[Oisf-users] Suricata Logs

Cooper F. Nelson cnelson at ucsd.edu
Mon Jul 27 21:02:09 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

We are the largest employer in San Diego and this is exactly how our
deployment works!  Alerts average ~500k per day and occasionally go
above a million during busy periods.

If you are doing email alerts, the trick is to monitor the text alerts
and only forward those that match certain keywords to your on-call
handler.  For example, "TROJAN" and "checkin".

You can use a cron job to do this, or a program like logwatch.

- -Coop

On 7/27/2015 1:54 PM, Andreas Moe wrote:
> With regards to Alan Santos reply. With 20 suricata instances, and the
> posibility of massive amounts of events (everything that suricata can
> produce) email is in now way, form or fashion a good choice. Saying that
> this works for you since you are CSIRT is not a valid argument. This
> since CSIRTs can be anything from a 5 man company having one guy who
> thinks he knows how security / suricata / siem / irt works, to a
> coorparation with 500+ thousand employees.


- -- 
Cooper Nelson
Network Security Analyst
UCSD ACT Security Team
cnelson at ucsd.edu x41042
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJVtpxRAAoJEKIFRYQsa8FWJZAIAJRDR7EvBiPBVrgKERxZa3FA
nm457WNVyXhvGfx92nUIX3hrFZp6MSrupcCJ2JCby5P5NMXXxjxLLLbOcpHICqDt
HB1qh8xVEccKbRoAUMqlOLjHC7tb0gEq+GY+QW03ZNr/FdIZH0a0gHPmG/PPcCAM
j2KSYFUj65HNFegnGp3YHyUlfeGEFzhYgzZ8pxYcFPqebvHY5Ce/tTznfwa6b7wu
U1BZBCs4+XZinE7nbRXX/CxRN/v7MTULRDUtybIaBoqwMEz2n3NOI2hnXDMtR99O
f+zWPrCKeY+lr6QuDabYKYf9acCextaf9box+5QILNiZoq6nbBGWaUHD+lKq1aE=
=J2pm
-----END PGP SIGNATURE-----



More information about the Oisf-users mailing list