Setting up TALOS policies for suricata fast.log still possible? #2028
-
Hey guys, But right now it seems like I am logging every single match of the TALOS all.rules and it's flooding Suricata's fast.log. In a documentation of 14.04 it was possible to choose a policy (e.g. connectivity, balanced, security) right after selecting the Snort/TALOS ruleset. Is it still possible to choose a policy for TALOS ruleset somehow? If it is - where can I do that? I'd like to log a bit less - just the higher severity levels. I'm about to write a script to check a detection's sid and compare it with all.rules to log the detections that match with the policy "balanced-ips" for example, but a valid solution would be nice. Thank you in advance! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
TALOS rules are designed for Snort. Many of those rules will run on Suricata, but Shared Object rules will not and may result in the flooding that you're seeing. For more information, please see #1727. |
Beta Was this translation helpful? Give feedback.
TALOS rules are designed for Snort. Many of those rules will run on Suricata, but Shared Object rules will not and may result in the flooding that you're seeing. For more information, please see #1727.