Enabling object access auditing on a Windows server creates a significant volume of event traffic, some of which you may wish to eliminate. For example, Windows generates two events each time an administrator opens the Microsoft Management Console (mmc.exe). These events have ID values of 560 and 562.
In this example, you create a new rule that suppresses Windows events with an event_id of 560. Completing the steps in the following procedure gives you an actual suppression rule you can use in your network environment as well as demonstrating how to use the wizard.
To get started with this example, you must log in to a CA Enterprise Log Manager server as a user with the Administrative role and privileges. You cannot create or edit suppression rules while logged in as the EiamAdmin user.
To create a suppression rule for Windows 560 events
A new filter line appears in the table. You can click a value or the empty space in each table cell to select or enter a new value.
The Logic operator field defaults to the value, AND. If you have several different types of events that you wanted to suppress, you can enter their event IDs with new lines that use the OR logical operator.
The wizard automatically creates a User folder to contain your suppression rules. You can see this folder by expanding the Suppression Rules folder.
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |