Skip to content

Commit b53db63

Browse files
[Security][9.2 & Serverless]: New advanced setting that controls suppression window behavior (#2735)
NOTE TO SELF (09/10/25): Sync with @denar50 about feature flag when I'm back. Contributes to #2526 by documenting the new `securitySolution:suppressionBehaviorOnAlertClosure` advanced setting. [(preview)](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2735/solutions/security/get-started/configure-advanced-settings#suppression-window-behavior) Also made the following changes: - Moved pre-reqs for using alert suppression to the section that has instructions for using it. This placement seems more appropriate. Also made light revisions to wordy steps. ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2735/solutions/security/detect-and-alert/suppress-detection-alerts#security-alert-suppression-configure-alert-suppression)) - Moved that giant note about suppressing fields with multiple values to a dedicated section with the goal of streamlining the instructions for configuring suppression. [(preview)](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2735/solutions/security/detect-and-alert/suppress-detection-alerts#security-alert-suppression-fields-with-multiple-values) - Added a new section that explained the impact of closing alerts that were generated by alert suppression. [(preview)](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2735/solutions/security/detect-and-alert/suppress-detection-alerts#security-alert-suppression-impact-close-alerts) - Resized a few images that looked disproportionately large. **NOTE:** Made the same content improvements to the 8.x suppression docs in elastic/security-docs#7083 --------- Co-authored-by: Mike Birnstiehl <[email protected]>
1 parent 383d9c4 commit b53db63

File tree

5 files changed

+58
-39
lines changed

5 files changed

+58
-39
lines changed
44.1 KB
Loading
-4.48 KB
Loading
-1.68 KB
Loading

solutions/security/detect-and-alert/suppress-detection-alerts.md

Lines changed: 51 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -13,70 +13,56 @@ products:
1313

1414
# Suppress detection alerts [security-alert-suppression]
1515

16+
Alert suppression allows you to reduce the number of repeated or duplicate detection alerts created by [detection rules](/solutions/security/detect-and-alert/about-detection-rules.md). Normally, when a rule meets its criteria repeatedly, it creates multiple alerts, one for each time the rule’s criteria are met. When alert suppression is configured, alerts for duplicate events are not created. Instead, the qualifying events are grouped, and only one alert is created for each group.
1617

17-
::::{admonition} Requirements and notices
18-
* In {{stack}} alert suppression requires a [Platinum or higher subscription](https://www.elastic.co/pricing) or the appropriate [{{serverless-short}} project feature tier](../../../deploy-manage/deploy/elastic-cloud/project-settings.md).
19-
* {{ml-cap}} rules have [additional requirements](/solutions/security/advanced-entity-analytics/machine-learning-job-rule-requirements.md) for alert suppression.
20-
* This functionality is in technical preview for event correlation rules only and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features.
21-
22-
::::
23-
24-
Alert suppression allows you to reduce the number of repeated or duplicate detection alerts created by these detection rule types:
25-
26-
* [Custom query](/solutions/security/detect-and-alert/create-detection-rule.md#create-custom-rule)
27-
* [Threshold](/solutions/security/detect-and-alert/create-detection-rule.md#create-threshold-rule)
28-
* [Indicator match](/solutions/security/detect-and-alert/create-detection-rule.md#create-indicator-rule)
29-
* [Event correlation](/solutions/security/detect-and-alert/create-detection-rule.md#create-eql-rule)
30-
* [New terms](/solutions/security/detect-and-alert/create-detection-rule.md#create-new-terms-rule)
31-
* [{{esql}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-esql-rule)
32-
* [{{ml-cap}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-ml-rule)
33-
34-
Normally, when a rule meets its criteria repeatedly, it creates multiple alerts, one for each time the rule’s criteria are met. When alert suppression is configured, duplicate qualifying events are grouped, and only one alert is created for each group. Depending on the rule type, you can configure alert suppression to create alerts each time the rule runs, or once within a specified time window. You can also specify multiple fields to group events by unique combinations of values.
18+
Depending on the rule type, you can configure alert suppression to create alerts each time the rule runs, or once within a specified time window. You can also specify multiple fields to group events by unique combinations of values.
3519

3620
The {{security-app}} displays several indicators in the Alerts table and the alert details flyout when a detection alert is created with alert suppression enabled. You can view the original events associated with suppressed alerts by investigating the alert in Timeline.
3721

38-
3922
## Configure alert suppression [security-alert-suppression-configure-alert-suppression]
4023

41-
You can configure alert suppression when you create or edit a supported rule type. Refer to documentation for creating [custom query](/solutions/security/detect-and-alert/create-detection-rule.md#create-custom-rule), [threshold](/solutions/security/detect-and-alert/create-detection-rule.md#create-threshold-rule), [event correlation](/solutions/security/detect-and-alert/create-detection-rule.md#create-eql-rule), [new terms](/solutions/security/detect-and-alert/create-detection-rule.md#create-new-terms-rule), [{{esql}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-esql-rule), or [{{ml}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-ml-rule) rules for detailed instructions.
24+
::::{admonition} Requirements and notices
25+
* To use alert suppression in {{stack}} and {{serverless-short}}, you must have the appropriate [subscription](https://www.elastic.co/pricing).
26+
* {{ml-cap}} rules have [additional requirements](/solutions/security/advanced-entity-analytics/machine-learning-job-rule-requirements.md) for alert suppression.
4227

43-
1. When configuring the rule type (the **Define rule** step for a new rule, or the **Definition** tab for an existing rule), specify how you want to group events for alert suppression:
28+
::::
4429

45-
* **Custom query, indicator match, threshold, event correlation, new terms, {{ml}}, and {{esql}} rules:** In **Suppress alerts by**, enter 1-3 field names to group events by the fields' values.
46-
* **Threshold rule:** In **Group by**, enter up to 3 field names to group events by the fields' values, or leave the setting empty to group all qualifying events together.
30+
You can configure alert suppression when [creating](/solutions/security/detect-and-alert/create-detection-rule.md) or editing a rule.
4731

48-
::::{note}
49-
If you specify a field with multiple values, alerts with that field are handled as follows:
32+
1. When configuring the rule (the **Define rule** step for a new rule, or the **Definition** tab for an existing rule), specify how you want to group alerts for alert suppression:
5033

51-
* **Custom query or threshold rules:** Alerts are grouped by each unique value. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts will be suppressed separately for each value of `127.0.0.1`, `127.0.0.2`, and `127.0.0.3`.
52-
* **Indicator match, event correlation (non-sequence queries only), new terms, {{esql}}, or {{ml}} rules:** Alerts with the specified field name and identical array values are grouped together. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts with the entire array are grouped and only one alert is created for the group.
53-
* **Event correlation (sequence queries only) rules:** If the specified field contains an array of values, suppression only happens if the field’s values are an exact match and in the same order. For example, if you specify the field `myips` and one sequence alert has [1.1.1.1, 0.0.0.0] and another sequence alert has [1.1.1.1, 192.168.0.1], neither of those alerts will be suppressed, despite sharing an array element.
34+
* **All rule types except the threshold rule:** In **Suppress alerts by**, enter 1 or more field names to group alerts by the fields' values. The maximum limit of fields that you can enter is as follows:
35+
* {applies_to}`stack: ga 9.0.0, ga 9.1.0` Enter up to 3 fields.
36+
* {applies_to}`stack: ga 9.2.0`: Enter up to 5 fields.
5437

55-
::::
38+
* **Threshold rule only:** In **Group by**, enter up to 3 field names to group events by the fields' values, or leave the setting empty to group all qualifying events together.
5639

57-
2. If available, select how often to create alerts for duplicate events:
5840

59-
::::{note}
60-
Both options are available for custom query, indicator match, event correlation, new terms, {{esql}}, and {{ml}} rules. Threshold rules only have the **Per time period** option.
41+
::::{tip}
42+
43+
Refer to [Suppression for fields with an array of values](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-fields-with-multiple-values) to learn how fields with multiple values are handled.
44+
6145
::::
6246

6347

48+
2. Choose how often to create alerts for qualifying events:
49+
6450
* **Per rule execution**: Create an alert each time the rule runs and an event meets its criteria.
65-
* **Per time period**: Create one alert for all qualifying events that occur within a specified time window, beginning from when an event first meets the rule criteria and creates the alert.
51+
* **Per time period**: Create one alert for all qualifying events that occur within a specified time window, beginning from when an event first meets the rule criteria and creates the alert. This is the only option available when configuring alert suppression for threshold rules.
6652

6753
For example, if a rule runs every 5 minutes but you don’t need alerts that frequently, you can set the suppression time period to a longer time, such as 1 hour. If the rule meets its criteria, it creates an alert at that time, and for the next hour, it’ll suppress any subsequent qualifying events.
6854

6955
:::{image} /solutions/images/security-alert-suppression-options.png
7056
:alt: Alert suppression options
57+
:width: 450px
7158
:::
7259

7360
3. Under **If a suppression field is missing**, choose how to handle events with missing suppression fields (events in which one or more of the **Suppress alerts by** fields don’t exist):
7461

7562
::::{note}
76-
These options are not available for threshold rules.
63+
These options are available for all rule types except threshold rules.
7764
::::
7865

79-
8066
* **Suppress and group alerts for events with missing fields**: Create one alert for each group of events with missing fields. Missing fields get a `null` value, which is used to group and suppress alerts.
8167
* **Do not suppress alerts for events with missing fields**: Create a separate alert for each matching event. This basically falls back to normal alert creation for events with missing suppression fields.
8268

@@ -89,13 +75,22 @@ You can configure alert suppression when you create or edit a supported rule typ
8975
::::
9076

9177

78+
### Suppression for fields with an array of values [security-alert-suppression-fields-with-multiple-values]
79+
80+
When specifying fields to suppress alerts by, you can select fields that have multiple values. When alerts for those fields are generated, they're handled as follows:
81+
82+
* **Custom query or threshold rules:** Alerts are grouped by each unique value and an alert is created for each group. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts are grouped separately for each value of `127.0.0.1`, `127.0.0.2`, and `127.0.0.3` and an alert is created for each group.
83+
84+
* **Indicator match, event correlation (non-sequence queries only), new terms, {{esql}}, or {{ml}} rules:** Alerts with identical array values are grouped together. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts with the entire array are grouped and only one alert is created for the group.
85+
86+
* **Event correlation (sequence queries only) rules:** Alerts that are an exact match are grouped. To be an exact match, array values must be identical and in the same order. For example, if you specify the field `myips` and one sequence alert has `[1.1.1.1, 0.0.0.0]` and another sequence alert has `[1.1.1.1, 192.168.0.1]`, neither of those alerts is suppressed, despite sharing an array element.
9287

9388
## Confirm suppressed alerts [security-alert-suppression-confirm-suppressed-alerts]
9489

95-
The {{security-app}} displays several indicators of whether a detection alert was created with alert suppression enabled, and how many duplicate alerts were suppressed.
90+
The {{security-app}} displays several indicators of whether a detection alert was created with alert suppression enabled, and how many qualifying alerts were suppressed.
9691

9792
::::{important}
98-
After an alert is moved to the `Closed` status, it will no longer suppress new alerts. To prevent interruptions or unexpected changes in suppression, avoid closing alerts before the suppression interval ends.
93+
Changing an alert's status to `Closed` can affect suppression. Refer to [Impact of closing suppressed alerts](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-impact-close-alerts) to learn more.
9994
::::
10095

10196

@@ -104,24 +99,26 @@ After an alert is moved to the `Closed` status, it will no longer suppress new a
10499
:::{image} /solutions/images/security-suppressed-alerts-table.png
105100
:alt: Suppressed alerts icon and tooltip in Alerts table
106101
:screenshot:
102+
:width: 650px
107103
:::
108104

109105
* **Alerts** table — Column for suppressed alerts count. Select **Fields** to open the fields browser, then add `kibana.alert.suppression.docs_count` to the table.
110106

111107
:::{image} /solutions/images/security-suppressed-alerts-table-column.png
112108
:alt: Suppressed alerts count field column in Alerts table
113109
:screenshot:
110+
:width: 750px
114111
:::
115112

116113
* Alert details flyout — **Insights****Correlations** section:
117114

118115
:::{image} /solutions/images/security-suppressed-alerts-details.png
119116
:alt: Suppressed alerts in the Correlations section within the alert details flyout
120117
:screenshot:
118+
:width: 450px
121119
:::
122120

123121

124-
125122
## Investigate events for suppressed alerts [security-alert-suppression-investigate-events-for-suppressed-alerts]
126123

127124
With alert suppression, detection alerts aren’t created for the grouped source events, but you can still retrieve the events for further analysis or investigation. Do one of the following to open Timeline with the original events associated with both the created alert and the suppressed alerts:
@@ -130,13 +127,28 @@ With alert suppression, detection alerts aren’t created for the grouped source
130127

131128
:::{image} /solutions/images/security-timeline-button.png
132129
:alt: Investigate in timeline button
133-
:width: 350px
130+
:width: 250px
134131
:screenshot:
135132
:::
136133

137134
* Alert details flyout — Select **Take action****Investigate in timeline**.
138135

139136

137+
## Impact of closing suppressed alerts [security-alert-suppression-impact-close-alerts]
138+
139+
By default, if you close a suppressed alert while a suppression window is still active, suppression resets. Subsequently, any new qualifying alerts are suppressed and added to a new alert for suppression.
140+
141+
For example, say you set the suppression time period to 5 minutes and specify to group alerts by the `host.name` field. The first time an event meets the rule's criteria, an alert is created. Over the next 5 minutes, any subsequent qualifying alerts are suppressed and grouped by unique `host.name` value. If you close that first alert before the active suppression window ends (the 5 minute suppression time period), alert suppression stops and restarts when the next qualifying alert meets the suppression criteria.
142+
143+
144+
:::{image} /solutions/images/security-alert-suppression-close-alert-example.png
145+
:alt: Example of suppression configuration for a rule
146+
:screenshot:
147+
:width: 450px
148+
:::
149+
150+
{applies_to}`stack: ga 9.2` You can change the default behavior and continue suppressing alerts until the end of suppression window after you close an investigated alert. To do this, change the `securitySolution:suppressionBehaviorOnAlertClosure` [advanced setting](/solutions/security/get-started/configure-advanced-settings.md#suppression-window-behavior) to **Continue until suppression window ends**.
151+
140152
## Alert suppression limit by rule type [security-alert-suppression-alert-suppression-limit-by-rule-type]
141153

142154
Some rule types have a maximum number of alerts that can be suppressed (custom query rules don’t have a suppression limit):

solutions/security/get-started/configure-advanced-settings.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,6 +204,13 @@ Each time a detection rule runs using a remote cross-cluster search (CCS) index
204204

205205
If you’ve ensured that your detection rules have the required privileges across your remote indices, you can use the `securitySolution:enableCcsWarning` setting to disable this warning and reduce noise.
206206

207+
## Configure alert suppression window behavior [suppression-window-behavior]
208+
209+
```yaml {applies_to}
210+
stack: ga 9.2
211+
```
212+
213+
To control whether alert suppression continues after you close a supressed alert during an [active suppression window](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-impact-close-alerts), configure the `securitySolution:suppressionBehaviorOnAlertClosure` advanced setting. This setting lets you choose whether suppression continues or restarts when the next qualifying alert meets the suppression criteria. The default selection is **Restart suppression**.
207214

208215
## Show/hide related integrations in Rules page tables [show-related-integrations]
209216

0 commit comments

Comments
 (0)