Skip to content

Commit 25af0bc

Browse files
Update descriptions for Abuse.ch SSL Blacklist and rulesets
Clarified availability and default status of rulesets in Suricata configuration.
1 parent 45a86c9 commit 25af0bc

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

nids.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ Emerging Threats (ETOPEN/ETPRO)
137137
| https://www.proofpoint.com/us/threat-insight/et-pro-ruleset
138138
139139
Abuse.ch SSL Blacklist (ABUSECH-SSLBL)
140-
SSL certificate blacklist from Abuse.ch. Disabled by default.
140+
SSL certificate blacklist from Abuse.ch. Only available in non-Airgap, disabled by default.
141141

142142
| For more information, see:
143143
| https://sslbl.abuse.ch/
@@ -151,10 +151,10 @@ Suricata Metadata Rulesets
151151
When Suricata is configured as the metadata engine (instead of :ref:`zeek`), two additional rulesets become available:
152152

153153
SO_EXTRACTIONS
154-
Extraction rules that control which file types Suricata extracts from network traffic for analysis by :ref:`strelka`. This ruleset is **enabled by default** when Suricata is the metadata engine.
154+
Extraction rules that control which file types Suricata extracts from network traffic for analysis by :ref:`strelka`. This ruleset is imported and **enabled by default** when Suricata is the metadata engine.
155155

156156
SO_FILTERS
157-
Filter rules that control which metadata Suricata logs. Use these to reduce unnecessary metadata logging. This ruleset is **disabled by default** when Suricata is the metadata engine.
157+
Filter rules that control which metadata Suricata logs. Use these to reduce unnecessary metadata logging. This ruleset is imported but **disabled by default** when Suricata is the metadata engine.
158158

159159
Adding Additional Rulesets
160160
~~~~~~~~~~~~~~~~~~~~~~

0 commit comments

Comments
 (0)