Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-54692
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
1-54691
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
1-54690
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
1-54689
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
1-54688
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
1-54687
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.