Excluding items from Active Threat Analytics
You can exclude certain sources and activities from the Active Threat Analytics processes to optimize resources and reduce false positives.
About this task
- Server IP
- Database
- Database user
- Operation system user
Each such row is called an exclude item, though it might match several sources. You can use the asterisk character as a wildcard that replaces any string. The sources are excluded from all Active Threat Analytic processes – Outlier mining, Threat finder, and Threat diagnostics.
- If you exclude
Server IP=130.23.45.55, all the databases on this server and all the DB users of these databases are excluded from analytics. - If you exclude
Server IP=130.23.*andDatabase=QA_*, all the databases that start withQA_on all the servers in subnet130.23and all DB users of these databases are excluded from analytics. - If you exclude
Database user=QATEST, database userQATESTis excluded from analytics in all the databases.
You can also choose to exclude sources only from a specific category. For example, to exclude a database only from the “New grants” category. The database is analyzed for all other categories.
The following limitations affect only managed units that are working with Guardium 12.0 and earlier, while their central manager is upgraded to version 12.0 or later:
- The managed unit is not updated when you update or delete an exclusion item.
- Items excluded temporarily, that is, items with an end date selected, do not take effect on the managed units.
- When you enter a future start date on an exclude item, the exclusion starts immediately on the managed units.
- Cases cannot be excluded based on their category when the cases are created from the managed unit.
- Cases that are created from the managed unit are not excluded based on their category.
Adding items to the exclude list
You can add items to the exclude list from the Active Threat Analytics setup page, Active Threat Analytics dashboard, or the Investigation Dashboard.
Procedure
Editing items in the exclude list
You can view and adjust the exclusion parameters for an existing item from the Active Threat Analytics setup page.
Procedure
Removing items from the exclude list
You can remove items from the exclude list only from the Active Threat Analytics setup page.
Procedure
- Open the exclude list by going to section, or clicking Active Threat Analytics setup from the main Active Threat Analytics page.
- From the exclude list, select the item that you want to remove and then click the
icon.