- Go to the drop-down menu and select Suppress detection.
Suppressing detections only prevents future findings with those specific fields from being added to the investigation.
- In the Suppress detection dialog box, add the suppression rule. For example, Suppression for user access from unknown location.
- Specify the time for which you want the suppress the fields in the detection. For example, 1 day, 1 week, custom.
- In the Advanced section of the Suppress detection dialog box. add a description of the suppression rule.
- Select the fields that you want to remove from the detection SPL. For example, event_hash, rule_name.
- Select Change fields if you want to change the fields that you want to remove from the detection.
- Go to the Search preview window to review the SPL search for the detection with the suppressed fields.
- Select Save.
Suppress and modify specific fields within finding-based detections
Use throttling to suppress specific fields in finding-based detections to avoid creating the same finding groups and flooding the notable index. If you do not suppress specific fields, finding groups might move to the top of the Analyst Queue even when no new findings or intermediate findings are added to the finding group. You can view, delete, add, or modify the pre-populated suppressed fields in the finding-based detection editor.
Follow these steps to suppress and modify specific fields within finding-based detections:
- In Splunk Enterprise Security, select Configure.
- Select Content, and then select Content management.
- Select the title of the finding-based detection that you want to edit and open it in the detection editor.
- In the Edit finding-based detection, go to the section on Throttling.
- In the Fields to group by add or remove the specific fields that you want to use when matching similar events. If an event matches all the fields listed here, the detection does not create a new alert. You can define multiple fields. Available fields depend on the search fields that the detection returns.
- Save the detection.
If you specify a field name in the '''Fields to group by''' that doesn't exist in the search results, Splunk Enterprise Security throttles all the results because the field is identical and null for all the results.
Create multiple versions of a detection in Splunk Enterprise Security | Monitor your security operations center with findings in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.1.0
Feedback submitted, thanks!