|
default-rule-path = /etc/suricata/rules
|
|
rule-files.0 = emerging-dns.rules
|
|
rule-files.1 = emerging-malware.rules
|
|
rule-files.2 = emerging-misc.rules
|
|
rule-files.3 = emerging-mobile_malware.rules
|
|
rule-files.4 = emerging-netbios.rules
|
|
rule-files.5 = emerging-p2p.rules
|
|
rule-files.6 = emerging-policy.rules
|
|
rule-files.7 = emerging-pop3.rules
|
|
rule-files.8 = emerging-rpc.rules
|
|
rule-files.9 = emerging-scada.rules
|
|
rule-files.10 = emerging-scan.rules
|
|
rule-files.11 = emerging-shellcode.rules
|
|
rule-files.12 = emerging-smtp.rules
|
|
rule-files.13 = emerging-snmp.rules
|
|
rule-files.14 = emerging-sql.rules
|
|
rule-files.15 = emerging-telnet.rules
|
|
rule-files.16 = emerging-tftp.rules
|
|
rule-files.17 = emerging-trojan.rules
|
|
rule-files.18 = emerging-user_agents.rules
|
|
rule-files.19 = emerging-voip.rules
|
|
rule-files.20 = emerging-web_client.rules
|
|
rule-files.21 = emerging-web_server.rules
|
|
rule-files.22 = emerging-web_specific_apps.rules
|
|
rule-files.23 = emerging-worm.rules
|
|
rule-files.24 = tor.rules
|
|
rule-files.25 = stream-events.rules
|
|
rule-files.26 = http-events.rules
|
|
rule-files.27 = smtp-events.rules
|
|
rule-files.28 = dns-events.rules
|
|
rule-files.29 = modbus-events.rules
|
|
rule-files.30 = app-layer-events.rules
|
|
outputs.7.pcap-log.honor-pass-rules = no
|
|
engine-analysis.rules-fast-pattern = yes
|
|
engine-analysis.rules = yes
|
|
detect.profiling.grouping.include-rules = false
|
|
profiling.rules = (null)
|
|
profiling.rules.enabled = yes
|
|
profiling.rules.filename = rule_perf.log
|
|
profiling.rules.append = yes
|
|
profiling.rules.limit = 10
|
|
profiling.rules.json = yes
|