Is there any way to filter out specified security event ID from Sentinel

vivek8647 41 Reputation points

We ingest security log to sentinel. Is there any way to filter out event ID 4662 from Sentinel ?

Microsoft Defender for Cloud
Microsoft Defender for Cloud
An Azure service that provides threat protection for workloads running in Azure, on-premises, and in other clouds. Previously known as Azure Security Center and Azure Defender.
1,232 questions
Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,019 questions
0 comments No comments
{count} votes

Accepted answer
  1. Givary-MSFT 29,341 Reputation points Microsoft Employee


    Thank you for reaching out to us.

    AMA agent allows to make filtering with DCR rules. need to use Windows Security Events connector and configure collection according to the needs.

    Refer to this article:

    Let me know if you have any questions.

    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Andrew Blumhardt 9,676 Reputation points Microsoft Employee

    There are a few options. You can set your data collection tier to minimal. You can also update your local audit policies.

    I assume you are seeing a high volume of object access events on file servers. You could use DCR rules with the new AMA agent filter specific events. This rule could also be scoped to the file servers. Lastly there is a new ingestion-time filtering option that may work.

    0 comments No comments