Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Most important snort rules?

    Scheduled Pinned Locked Moved General pfSense Questions
    4 Posts 2 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      guillotine
      last edited by

      Hello, I lack memory to activate all snort rules that I'd like to.
      My Pfsense protect a network in which users should be free to use any internet services freely. But I'd like it to be secure.
      What are the 2 ou 3 most important rules to activate in that case.
      Thanks.

      1 Reply Last reply Reply Quote 0
      • Cry HavokC
        Cry Havok
        last edited by

        The ones applicable to your environment  ;)

        The answer isn't a simple one, and the fact that you've said nothing about your network means nobody can really help you.  If you are really limited to only a few rules then you need to sit down with somebody with a clue, explain your network and your concerns and work with them to highlight your top risks.  From there they can help you identify the most appropriate rules for you.

        Of course, with only a few rules the odds of your catching malicious behaviour pretty much drops to zero.

        1 Reply Last reply Reply Quote 0
        • G
          guillotine
          last edited by

          Thanks for you answer. What information should I provide ?
          Basically it is a home network.

          1 Reply Last reply Reply Quote 0
          • Cry HavokC
            Cry Havok
            last edited by

            With emphasis

            @Cry:

            If you are really limited to only a few rules then you need to sit down with somebody with a clue, explain your network and your concerns and work with them to highlight your top risks.  From there they can help you identify the most appropriate rules for you.

            You'll need diagrams, details of applications and operating systems (including versions and patch levels), what the network is used for (web browsing, email, etc) and what your concerns are.

            Re-read the last sentence in my previous post though before you go wasting your time.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.