@ericnix said in Suricata & Citrix Workspace:
@bmeeks Thanks for all your help with Suricata. I've noticed that my UDMP's network scanner triggers a lot of alerts shortly after midnight. I don't want to supress the alerts, but would like to block them by IP (10.0.1.1 is my router's address). I have the pass list checked to ignore gateway devices, which my router is listed as in pfSense.
Any suggestions on how to get these alerts to go away? Basically they're port scans.
No, if they trigger the rule they will continue to trigger rule. You can suppress alerts by source or destination IP if that helps. So if the port scan is triggered by a particular device in your network doing something legit, you can suppress the alert for that particular IP. Hover over the icons on the ALERTS tab and little tooltips will pop up showing you what each icon does. Under the SRC and DST columns there are icons for suppressing that alert (identified by the GID:SID combo) when the Source (SRC) or Destination (DST) IP address matches. So assuming your scanner machine has the IP 10.0.1.5, suppressing by Source IP would put a line in the Suppression List that basically says "when the source IP is 10.0.1.5, then don't fire this rule". Snort had the same feature if you used it. If not, consult the official Snort documentation and search for "rule thresholding". That is the official name for the suppression action.