Hello CheckMates
We are looking for ways to create tailored exclusions as we are being overrun by events. We have secure networks without access to the web and these servers are affected mostly by dropped traffic logs causing correlation events - therefore sending lots of alerts and making it difficult to find useful information.
Is there a way to exclude dropped traffic in the policy? We are mostly interested in correlation of events that are from the inside > outside for these particular networks, but I cannot find a way to configure the policy for this.
Creating global exclusions and such has not worked due to the variables of each connection and destination. Any advice or ideas of how you guys deal with such an issue would be greatly appreciated! Thanks