mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-08 02:02:50 +01:00
Remove Allow/Deny Regex, Add Suricata Enable/Disable Regex
This commit is contained in:
@@ -90,11 +90,6 @@ soc:
|
|||||||
helpLink: sigma.html
|
helpLink: sigma.html
|
||||||
forcedType: "[]string"
|
forcedType: "[]string"
|
||||||
multiline: True
|
multiline: True
|
||||||
allowRegex:
|
|
||||||
description: 'Regex used to filter imported Sigma rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: sigma.html
|
|
||||||
autoEnabledSigmaRules:
|
autoEnabledSigmaRules:
|
||||||
default: &autoEnabledSigmaRules
|
default: &autoEnabledSigmaRules
|
||||||
description: 'Sigma rules to automatically enable on initial import. Format is $Ruleset+$Level - for example, for the core community ruleset and critical level rules: core+critical. These will be applied based on role if defined and default if not.'
|
description: 'Sigma rules to automatically enable on initial import. Format is $Ruleset+$Level - for example, for the core community ruleset and critical level rules: core+critical. These will be applied based on role if defined and default if not.'
|
||||||
@@ -103,11 +98,6 @@ soc:
|
|||||||
helpLink: sigma.html
|
helpLink: sigma.html
|
||||||
so-eval: *autoEnabledSigmaRules
|
so-eval: *autoEnabledSigmaRules
|
||||||
so-import: *autoEnabledSigmaRules
|
so-import: *autoEnabledSigmaRules
|
||||||
denyRegex:
|
|
||||||
description: 'Regex used to filter imported Sigma rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: sigma.html
|
|
||||||
communityRulesImportFrequencySeconds:
|
communityRulesImportFrequencySeconds:
|
||||||
description: 'How often to check for new Sigma rules (in seconds). This applies to both Community Rule Packages and any configured Git repos.'
|
description: 'How often to check for new Sigma rules (in seconds). This applies to both Community Rule Packages and any configured Git repos.'
|
||||||
global: True
|
global: True
|
||||||
@@ -199,21 +189,11 @@ soc:
|
|||||||
advanced: True
|
advanced: True
|
||||||
forcedType: int
|
forcedType: int
|
||||||
strelkaengine:
|
strelkaengine:
|
||||||
allowRegex:
|
|
||||||
description: 'Regex used to filter imported YARA rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: yara.html
|
|
||||||
autoEnabledYaraRules:
|
autoEnabledYaraRules:
|
||||||
description: 'YARA rules to automatically enable on initial import. Format is $Ruleset - for example, for the default shipped ruleset: securityonion-yara'
|
description: 'YARA rules to automatically enable on initial import. Format is $Ruleset - for example, for the default shipped ruleset: securityonion-yara'
|
||||||
global: True
|
global: True
|
||||||
advanced: True
|
advanced: True
|
||||||
helpLink: sigma.html
|
helpLink: sigma.html
|
||||||
denyRegex:
|
|
||||||
description: 'Regex used to filter imported YARA rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: yara.html
|
|
||||||
communityRulesImportFrequencySeconds:
|
communityRulesImportFrequencySeconds:
|
||||||
description: 'How often to check for new YARA rules (in seconds). This applies to both Community Rules and any configured Git repos.'
|
description: 'How often to check for new YARA rules (in seconds). This applies to both Community Rules and any configured Git repos.'
|
||||||
global: True
|
global: True
|
||||||
@@ -232,21 +212,19 @@ soc:
|
|||||||
helpLink: yara.html
|
helpLink: yara.html
|
||||||
airgap: *serulesRepos
|
airgap: *serulesRepos
|
||||||
suricataengine:
|
suricataengine:
|
||||||
allowRegex:
|
|
||||||
description: 'Regex used to filter imported Suricata rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: suricata.html
|
|
||||||
denyRegex:
|
|
||||||
description: 'Regex used to filter imported Suricata rules. Deny regex takes precedence over the Allow regex setting.'
|
|
||||||
global: True
|
|
||||||
advanced: True
|
|
||||||
helpLink: suricata.html
|
|
||||||
communityRulesImportFrequencySeconds:
|
communityRulesImportFrequencySeconds:
|
||||||
description: 'How often to check for new Suricata rules (in seconds).'
|
description: 'How often to check for new Suricata rules (in seconds).'
|
||||||
global: True
|
global: True
|
||||||
advanced: True
|
advanced: True
|
||||||
helpLink: suricata.html
|
helpLink: suricata.html
|
||||||
|
disableRegex:
|
||||||
|
description: A list of regular expressions used to automatically disable rules that match any of them. Each regular expression is tested against the rule's content.
|
||||||
|
global: True
|
||||||
|
forcedType: "[]string"
|
||||||
|
enableRegex:
|
||||||
|
description: A list of regular expressions used to automatically enable rules that match any of them. Each regular expression is tested against the rule's content.
|
||||||
|
global: True
|
||||||
|
forcedType: "[]string"
|
||||||
integrityCheckFrequencySeconds:
|
integrityCheckFrequencySeconds:
|
||||||
description: 'How often the Suricata integrity checker runs (in seconds). This verifies the integrity of deployed rules.'
|
description: 'How often the Suricata integrity checker runs (in seconds). This verifies the integrity of deployed rules.'
|
||||||
global: True
|
global: True
|
||||||
|
|||||||
Reference in New Issue
Block a user