We are also looking to deploy snort in our environment, having some sort of 
mechanism to lump several snort triggers into a single violation would be very 
helpful to us.

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor
900 College St.
Belton TX. 76513
Fone: 254-295-4658
Phax: 254-295-4221
HTTP://WWW.UMHB.EDU

-----Original Message-----
From: Rich Graves [mailto:[email protected]] 
Sent: Wednesday, May 02, 2012 11:29 AM
To: [email protected]
Subject: Re: [PacketFence-users] Snort integration and updates

None/all of the above.

If you're going to do this, you could get the broadest reach with a regular 
expression match of the alert. I could imagine an organization other than mine 
blacklisting clients based on / ET (P2P|POLICY) .+Priority: 1/, for example.

VRT is 90% done changing the classification of most rules. ET went through a 
similar mass reclassification a couple years ago. This doesn't mean that 
classifications are not useful -- it just means that you'd have to pay 
attention when they change.

I don't think I would ever use such a feature. False positives are too high 
with new rules. Consider reviewing your snort alerts in something like Snorby, 
Placid, or Aanval instead, and archive everything to ELSA. If you see something 
interesting, create a generic malware violation manually.

High-confidence proprietary VRT rules have this sort of thing in the rule file:

  metadata:policy balanced-ips drop, policy security-ips drop; 

SourceFire appliances use that for default policy, based on VRT's estimation of 
the risk/reward. Most rules are alert only. The suggested action appears only 
in the rule, not in the alert message.
--
Rich Graves http://claimid.com/rcgraves
Carleton.edu Sr UNIX and Security Admin

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and threat 
landscape has changed and how IT managers can respond. Discussions will include 
endpoint security, mobile security and the latest in malware threats. 
http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to