# Suppression Rules

Suppression rules allow you to ignore specific outbound network calls from known domains that are not a security concern.

For example, if your organization regularly makes outbound calls to `www.google.com`, but these calls are being flagged as anomalous, you can create a suppression rule to prevent unnecessary alerts for this domain.

## Scope of Suppression Rules

You can create suppression rules at different levels, depending on how broadly you want to apply them:

* Job Level – Applies to a specific job.
* Workflow Level – Applies to all jobs within a workflow.
* Repository Level – Applies to an entire repository.
* Organization Level – Applies across all repositories within the organization.

### How to Create a Suppression Rule

There are two ways to create a suppression rule, from the:

* Suppression Rules page&#x20;
* All Detections page

### Method 1: From the Suppression Rules Page

**Step 1:** Navigate to `Suppression Rules` under the Harden Runner Section

<figure><img src="/files/b9SFB3aw1J4g0cJd1lVp" alt=""><figcaption><p>Suppression Rules Page</p></figcaption></figure>

**Step 2:** Click "Create rule"

![Suppression Rules Page](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-08-21/e35b5370-8f8e-46b2-a48b-a8ba6f1924e2/ascreenshot.jpeg?tl_px=272,0\&br_px=3024,1538\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=1014,44)

**Step 3:** Enter the following details:

* Rule Name – Provide a meaningful name for the rule.
* Rule Type – Choose the appropriate rule type. The options shown will vary based on the [detection type](/harden-runner/detections.md#types-of-detections).
* Description – Add details about why this rule is being created.
* Destination – Specify the domain or IP Address to suppress (use \* for wildcard matching).
* Process – Specify the exact process name. This allows you to suppress anomalous outbound calls originating from a specific process, even if other processes calling the same destination should still be monitored
* Scope – Choose the level of the rule: Job, Workflow, Repository, or Organization.

<figure><img src="/files/msbSSivfU3QBwd43N1Rr" alt=""><figcaption></figcaption></figure>

**Step 4:** Click "Save"

![Suppression Rules Page](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-08-21/04a5ad06-b1dc-44dd-ad58-e7e984e0fec0/ascreenshot.jpeg?tl_px=0,175\&br_px=2752,1714\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=452,510)

Your Suppression Rule is now created and active

<figure><img src="/files/m1RaaqyzWi4nvTXprMX6" alt=""><figcaption><p>Suppression Rules Page</p></figcaption></figure>

### Method 2: Creating a Suppression Rule from the All Detections Page

**Step 1:** Navigate to `Detections` and go to the Anomalous Outbound Network Calls Tab

<figure><img src="/files/fvzGQbwUE4cL8US6u7zL" alt=""><figcaption></figcaption></figure>

**Step 2:** Click on the three dots next to the detection you want to suppress and select "Suppress detection"

<figure><img src="/files/ciqioD0ZwGrE037MoRp1" alt=""><figcaption></figcaption></figure>

**Step 3:** You will be redirected to the Suppression Rules page with the detection details pre-filled, add the name and description.

<figure><img src="https://ajeuwbhvhr.cloudimg.io/colony-recorder.s3.amazonaws.com/files/2025-03-08/cb0c3e9a-6daf-480a-a2c3-ed0982afb4d3/ascreenshot.jpeg?tl_px=255,0&#x26;br_px=3008,1538&#x26;force_format=jpeg&#x26;q=100&#x26;width=1120.0&#x26;wat=1&#x26;wat_opacity=1&#x26;wat_gravity=northwest&#x26;wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png&#x26;wat_pad=694,135" alt="StepSecurity Suppression Rules page showing how to create a new rule"><figcaption><p>StepSecurity Suppression Rules page</p></figcaption></figure>

**Step 4:** Click "Save"

<figure><img src="https://ajeuwbhvhr.cloudimg.io/colony-recorder.s3.amazonaws.com/files/2025-03-08/c4ca4ebc-0f35-45a8-9ad5-a91ed649e4bf/ascreenshot.jpeg?tl_px=0,179&#x26;br_px=2752,1718&#x26;force_format=jpeg&#x26;q=100&#x26;width=1120.0&#x26;wat=1&#x26;wat_opacity=1&#x26;wat_gravity=northwest&#x26;wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png&#x26;wat_pad=446,528" alt="StepSecurity Suppression Rules page showing how to create a new rule"><figcaption><p>StepSecurity Suppression Rules page</p></figcaption></figure>

Your Suppression Rule is now in effect

<figure><img src="https://ajeuwbhvhr.cloudimg.io/colony-recorder.s3.amazonaws.com/files/2025-03-08/618d0a9e-d190-47ab-893f-15cd3ca6b2e2/user_cropped_screenshot.jpeg?tl_px=0,179&#x26;br_px=2752,1718&#x26;force_format=jpeg&#x26;q=100&#x26;width=1120.0&#x26;wat=1&#x26;wat_opacity=1&#x26;wat_gravity=northwest&#x26;wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png&#x26;wat_pad=470,464" alt="StepSecurity Suppression Rules page showing the list of rules"><figcaption><p>StepSecurity Suppression Rules page</p></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.stepsecurity.io/harden-runner/suppression-rules.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
