These can be annoying, I agree - but be warned that if you filter them from the log, you have no way of knowing if someone is trying to brute-force attack your switch.
Assuming you have a fairly standard log setup, to filter these from the logs, use: configure log filter DefaultFilter add exclude events SNMP.Master.DropReqAccessDeny
If you also see a lot of rejected SSH connections from port scanners etc. you can filter denied SSH connections to the switch with: configure log filter DefaultFilter add exclude events exsshd.RejctConnAccessDeny
But as I said before, know that by doing this you reduce your ability to see if the switch is being port scanned / attempted attacks etc.