Snort mailing list archives
which rules to load ?
From: Pratik Narang <pratik.cse.bits () gmail com>
Date: Wed, 29 Aug 2012 16:37:54 +0530
Alright this might sound like a total noob question, but I am badly stuck on this- How is it to be decided that what Snort rules I should enable/uncomment? The purpose is to configure Snort as an IDS to monitor network activity, and alert against the standard set of things an IDS should alert against- buffer overflow attacks, injection attacks, port scans & information leaks to name a few, or in general, the attempts to detect/exploit vulnerabilities, leak data and evade policies. Is there anyone out there running who is Snort for a commercial environment or at least for a medium sized network? How does one shortlist on the .rules files to be used and the rules (in them) to be enabled ?? Thanks... ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- which rules to load ? Pratik Narang (Aug 29)
- Re: which rules to load ? Peter Bates (Aug 29)
- Re: which rules to load ? Jefferson, Shawn (Aug 29)