01-18-2019 03:01 AM - edited 02-21-2020 08:40 AM
Hello!
I'm using Sourcefire IPS and I'm reviewing the signature alerts... I scheduled a report that show me which specific snort signature triggered in a specific time frame, something like:
SIGNATURE NAME , NUMBER OF EVENTS, SEVERITY
Because we use different layers in the intrusion policy will be very useful to add to the report the layer in which the signature are.
(The reason of this is that a specific layer is including the latest snort rules, while the others older ones, so I would like to filter the events based on the layer to investigate only the new ones and not previous events.)
The output should be a report in csv like:
SIGNATURE NAME , NUMBER OF EVENTS, SEVERITY , ( Layer )
Do you know how to export this? What is the best way to review these events? Any experience?
Many thanks! Ric
01-21-2019 02:39 AM
From my experience source fire is excellent IPS/IDS however, when it come to reporting its not as good.
07-30-2019 12:35 PM
Hello,
any advice on the topic?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide