You might find that the curated detections provided by the Google Cloud Threat Intelligence (GCTI) team
are generating too many detections. You can configure exclusions to the curated detection
rules to help reduce the volume of these detections. Rule exclusions are used only with Google Security Operations
curated detections.
To configure an exclusion to a curated detection rule, complete the following steps:
In the navigation bar, selectRules & Detections. Click theExclusionstab.
ClickCreate Exclusionto create a new exclusion. TheCreate Exclusionwindow opens.
Figure 1: Create Exclusion
Specify a unique exclusion name. This name will appear in the list of exclusions on the Exclusions tab.
Select the Rule or Rule Set to apply the exclusion to. You can either scroll through the list of rules or search for a particular rule using the search field and clickingSearch.
Rules in a rule set are displayed only if they triggered a detection.
Enter the UDM value to exclude by selecting aUDM Field, specifying an operator, and entering a value. You must press the Enter key for each value, otherwise you receive an error message when you click+ Conditional Statement. For example, you might want to configure an exclusion whenprincipal.hostname = google.com.
You can enter additional values to a condition. Each time you press the Enter key, the value is recorded and you are able to enter another value. Multiple values for one condition are joined using a logical OR, meaning an exclusion matches if any of the values matches.
You can add additional conditions to this exclusion by clicking+ Conditional Statement. If you attempt to specify an invalid condition, you will receive an error message. Multiple conditions are joined using a logical AND, meaning an exclusion only matches if every one of the conditions also matches.
(Optional) ClickRun Testto determine how many exclusions would be made if enabled, computed by evaluating the exclusion over the past two weeks of recorded detections.
(Optional) UncheckEnable Exclusion Upon Creationif you want to disable the exclusion for the time being (this option is enabled by default).
ClickAdd Rule Exclusionwhen ready.
Create exclusions from the UDM viewer
You can also create exclusions from within the UDM viewer by completing the following steps:
In the navigation bar, selectRules & Detections. Click theCurated Detectionstab.
ClickDashboardand then select a rule with detections.
Navigate to an event in theTimelineand click the Raw Log and UDM Event viewer icon.
In the UDM Event view, select the UDM field to exclude, selectView Options, and then selectExclude. TheCreate Exclusionwindow opens. The window is pre-populated with the rule, UDM field, and value drawn from your UDM selection.
Give the new exclusion a unique name.
(Optional) ClickRun Testto determine how many exclusions would be made if enabled, computed by evaluating the exclusion over the past two weeks of recorded detections.
ClickAdd Rule Exclusionwhen ready.
Manage exclusions
Once you have created one or more exclusions, you have the following options from theExclusionstab (in the navigation bar, selectRules & Detections. Click theExclusionstab.):
The exclusions are listed in the exclusions table. You can disable any of the exclusions listed by setting theEnabledtoggle to theDisabled.
You can filter which exclusions are displayed by clicking the filter iconfilter_alt. Select theEnabled,Disabled, orArchivedoptions as needed.
To edit an exclusion, click the menu iconmore_vertand selectEdit.
To archive an exclusion, click the menu iconmore_vertand selectArchive.
To unarchive an exclusion, click the menu iconmore_vertand selectUnarchive.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eRule exclusions in Google Security Operations allow you to reduce the volume of detections generated by Google Cloud Threat Intelligence (GCTI) curated detection rules.\u003c/p\u003e\n"],["\u003cp\u003eExclusions can be created from the Exclusions tab in the Rules & Detections section by specifying a unique name, selecting the rule or rule set, and entering the UDM field values to exclude.\u003c/p\u003e\n"],["\u003cp\u003eYou can create exclusions directly from the UDM viewer by selecting a UDM field within an event, and the exclusion window will be pre-populated with relevant information.\u003c/p\u003e\n"],["\u003cp\u003eExclusions can be managed from the Exclusions tab, where you can enable, disable, filter, edit, archive, or unarchive them.\u003c/p\u003e\n"],["\u003cp\u003eBefore finalizing an exclusion, you have the option to run a test to see how many detections would have been excluded in the past two weeks.\u003c/p\u003e\n"]]],[],null,["Configure rule exclusions \nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nCreate exclusions from the Exclusions tab\n\nYou might find that the curated detections provided by the Google Cloud Threat Intelligence (GCTI) team\nare generating too many detections. You can configure exclusions to the curated detection\nrules to help reduce the volume of these detections. Rule exclusions are used only with Google Security Operations\ncurated detections.\n\nTo configure an exclusion to a curated detection rule, complete the following steps:\n\n1. In the navigation bar, select **Rules \\& Detections** . Click the **Exclusions** tab.\n\n2. Click **Create Exclusion** to create a new exclusion. The **Create Exclusion** window opens.\n\n **Figure 1: Create Exclusion**\n3. Specify a unique exclusion name. This name will appear in the list of exclusions on the Exclusions tab.\n\n4. Select the Rule or Rule Set to apply the exclusion to. You can either scroll through the list of rules or search for a particular rule using the search field and clicking **Search**.\n Rules in a rule set are displayed only if they triggered a detection.\n\n5. Enter the UDM value to exclude by selecting a **UDM Field** , specifying an operator, and entering a value. You must press the Enter key for each value, otherwise you receive an error message when you click **+ Conditional Statement** . For example, you might want to configure an exclusion when `principal.hostname = google.com`.\n\n You can enter additional values to a condition. Each time you press the Enter key, the value is recorded and you are able to enter another value. Multiple values for one condition are joined using a logical OR, meaning an exclusion matches if any of the values matches.\n\n You can add additional conditions to this exclusion by clicking **+ Conditional Statement**. If you attempt to specify an invalid condition, you will receive an error message. Multiple conditions are joined using a logical AND, meaning an exclusion only matches if every one of the conditions also matches.\n6. (Optional) Click **Run Test** to determine how many exclusions would be made if enabled, computed by evaluating the exclusion over the past two weeks of recorded detections.\n\n7. (Optional) Uncheck **Enable Exclusion Upon Creation** if you want to disable the exclusion for the time being (this option is enabled by default).\n\n8. Click **Add Rule Exclusion** when ready.\n\nCreate exclusions from the UDM viewer\n\nYou can also create exclusions from within the UDM viewer by completing the following steps:\n\n1. In the navigation bar, select **Rules \\& Detections** . Click the **Curated Detections** tab.\n\n2. Click **Dashboard** and then select a rule with detections.\n\n3. Navigate to an event in the **Timeline** and click the Raw Log and UDM Event viewer icon.\n\n4. In the UDM Event view, select the UDM field to exclude, select **View Options** , and then select **Exclude** . The **Create Exclusion** window opens. The window is pre-populated with the rule, UDM field, and value drawn from your UDM selection.\n\n5. Give the new exclusion a unique name.\n\n6. (Optional) Click **Run Test** to determine how many exclusions would be made if enabled, computed by evaluating the exclusion over the past two weeks of recorded detections.\n\n7. Click **Add Rule Exclusion** when ready.\n\nManage exclusions\n\nOnce you have created one or more exclusions, you have the following options from the **Exclusions** tab (in the navigation bar, select **Rules \\& Detections** . Click the **Exclusions** tab.):\n\n- The exclusions are listed in the exclusions table. You can disable any of the exclusions listed by setting the **Enabled** toggle to the **Disabled**.\n- You can filter which exclusions are displayed by clicking the filter icon filter_alt. Select the **Enabled** , **Disabled** , or **Archived** options as needed.\n- To edit an exclusion, click the menu icon more_vert and select **Edit**.\n- To archive an exclusion, click the menu icon more_vert and select **Archive**.\n- To unarchive an exclusion, click the menu icon more_vert and select **Unarchive**.\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]