Exclude file detected in Suricata rule #9387
Replies: 1 comment 1 reply
-
You might be able to modify that rule with your additional criteria OR disable that rule and create your own local rules with your additional criteria: |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I was wondering if there is a way to suppress a specific rule based on the file that it's detecting. For example, this rule, ET POLICY SMB2 NT Create AndX Request For a .bat File is detecting a file in the sysvol folder of a DC. I want to exclude detection on that file specifically but detect on any other .bat files executed from the sysvol folder. If that is possible, there is another .dll file being executed from that folder as well that I would want to exclude as well.
Beta Was this translation helpful? Give feedback.
All reactions