Hi,
Trying to whitelist a false positive offense.
In a log source there are two types of events...
Event 1, signals a suspicious situation.
Event 2, signals a situation as occurred from a certain machine.
Now there is a similarity...
If event 1 occurs and event 2 has occurred in the same minute with the same username
Then the event is false positive.
Is there a way to combine does events and make a rule to filter out the false positives within qradar?
------------------------------
Jan-dirk Prins
------------------------------