default-rule-path = /etc/suricata/rules rule-files.0 = emerging-dns.rules rule-files.1 = emerging-malware.rules rule-files.2 = emerging-misc.rules rule-files.3 = emerging-mobile_malware.rules rule-files.4 = emerging-netbios.rules rule-files.5 = emerging-p2p.rules rule-files.6 = emerging-policy.rules rule-files.7 = emerging-pop3.rules rule-files.8 = emerging-rpc.rules rule-files.9 = emerging-scada.rules rule-files.10 = emerging-scan.rules rule-files.11 = emerging-shellcode.rules rule-files.12 = emerging-smtp.rules rule-files.13 = emerging-snmp.rules rule-files.14 = emerging-sql.rules rule-files.15 = emerging-telnet.rules rule-files.16 = emerging-tftp.rules rule-files.17 = emerging-trojan.rules rule-files.18 = emerging-user_agents.rules rule-files.19 = emerging-voip.rules rule-files.20 = emerging-web_client.rules rule-files.21 = emerging-web_server.rules rule-files.22 = emerging-web_specific_apps.rules rule-files.23 = emerging-worm.rules rule-files.24 = tor.rules rule-files.25 = stream-events.rules rule-files.26 = http-events.rules rule-files.27 = smtp-events.rules rule-files.28 = dns-events.rules rule-files.29 = modbus-events.rules rule-files.30 = app-layer-events.rules outputs.7.pcap-log.honor-pass-rules = no engine-analysis.rules-fast-pattern = yes engine-analysis.rules = yes detect.profiling.grouping.include-rules = false profiling.rules = (null) profiling.rules.enabled = yes profiling.rules.filename = rule_perf.log profiling.rules.append = yes profiling.rules.limit = 10 profiling.rules.json = yes