Vulnerability Based Snort IDS Management
by Ron Gula on September 14, 2006
For several years, Tenable's management products have been able to perform realtime correlation of IDS events with existing vulnerabilities and to also "push" just the relevant signatures to your Snort sensors. This entry will briefly discuss the advantages of IDS event and vulnerability correlation and then will walk a user through the deployment of the IDSUpdate script for managing Snort sensor rule configurations.
Accurate IDS Event Correlation with Vulnerabilities