mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-04-25 05:57:49 +02:00
Move In Day
This commit is contained in:
+17
-320
@@ -20,21 +20,18 @@ suricata:
|
||||
port-groups:
|
||||
HTTP_PORTS: "80"
|
||||
SHELLCODE_PORTS: "!80"
|
||||
ORACLE_PORTS: 1521
|
||||
SSH_PORTS: 22
|
||||
DNP3_PORTS: 20000
|
||||
MODBUS_PORTS: 502
|
||||
ORACLE_PORTS: "1521"
|
||||
SSH_PORTS: "22"
|
||||
DNP3_PORTS: "20000"
|
||||
MODBUS_PORTS: "502"
|
||||
FILE_DATA_PORTS: "[$HTTP_PORTS,110,143]"
|
||||
FTP_PORTS: 21
|
||||
VXLAN_PORTS: 4789
|
||||
TEREDO_PORTS: 3544
|
||||
FTP_PORTS: "21"
|
||||
VXLAN_PORTS: "4789"
|
||||
TEREDO_PORTS: "3544"
|
||||
default-log-dir: /var/log/suricata/
|
||||
stats:
|
||||
enabled: "yes"
|
||||
interval: 30
|
||||
#decoder-events: true
|
||||
#decoder-events-prefix: "decoder.event"
|
||||
#stream-events: false
|
||||
outputs:
|
||||
- fast:
|
||||
enabled: "no"
|
||||
@@ -45,20 +42,6 @@ suricata:
|
||||
filetype: regular
|
||||
filename: /nsm/eve-%Y-%m-%d-%H:%M.json
|
||||
rotate-interval: hour
|
||||
#prefix: "@cee: "
|
||||
#identity: "suricata"
|
||||
#facility: local5
|
||||
#level: Info
|
||||
#redis:
|
||||
# server: 127.0.0.1
|
||||
# port: 6379
|
||||
# async: true
|
||||
# mode: list
|
||||
# key: suricata
|
||||
# pipelining:
|
||||
# enabled: "yes"
|
||||
# batch-size: 10
|
||||
#metadata: "no"
|
||||
pcap-file: false
|
||||
community-id: true
|
||||
community-id-seed: 0
|
||||
@@ -79,8 +62,6 @@ suricata:
|
||||
rule:
|
||||
metadata: true
|
||||
raw: true
|
||||
# http-body: "yes"
|
||||
# http-body-printable: "yes"
|
||||
tagged-packets: "no"
|
||||
- unified2-alert:
|
||||
enabled: "no"
|
||||
@@ -88,41 +69,26 @@ suricata:
|
||||
enabled: "no"
|
||||
filename: http.log
|
||||
append: "yes"
|
||||
#extended: "yes"
|
||||
#custom: "yes"
|
||||
#customformat: ""
|
||||
#filetype: regular
|
||||
- tls-log:
|
||||
enabled: "no"
|
||||
filename: tls.log
|
||||
append: "yes"
|
||||
#extended: "yes"
|
||||
#custom: "yes"
|
||||
#customformat: ""
|
||||
#filetype: regular
|
||||
#session-resumption: "no"
|
||||
- tls-store:
|
||||
enabled: "no"
|
||||
#certs-log-dir: certs
|
||||
- pcap-log:
|
||||
enabled: "no"
|
||||
filename: log.pcap
|
||||
limit: 1000mb
|
||||
max-files: 2000
|
||||
compression: none
|
||||
#lz4-checksum: "no"
|
||||
#lz4-level: 0
|
||||
|
||||
|
||||
mode: normal
|
||||
#dir: /nsm_data/
|
||||
#ts-format: usec
|
||||
use-stream-depth: "no"
|
||||
honor-pass-rules: "no"
|
||||
- alert-debug:
|
||||
enabled: "no"
|
||||
filename: alert-debug.log
|
||||
append: "yes"
|
||||
#filetype: regular
|
||||
- alert-prelude:
|
||||
enabled: "no"
|
||||
profile: suricata
|
||||
@@ -137,20 +103,12 @@ suricata:
|
||||
null-values: "yes"
|
||||
- syslog:
|
||||
enabled: "no"
|
||||
#identity: "suricata"
|
||||
facility: local5
|
||||
#level: Info
|
||||
- drop:
|
||||
enabled: "no"
|
||||
- file-store:
|
||||
version: 2
|
||||
enabled: "no"
|
||||
#dir: filestore
|
||||
#write-fileinfo: "yes"
|
||||
#force-filestore: "yes"
|
||||
#stream-depth: 0
|
||||
#max-open-files: 1000
|
||||
#force-hash: [sha1, md5]
|
||||
xff:
|
||||
enabled: "no"
|
||||
mode: extra-data
|
||||
@@ -166,36 +124,23 @@ suricata:
|
||||
filename: http-data.log
|
||||
- lua:
|
||||
enabled: "no"
|
||||
#scripts-dir: /etc/suricata/lua-output/
|
||||
scripts:
|
||||
# - script1.lua
|
||||
logging:
|
||||
default-log-level: notice
|
||||
#default-log-format: "[%i] %t - (%f:%l) <%d> (%n) -- "
|
||||
outputs:
|
||||
- console:
|
||||
enabled: "yes"
|
||||
# type: json
|
||||
- file:
|
||||
enabled: "yes"
|
||||
level: info
|
||||
filename: suricata.log
|
||||
# type: json
|
||||
- syslog:
|
||||
enabled: "no"
|
||||
facility: local5
|
||||
format: "[%i] <%d> -- "
|
||||
# type: json
|
||||
pcap:
|
||||
- interface: eth0
|
||||
#buffer-size: 16777216
|
||||
#bpf-filter: "tcp and port 25"
|
||||
#checksum-checks: auto
|
||||
#threads: 16
|
||||
#promisc: "no"
|
||||
#snaplen: 1518
|
||||
- interface: default
|
||||
#checksum-checks: auto
|
||||
pcap-file:
|
||||
checksum-checks: auto
|
||||
app-layer:
|
||||
@@ -210,13 +155,10 @@ suricata:
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 443
|
||||
#ja3-fingerprints: auto
|
||||
#encryption-handling: default
|
||||
dcerpc:
|
||||
enabled: "yes"
|
||||
ftp:
|
||||
enabled: "yes"
|
||||
# memcap: 64mb
|
||||
rdp:
|
||||
enabled: "yes"
|
||||
ssh:
|
||||
@@ -241,16 +183,14 @@ suricata:
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 139, 445
|
||||
#stream-depth: 0
|
||||
|
||||
nfs:
|
||||
enabled: "yes"
|
||||
tftp:
|
||||
enabled: "yes"
|
||||
dns:
|
||||
#global-memcap: 16mb
|
||||
#state-memcap: 512kb
|
||||
#request-flood: 500
|
||||
global-memcap: 16mb
|
||||
state-memcap: 512kb
|
||||
request-flood: 500
|
||||
tcp:
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
@@ -261,14 +201,6 @@ suricata:
|
||||
dp: 53
|
||||
http:
|
||||
enabled: "yes"
|
||||
# memcap:
|
||||
# default-config:
|
||||
# personality:
|
||||
# request-body-limit:
|
||||
# response-body-limit:
|
||||
# server-config:
|
||||
# address:
|
||||
# personalitiy:
|
||||
libhtp:
|
||||
default-config:
|
||||
personality: IDS
|
||||
@@ -280,49 +212,25 @@ suricata:
|
||||
response-body-inspect-window: 16kb
|
||||
response-body-decompress-layer-limit: 2
|
||||
http-body-inline: auto
|
||||
# compress-depth:
|
||||
# decompress-depth:
|
||||
swf-decompression:
|
||||
enabled: "yes"
|
||||
type: both
|
||||
compress-depth: 0
|
||||
decompress-depth: 0
|
||||
#randomize-inspection-sizes: "yes"
|
||||
#randomize-inspection-range: 10
|
||||
double-decode-path: "no"
|
||||
double-decode-query: "no"
|
||||
#lzma-enabled: "yes"
|
||||
#lzma-memlimit: 1mb
|
||||
#compression-bomb-limit: 1mb
|
||||
server-config:
|
||||
#- apache:
|
||||
# address: [192.168.1.0/24, 127.0.0.0/8, "::1"]
|
||||
# personality: Apache_2
|
||||
# request-body-limit: 4096
|
||||
# response-body-limit: 4096
|
||||
# double-decode-path: "no"
|
||||
# double-decode-query: "no"
|
||||
#- iis7:
|
||||
# address:
|
||||
# - 192.168.0.0/24
|
||||
# - 192.168.10.0/24
|
||||
# personality: IIS_7_0
|
||||
# request-body-limit: 4096
|
||||
# response-body-limit: 4096
|
||||
# double-decode-path: "no"
|
||||
# double-decode-query: "no"
|
||||
modbus:
|
||||
#request-flood: 500
|
||||
enabled: "no"
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 502
|
||||
stream-depth: 0
|
||||
dnp3:
|
||||
enabled: "no"
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 20000
|
||||
enip:
|
||||
enabled: "no"
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 44818
|
||||
sp: 44818
|
||||
@@ -332,42 +240,20 @@ suricata:
|
||||
enabled: "yes"
|
||||
sip:
|
||||
enabled: "yes"
|
||||
rfb:
|
||||
enabled: "yes"
|
||||
detection-ports:
|
||||
dp: 5900, 5901, 5902, 5903, 5904, 5905, 5906, 5907, 5908, 5909
|
||||
mqtt:
|
||||
enabled: "no"
|
||||
http2:
|
||||
enabled: "no"
|
||||
|
||||
asn1-max-frames: 256
|
||||
run-as:
|
||||
user: suricata
|
||||
group: suricata
|
||||
#sensor-name: suricata
|
||||
#pid-file: /var/run/suricata.pid
|
||||
#daemon-directory: "/"
|
||||
#umask: 022
|
||||
coredump:
|
||||
max-dump: unlimited
|
||||
host-mode: auto
|
||||
max-pending-packets: 5000
|
||||
runmode: workers
|
||||
#autofp-scheduler: hash
|
||||
default-packet-size: 1500
|
||||
default-packet-size: 9014
|
||||
unix-command:
|
||||
enabled: auto
|
||||
#filename: custom.socket
|
||||
#magic-file: /usr/share/file/magic
|
||||
#magic-file:
|
||||
#geoip-database: /usr/local/share/GeoLite2/GeoLite2-Country.mmdb
|
||||
legacy:
|
||||
uricontent: enabled
|
||||
#reputation-categories-file: /etc/suricata/iprep/categories.txt
|
||||
#default-reputation-path: /etc/suricata/iprep
|
||||
#reputation-files:
|
||||
# - reputation.list
|
||||
engine-analysis:
|
||||
rules-fast-pattern: "yes"
|
||||
rules: "yes"
|
||||
@@ -400,8 +286,6 @@ suricata:
|
||||
hash-size: 65536
|
||||
prealloc: 10000
|
||||
emergency-recovery: 30
|
||||
#managers: 1
|
||||
#recyclers: 1
|
||||
vlan:
|
||||
use-for-tracking: true
|
||||
flow-timeouts:
|
||||
@@ -447,18 +331,10 @@ suricata:
|
||||
toserver-chunk-size: 2560
|
||||
toclient-chunk-size: 2560
|
||||
randomize-chunk-size: "yes"
|
||||
#randomize-chunk-range: 10
|
||||
#raw: "yes"
|
||||
#segment-prealloc: 2048
|
||||
#check-overlap-different-data: true
|
||||
host:
|
||||
hash-size: 4096
|
||||
prealloc: 1000
|
||||
memcap: 32mb
|
||||
#ippair:
|
||||
# hash-size: 4096
|
||||
# prealloc: 1000
|
||||
# memcap: 32mb
|
||||
decoder:
|
||||
teredo:
|
||||
enabled: true
|
||||
@@ -467,6 +343,7 @@ suricata:
|
||||
enabled: true
|
||||
ports: $VXLAN_PORTS
|
||||
erspan:
|
||||
enabled: true
|
||||
detect:
|
||||
profile: medium
|
||||
custom-values:
|
||||
@@ -474,15 +351,10 @@ suricata:
|
||||
toserver-groups: 25
|
||||
sgh-mpm-context: auto
|
||||
inspection-recursion-limit: 3000
|
||||
#delayed-detect: "yes"
|
||||
prefilter:
|
||||
default: mpm
|
||||
grouping:
|
||||
#tcp-whitelist: 53, 80, 139, 443, 445, 1433, 3306, 3389, 6666, 6667, 8080
|
||||
#udp-whitelist: 53, 135, 5060
|
||||
|
||||
profiling:
|
||||
#inspect-logging-threshold: 200
|
||||
grouping:
|
||||
dump-to-disk: false
|
||||
include-rules: false
|
||||
@@ -496,12 +368,10 @@ suricata:
|
||||
states: 128
|
||||
|
||||
profiling:
|
||||
#sample-rate: 1000
|
||||
rules:
|
||||
enabled: "yes"
|
||||
filename: rule_perf.log
|
||||
append: "yes"
|
||||
#sort: avgticks
|
||||
limit: 10
|
||||
json: "yes"
|
||||
keywords:
|
||||
@@ -534,14 +404,6 @@ suricata:
|
||||
filename: pcaplog_stats.log
|
||||
append: "yes"
|
||||
nfq:
|
||||
# mode: accept
|
||||
# repeat-mark: 1
|
||||
# repeat-mask: 1
|
||||
# bypass-mark: 1
|
||||
# bypass-mask: 1
|
||||
# route-queue: 2
|
||||
# batchcount: 20
|
||||
# fail-open: "yes"
|
||||
nflog:
|
||||
- group: 2
|
||||
buffer-size: 18432
|
||||
@@ -550,178 +412,13 @@ suricata:
|
||||
qtimeout: 100
|
||||
max-size: 20000
|
||||
capture:
|
||||
#checksum-validation: none
|
||||
netmap:
|
||||
- interface: eth2
|
||||
#threads: auto
|
||||
#copy-mode: tap
|
||||
#copy-iface: eth3
|
||||
# disable-promisc: "no"
|
||||
#checksum-checks: auto
|
||||
#bpf-filter: port 80 or udp
|
||||
#- interface: eth3
|
||||
#threads: auto
|
||||
#copy-mode: tap
|
||||
#copy-iface: eth2
|
||||
- interface: default
|
||||
pfring:
|
||||
- interface: eth0
|
||||
threads: auto
|
||||
cluster-id: 99
|
||||
cluster-type: cluster_flow
|
||||
#bpf-filter: tcp
|
||||
#bypass: "yes"
|
||||
#checksum-checks: auto
|
||||
#- interface: eth1
|
||||
# threads: 3
|
||||
# cluster-id: 93
|
||||
# cluster-type: cluster_flow
|
||||
- interface: default
|
||||
#threads: 2
|
||||
ipfw:
|
||||
# ipfw-reinjection-rule-number: 5500
|
||||
napatech:
|
||||
#hba: -1
|
||||
#use-all-streams: "no"
|
||||
streams: ["0-3"]
|
||||
auto-config: "yes"
|
||||
ports: [all]
|
||||
hashmode: hash5tuplesorted
|
||||
default-rule-path: /etc/suricata/rules
|
||||
rule-files:
|
||||
- all.rules
|
||||
classification-file: /etc/suricata/classification.config
|
||||
reference-config-file: /etc/suricata/reference.config
|
||||
threshold-file: /etc/suricata/threshold.conf
|
||||
#include: include1.yaml
|
||||
#include: include2.yaml
|
||||
classification:
|
||||
attempted-admin:
|
||||
description: Attempted Administrator Privilege Gain
|
||||
priority: 1
|
||||
attempted-dos:
|
||||
description: Attempted Denial of Service
|
||||
priority: 2
|
||||
attempted-recon:
|
||||
description: Attempted Information Leak
|
||||
priority: 2
|
||||
attempted-user:
|
||||
description: Attempted User Privilege Gain
|
||||
priority: 1
|
||||
bad-unknown:
|
||||
description: Potentially Bad Traffic
|
||||
priority: 2
|
||||
coin-mining:
|
||||
description: Crypto Currency Mining Activity Detected
|
||||
priority: 2
|
||||
command-and-control:
|
||||
description: Malware Command and Control Activity Detected
|
||||
priority: 1
|
||||
credential-theft:
|
||||
description: Successful Credential Theft Detected
|
||||
priority: 1
|
||||
default-login-attempt:
|
||||
description: Attempt to login by a default username and password
|
||||
priority: 2
|
||||
denial-of-service:
|
||||
description: Detection of a Denial of Service Attack
|
||||
priority: 2
|
||||
domain-c2:
|
||||
description: Domain Observed Used for C2 Detected
|
||||
priority: 1
|
||||
exploit-kit:
|
||||
description: Exploit Kit Activity Detected
|
||||
priority: 1
|
||||
external-ip-check:
|
||||
description: Device Retrieving External IP Address Detected
|
||||
priority: 2
|
||||
icmp-event:
|
||||
description: Generic ICMP event
|
||||
priority: 3
|
||||
inappropriate-content:
|
||||
description: Inappropriate Content was Detected
|
||||
priority: 1
|
||||
misc-activity:
|
||||
description: Misc activity
|
||||
priority: 3
|
||||
misc-attack:
|
||||
description: Misc Attack
|
||||
priority: 2
|
||||
network-scan:
|
||||
description: Detection of a Network Scan
|
||||
priority: 3
|
||||
non-standard-protocol:
|
||||
description: Detection of a non-standard protocol or event
|
||||
priority: 2
|
||||
not-suspicious:
|
||||
description: Not Suspicious Traffic
|
||||
priority: 3
|
||||
policy-violation:
|
||||
description: Potential Corporate Privacy Violation
|
||||
priority: 1
|
||||
protocol-command-decode:
|
||||
description: Generic Protocol Command Decode
|
||||
priority: 3
|
||||
pup-activity:
|
||||
description: Possibly Unwanted Program Detected
|
||||
priority: 2
|
||||
rpc-portmap-decode:
|
||||
description: Decode of an RPC Query
|
||||
priority: 2
|
||||
shellcode-detect:
|
||||
description: Executable code was detected
|
||||
priority: 1
|
||||
social-engineering:
|
||||
description: Possible Social Engineering Attempted
|
||||
priority: 2
|
||||
string-detect:
|
||||
description: A suspicious string was detected
|
||||
priority: 3
|
||||
successful-admin:
|
||||
description: Successful Administrator Privilege Gain
|
||||
priority: 1
|
||||
successful-dos:
|
||||
description: Denial of Service
|
||||
priority: 2
|
||||
successful-recon-largescale:
|
||||
description: Large Scale Information Leak
|
||||
priority: 2
|
||||
successful-recon-limited:
|
||||
description: Information Leak
|
||||
priority: 2
|
||||
successful-user:
|
||||
description: Successful User Privilege Gain
|
||||
priority: 1
|
||||
suspicious-filename-detect:
|
||||
description: A suspicious filename was detected
|
||||
priority: 2
|
||||
suspicious-login:
|
||||
description: An attempted login using a suspicious username was detected
|
||||
priority: 2
|
||||
system-call-detect:
|
||||
description: A system call was detected
|
||||
priority: 2
|
||||
targeted-activity:
|
||||
description: Targeted Malicious Activity was Detected
|
||||
priority: 1
|
||||
tcp-connection:
|
||||
description: A TCP connection was detected
|
||||
priority: 4
|
||||
trojan-activity:
|
||||
description: A Network Trojan was detected
|
||||
priority: 1
|
||||
unknown:
|
||||
description: Unknown Traffic
|
||||
priority: 3
|
||||
unsuccessful-user:
|
||||
description: Unsuccessful User Privilege Gain
|
||||
priority: 1
|
||||
unusual-client-port-connection:
|
||||
description: A client was using an unusual port
|
||||
priority: 2
|
||||
web-application-activity:
|
||||
description: access to a potentially vulnerable web application
|
||||
priority: 2
|
||||
web-application-attack:
|
||||
description: Web Application Attack
|
||||
priority: 1
|
||||
threshold-file: /etc/suricata/threshold.conf
|
||||
Reference in New Issue
Block a user