IDSTOOLS Pillar Items

This commit is contained in:
Mike Reeves
2020-07-17 15:59:58 -04:00
parent d3529686cc
commit 693a101d34
4 changed files with 31 additions and 4 deletions

View File

@@ -982,7 +982,18 @@ manager_pillar() {
"pcap:">> "$pillar_file"\
" sensor_checkin_interval_ms: $SENSOR_CHECKIN_INTERVAL_MS"\
""\
"idstools:"\
" config:"\
" ruleset: $RULESETUP"\
" oinkcode: $OINKCODE"\
" url:"\
" sids:"\
" enabled:"\
" disabled:"\
" modify:"\
""
"kratos:" >> "$pillar_file"
printf '%s\n'\
" kratoskey: $KRATOSKEY"\

View File

@@ -576,7 +576,7 @@ whiptail_oinkcode() {
[ -n "$TESTING" ] && return
OINKCODE=$(whiptail --title "Security Onion Setup" --inputbox \
"Enter your oinkcode" 10 75 XXXXXXX 3>&1 1>&2 2>&3)
"Enter your ET Pro or oinkcode" 10 75 XXXXXXX 3>&1 1>&2 2>&3)
local exitstatus=$?
whiptail_check_exitstatus $exitstatus
@@ -956,8 +956,7 @@ whiptail_rule_setup() {
"Which IDS ruleset would you like to use?\n\nThis manager server is responsible for downloading the IDS ruleset from the Internet.\n\nSensors then pull a copy of this ruleset from the manager server.\n\nIf you select a commercial ruleset, it is your responsibility to purchase enough licenses for all of your sensors in compliance with your vendor's policies." 20 75 4 \
"ETOPEN" "Emerging Threats Open" ON \
"ETPRO" "Emerging Threats PRO" OFF \
"TALOSET" "Snort Subscriber (Talos) and ET NoGPL rulesets" OFF \
"TALOS" "Snort Subscriber (Talos) ruleset and set a policy" OFF \
"TALOS" "Snort Subscriber ruleset - Experimental" OFF \
3>&1 1>&2 2>&3)
local exitstatus=$?