Project

General

Profile

Support #3537 » regras.txt

leonardo kasper, 03/26/2020 05:08 PM

 
default-rule-path = /etc/suricata/rules
rule-files.0 = emerging-dns.rules
rule-files.1 = emerging-malware.rules
rule-files.2 = emerging-misc.rules
rule-files.3 = emerging-mobile_malware.rules
rule-files.4 = emerging-netbios.rules
rule-files.5 = emerging-p2p.rules
rule-files.6 = emerging-policy.rules
rule-files.7 = emerging-pop3.rules
rule-files.8 = emerging-rpc.rules
rule-files.9 = emerging-scada.rules
rule-files.10 = emerging-scan.rules
rule-files.11 = emerging-shellcode.rules
rule-files.12 = emerging-smtp.rules
rule-files.13 = emerging-snmp.rules
rule-files.14 = emerging-sql.rules
rule-files.15 = emerging-telnet.rules
rule-files.16 = emerging-tftp.rules
rule-files.17 = emerging-trojan.rules
rule-files.18 = emerging-user_agents.rules
rule-files.19 = emerging-voip.rules
rule-files.20 = emerging-web_client.rules
rule-files.21 = emerging-web_server.rules
rule-files.22 = emerging-web_specific_apps.rules
rule-files.23 = emerging-worm.rules
rule-files.24 = tor.rules
rule-files.25 = stream-events.rules
rule-files.26 = http-events.rules
rule-files.27 = smtp-events.rules
rule-files.28 = dns-events.rules
rule-files.29 = modbus-events.rules
rule-files.30 = app-layer-events.rules
outputs.7.pcap-log.honor-pass-rules = no
engine-analysis.rules-fast-pattern = yes
engine-analysis.rules = yes
detect.profiling.grouping.include-rules = false
profiling.rules = (null)
profiling.rules.enabled = yes
profiling.rules.filename = rule_perf.log
profiling.rules.append = yes
profiling.rules.limit = 10
profiling.rules.json = yes
(3-3/4)