From 58ed2a0f40695671368320b1c0ba62ff2ce46d8d Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 25 Jun 2019 11:02:49 -0700 Subject: [PATCH] Update manage-alerts.md --- .../microsoft-defender-atp/manage-alerts.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index 046e0f4f05..093f9b62b0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -68,13 +68,13 @@ Create custom rules to control when alerts are suppressed, or resolved. You can 2. Select **Create a suppression rule**. - You can create a suppression rule based on the following attributes: + You can create a suppression condition using these attributes. An AND operator is applied between each condition, so suppression occurs only if all conditions are met. - * File hash - * File name - wild card supported - * File path - wild card supported - * IP - * URL - wild card supported + * File SHA1 + * File name - wildcard supported + * Folder path - wildcard supported + * IP address + * URL - wildcard supported 3. Select the **Trigerring IOC**.