Add | eval QA=1 to the end of your Risk Incident Rules, then go to Configure → Incident Management → Notable Event Suppressions, and create a new suppression for:
QA mode
index=notableQA=1
This will keep Risk Notables out of your Incident Review queue while you develop RBA.
Create a Sandbox for Risk Rules away from Risk Notables¶
Create an eventtype called something like QA and have it apply a tag called QA, then add the following to your Risk Incident Rules.
...
WHERENOTAll_Risk.tag=QA
...
This keeps your curated risk ecology preserved so you can compare how many Risk Notables you would see if your QA content was added.
If you create a lookup from a saved search called Past7DayNotables.csv where you store the previous time, status, and sources, you could include this in your Risk Incident Rules:
Assigning the score of 10 for a signature that isn't generally bad but we still want to add a small amount of risk.
Zeroing out the score for a signature of something a lot of our users have installed and we can't really control, but still want to observe is happening.
Assigning the score of 25 for an unsuccessful HTTP connection.
Assigning the score of 100 and potentially alerting directly in case we see malware from someone who is not on the Threat Intelligence team.
Assigning a null() value in every other case to utilize the default risk score from the Risk Analysis action.
For tuning Risk Incident Rules that don't rely on an accretive score to alert, but still need a lever to tweak noisy sources. In our example lookup, we would include a value between 0 and 1 for each noisy source; IE 0.75 to only count a rule as ¼ of a standard weight, 0.5 to only count as ½, etc.