From a0aa2307322cd47bbf416810ac0292925e03be87 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 19 Apr 2024 19:39:49 +0200 Subject: Adding upstream version 1:7.0.3. Signed-off-by: Daniel Baumann --- threshold.config | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 threshold.config (limited to 'threshold.config') diff --git a/threshold.config b/threshold.config new file mode 100644 index 0000000..670a57a --- /dev/null +++ b/threshold.config @@ -0,0 +1,32 @@ +# Thresholding: +# +# This feature is used to reduce the number of logged alerts for noisy rules. +# Thresholding commands limit the number of times a particular event is logged +# during a specified time interval. +# +# The syntax is the following: +# +# threshold gen_id , sig_id , type , track , count , seconds +# +# event_filter gen_id , sig_id , type , track , count , seconds +# +# suppress gen_id , sig_id +# suppress gen_id , sig_id , track , ip +# +# The options are documented at https://docs.suricata.io/en/latest/configuration/global-thresholds.html +# +# Please note that thresholding can also be set inside a signature. The interaction between rule based thresholds +# and global thresholds is documented here: +# https://docs.suricata.io/en/latest/configuration/global-thresholds.html#global-thresholds-vs-rule-thresholds + +# Limit to 10 alerts every 10 seconds for each source host +#threshold gen_id 0, sig_id 0, type limit, track by_src, count 10, seconds 10 + +# Limit to 1 alert every 10 seconds for signature with sid 2404000 per destination host +#threshold gen_id 1, sig_id 2404000, type limit, track by_dst, count 1, seconds 10 + +# Avoid to alert on f-secure update +# Example taken from https://blog.inliniac.net/2012/03/07/f-secure-av-updates-and-suricata-ips/ +#suppress gen_id 1, sig_id 2009557, track by_src, ip 217.110.97.128/25 +#suppress gen_id 1, sig_id 2012086, track by_src, ip 217.110.97.128/25 +#suppress gen_id 1, sig_id 2003614, track by_src, ip 217.110.97.128/25 -- cgit v1.2.3