diff --git a/salt/idstools/soc_idstools.yaml b/salt/idstools/soc_idstools.yaml index 3e3a68117..0a2bf0cbf 100644 --- a/salt/idstools/soc_idstools.yaml +++ b/salt/idstools/soc_idstools.yaml @@ -9,7 +9,7 @@ idstools: forcedType: string helpLink: rules.html ruleset: - description: 'Defines the ruleset you want to run. Options are ETOPEN or ETPRO. WARNING! Changing the ruleset will remove all existing Suricata rules of the previous ruleset and their associated overrides. This removal cannot be undone.' + description: 'Defines the ruleset you want to run. Options are ETOPEN or ETPRO. Once you have changed the ruleset here, you will need to wait for the rule update to take place (every 8 hours), or you can force the update by nagivating to Detections --> Options dropdown menu --> Suricata --> Full Update. WARNING! Changing the ruleset will remove all existing Suricata rules of the previous ruleset and their associated overrides. This removal cannot be undone.' global: True regex: ETPRO\b|ETOPEN\b helpLink: rules.html diff --git a/salt/soc/defaults.yaml b/salt/soc/defaults.yaml index cf51c07fd..b8fcf0581 100644 --- a/salt/soc/defaults.yaml +++ b/salt/soc/defaults.yaml @@ -1253,7 +1253,7 @@ soc: - core+critical - securityonion-resources+critical - securityonion-resources+high - communityRulesImportFrequencySeconds: 86400 + communityRulesImportFrequencySeconds: 28800 denyRegex: '' elastAlertRulesFolder: /opt/sensoroni/elastalert reposFolder: /opt/sensoroni/sigma/repos @@ -1311,7 +1311,7 @@ soc: strelkaengine: allowRegex: '' autoUpdateEnabled: true - communityRulesImportFrequencySeconds: 86400 + communityRulesImportFrequencySeconds: 28800 compileYaraPythonScriptPath: /opt/so/conf/strelka/compile_yara.py denyRegex: '' reposFolder: /opt/sensoroni/yara/repos @@ -1323,7 +1323,7 @@ soc: suricataengine: allowRegex: '' autoUpdateEnabled: true - communityRulesImportFrequencySeconds: 86400 + communityRulesImportFrequencySeconds: 28800 communityRulesFile: /nsm/rules/suricata/emerging-all.rules denyRegex: '' rulesFingerprintFile: /opt/sensoroni/fingerprints/emerging-all.fingerprint diff --git a/salt/soc/soc_soc.yaml b/salt/soc/soc_soc.yaml index ed9acc47a..42b80a3f0 100644 --- a/salt/soc/soc_soc.yaml +++ b/salt/soc/soc_soc.yaml @@ -110,7 +110,7 @@ soc: forcedType: "[]{}" helpLink: sigma.html sigmaRulePackages: - description: 'Defines the Sigma Community Ruleset you want to run. One of these (core | core+ | core++ | all ) as well as an optional Add-on (emerging_threats_addon). WARNING! Changing the ruleset will remove all existing Sigma rules of the previous ruleset and their associated overrides. This removal cannot be undone.' + description: 'Defines the Sigma Community Ruleset you want to run. One of these (core | core+ | core++ | all ) as well as an optional Add-on (emerging_threats_addon). Once you have changed the ruleset here, you will need to wait for the rule update to take place (every 8 hours), or you can force the update by nagivating to Detections --> Options dropdown menu --> Elastalert --> Full Update. WARNING! Changing the ruleset will remove all existing Sigma rules of the previous ruleset and their associated overrides. This removal cannot be undone.' global: True advanced: False helpLink: sigma.html