doc: improve making sense of alerts

pull/3321/head
Victor Julien 8 years ago
parent ccde621ceb
commit ac1ed24cb4

@ -54,24 +54,24 @@ search engine.
It's not always straight forward and sometimes not all of that
information is available publicly. Usually asking about it on the
signature support lists helps a lot then.
signature support channel helps a lot then.
For the Emerging Threats list this is:
http://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
For the VRT ruleset:
https://lists.sourceforge.net/lists/listinfo/snort-sigs
In :doc:`../rule-management/suricata-update` more information on the rule
sources and their documentation and support methods can be found.
In many cases, looking at just the alert and the packet that triggered
it won't be enough to be conclusive. When running an IDS engine like
Suricata, it's always recommended to combine it with full packet
capturing. Using tools like Sguil or Snorby, the full TCP session or
UDP flow can be inspected.
it won't be enough to be conclusive. When using the default Eve settings
a lot of metadata will be added to the alert.
For example, if a rule fired that indicates your web application is
attacked, looking at the full TCP session might reveal that the web
attacked, looking at the metadata might reveal that the web
application replied with 404 not found. This will usually mean the
attack failed. Usually, not always.
Not every protocol leads to metadata generation, so when running an
IDS engine like Suricata, it's often recommended to combine it with
full packet capture. Using tools like Evebox, Sguil or Snorby, the
full TCP session or UDP flow can be inspected.
Obviously there is a lot more to Incidence Response, but this should
get you started.

Loading…
Cancel
Save