When a 'Drop' rule is triggered in the log the Search Time Extraction for the signature_id field is "Drop" rather than the actual signature_id.. Can this be easily addressed?
As in the following sample raw syslog event:
Jan 01 00:00:00 hostname suricata[5947]: [Drop] [1:2018959:4] ET POLICY PE EXE or DLL Windows file download HTTP [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} n.n.n.n:80 -> n.n.n.n:62636
When a 'Drop' rule is triggered in the log the Search Time Extraction for the signature_id field is "Drop" rather than the actual signature_id.. Can this be easily addressed?
As in the following sample raw syslog event:
Jan 01 00:00:00 hostname suricata[5947]: [Drop] [1:2018959:4] ET POLICY PE EXE or DLL Windows file download HTTP [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} n.n.n.n:80 -> n.n.n.n:62636