Hi,
Thanks for using our community
What we can do is create a new custom rule for when the image file is miiserver.exe, can you share the actual rule being triggered ? And the JSON of the alert being triggered with that we can create a new custom rule only when the affected file is the one mentioned before and lower the alert so that it does not trigger the active response. We can also silence the alert by setting a level lower to 3.
Belos is some reference documentation on customer rules and decoders
The Idea here is to create a new custom rule that calls the actual rule being triggered (with the <if_sid> tag as parent) and filter by the miiserver.exe image name. That is why I need the JSON of the alert being triggered now, to have the details on the alert fields
You can obtain the JSON in the discover tab by looking for the alert and going to the JSON tab as shown on the following screenshots
I will be waiting your input on this
Regards!