Suricata

How To Install Suricata on CentOS 8 Stream — step-by-step Linux tutorial on Progressive Robot

How To Install Suricata on CentOS 8 Stream

Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events, trigger alerts, and drop traffic…

Read more
How To Install Suricata on Debian 11 — step-by-step Linux tutorial on Progressive Robot

How To Install Suricata on Debian 11

Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events, trigger alerts, and drop traffic…

Read more
How To Install Suricata on Rocky Linux 8 — step-by-step Linux tutorial on Progressive Robot

How To Install Suricata on Rocky Linux 8

Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. In this tutorial you will learn how to install Suricata, and how to customize some of its default settings on Rocky Linux 8 to suit your needs.

Read more
How To Install Suricata on Ubuntu 20.04 — step-by-step Linux tutorial on Progressive Robot

How To Install Suricata on Ubuntu 20.04

Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events, trigger alerts, and drop traffic when it detects suspicious packets or requests to any number of different services running on a server.

Read more
Understanding Suricata Signatures — step-by-step Security tutorial on Progressive Robot

Understanding Suricata Signatures

In this tutorial you’ll learn how Suricata signatures are structured, and some important options that are commonly used in most rules. Once you are familiar with how to understand the structure and fields in a signature, you’ll be able to write your own signatures that you can combine with a firewall to alert you about most suspicious traffic to your servers, without needing to use other external rulesets.

Read more
CHAT