| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
* ensure /var/log/snort/alert exists
|
| |
|
| |
|
| |
|
|
|
|
| |
Ticket #1155
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
information in the system logs so the Operator can guage how much ram Snort is using
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
* Remove hard coded BPF assumptions
|
|
|
|
| |
* Add associate snort alert to ip option (handy for large snort installations)
|
|
|
|
| |
* Add knob to turn off clickable urls in the snort alert tabs (handy for someone with thousands of alerts)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
* Increase net.bpf.bufsize to 20480
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
* Ignore items in the whitelist from port scanning
|
| |
|
| |
|
| |
|
|
|
|
| |
the road.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
overwritten.
|
| |
|
| |
|