Suppress alert based on Alert Description in SCOM

Ravi Bhushan 41 Reputation points
2023-03-29T15:35:27.55+00:00

Hello,

I need help with one issue. I want to suppress alert bases on alert description. There is an alert coming for Repeated login attempt. When checking the alert description we can see there different types of account associated. I just want to suppress the alert which is coming for a particular account. like if we are getting four alerts for this. Once Alert is having Alert Description as

Description: Security Monitoring: Repeated logon attempts

Account Domain:                             abc

Source: XXXXXXXXXXXXXXXXXXXXX

and similar way other alerts are coming where the account name is different.

I just want to suppress the alert with account domain abc. Can it be done?

Please help me on this.

Regards,

Ravi

Operations Manager
Operations Manager
A family of System Center products that provide infrastructure monitoring, help ensure the predictable performance and availability of vital applications, and offer comprehensive monitoring for datacenters and cloud, both private and public.
1,417 questions
Microsoft System Center
Microsoft System Center
A suite of Microsoft systems management products that offer solutions for managing datacenter resources, private clouds, and client devices.
839 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Andrew Blumhardt 9,496 Reputation points Microsoft Employee
    2023-03-29T16:09:02.1333333+00:00

    Maybe revise the rule criteria. Try filtering on a customer parameter called "EventDescription".

    For example EventDescription does not contain "XXX"


  2. SChalakov 10,261 Reputation points MVP
    2023-03-30T09:18:43.0233333+00:00

    Hi,

    as you are alerting on Events (at least I assume so) you should also be able to configure alert supression, based on the positional parametere within the event. Let's say that the Source field is actually Parameter 2, then you can go ahead and supress based on what value lies within Parameter 2:

    Please go through thiss:

    Using a Generic Text Log rule to monitor an ASCII text file – even when the file is a UNC path

    Some other very helpful references:

    How to query for the Windows event XML data values in SCOM

    Using Event Description as criteria for a rule

    Hope that helps!


    (If the reply was helpful please don't forget to upvote and/or accept as answer, thank you)
    Regards
    Stoyan Chalakov

    0 comments No comments