Exception Rules
Exception rules suppress specific alert conditions without disabling the entire detection. They’re essential for managing false positives while maintaining detection coverage.Why Exception Rules?
Instead of:- ❌ Disabling a rule entirely (losing detection coverage)
- ❌ Modifying the rule (affects all environments)
- ✅ Suppress specific known-good activity
- ✅ Keep the rule active for other matches
- ✅ Document tuning decisions
Creating Exceptions
From an Alert
The easiest way to create an exception:- Open a false positive alert
- Click Create Exception
- Select fields from the matched log
- Configure operators and values
- Save the exception
From the Rule Editor
- Open the rule
- Click Exceptions tab
- Click Add Exception
- Define the exception conditions
Exception Logic
Simple Exceptions
A single condition:source.ip equals 10.0.0.1.
AND Logic (Same Group)
Multiple conditions with the samegroup_id are ANDed:
OR Logic (Different Groups)
Different groups are ORed:Operators
| Operator | Description | Example |
|---|---|---|
equals | Exact match | user.name equals admin |
not_equals | Does not match | user.name not_equals SYSTEM |
contains | Substring match | process.command contains temp |
not_contains | Substring not present | path not_contains malware |
starts_with | Prefix match | file.path starts_with C:\Windows |
ends_with | Suffix match | file.name ends_with .exe |
regex | Regular expression | user.name regex ^svc_.* |
in_list | Match any value | source.ip in_list [10.0.0.1, 10.0.0.2] |
Examples
Suppress Specific User on Specific Host
Suppress Known Service Accounts
Suppress Traffic to Approved Destinations
Managing Exceptions
View All Exceptions
- Open the rule
- Click Exceptions tab
- See all active exceptions
Edit an Exception
- Click the exception
- Modify conditions
- Save changes
Disable an Exception
Temporarily disable without deleting:- Click the exception
- Toggle Enabled off
- Exception is saved but inactive
Delete an Exception
- Click the exception
- Click Delete
- Confirm deletion
Exception Scope
Exceptions are rule-specific. Each rule has its own exceptions. For cross-rule tuning, consider:- Creating a base rule with filters
- Using field mappings to normalize data
- Documenting tuning patterns for consistency
Best Practices
Be specific
Be specific
Narrow exceptions reduce risk of suppressing real threats. Use multiple conditions.
Document the reason
Document the reason
Add a description explaining why this exception exists.
Review regularly
Review regularly
Exceptions may become stale. Review quarterly for relevance.
Use regex carefully
Use regex carefully
Regex is powerful but can accidentally match too much. Test thoroughly.
Prefer equals over contains
Prefer equals over contains
Exact matches are more precise and less likely to over-suppress.
Audit Trail
All exception changes are logged in the audit trail:- Who created/modified the exception
- When the change was made
- What conditions were added/removed
Troubleshooting
Exception not suppressing alerts
- Check exception is enabled
- Verify field names match exactly (case-sensitive)
- Check operator logic (AND vs OR)
- Test with the specific alert values
Too much suppressed
- Review exception conditions
- Narrow with additional AND conditions
- Check regex patterns for over-matching
Exception field not available
- Ensure the field exists in the log schema
- Check field mapping configuration
- Use the exact field name from the matched log