이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Configure mute rules to streamline security alerts by automatically filtering out non-urgent findings. This approach helps reduce noise from known false positives and accepted risks, allowing you to focus on addressing the most critical threats.
Create a mute rule
- On the Automation Pipelines page, click Add a New Rule and select Mute.
- Enter a descriptive name for the rule, for example, Compensating control in place for account payment-prod.
- Use the following boxes to configure the rule criteria:
- Any of these types: The types of findings that the rule should check for. Available types include:
- Misconfiguration
- Attack Path
- Identity Risk
- API Security Finding
- Application Code Vulnerability
- Application Library Vulnerability
- Container Image Vulnerability
- API Security Finding
- Host Vulnerability
- Any of these tags or attributes: The resource tags or attributes that must match for the rule to apply.
- To add severity criteria to the rule, click Add Severity.
- Specify the mute reason and duration:
- Reason for muting: The reason for muting the finding. Available reasons include:
- False Positive
- Risk Accepted
- Pending fix
- No Fix
- Duplicate
- Other
- Rule expiration: The date on which the rule expires.
- Further description for muting reason: Optional box for additional details.
- Click Save. The rule applies to new findings immediately and starts checking existing findings within the next hour.
Rule matching order
When Datadog identifies a finding, it evaluates the finding against your sequence of mute rules. Starting with the first rule, if there’s a match, Datadog mutes the finding for the specified duration and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.
Further reading