An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
Hello Matthew Robinson,
The "Exception Anomalies" alerts are usually generated by Smart Detection, and these are often do not include full exception text in a way that's mostly filtered using a simple contains match on payload.
Instead of relying only on the payload context filtering, try adding an alert rule name or ID or any specific signal name to work it efficiently.
Alternatively, you can create a custom log based alert rule as shown below. Once you write a KQL query, you can click on the New Alert rule and while adding or creating the action group, choose email as no-email to stop receiving them.
Hope this helps!
If the answer is helpful, please click on Accept Answer and upvote it. If you still have any queries, please click on Comment.