You are not logged in.
Hi.
I am writing an assignment on using Snort as a part of a corporate network.
Which types of attacks, vulnerabilities etc. would you typically setup Snort to detect?
Thanks
Anda
Last edited by Anda (2009-07-14 09:51:09)
Offline
Snort has documentation that should provide answers to all of those questions in great detail.
Offline