After some hard team work, Stamus Networks is proud to announce the availability of SELKS 3.0RC1.
SELKS is both Live and installable Network Security Management ISO based on Debian implementing and focusing on a complete and ready to use Suricata IDS/IPS ecosystem with its own graphic rule manager. Stamus Networks is a proud member of the Open Source community and SELKS is released under GPLv3 license.
This is a the release candidate of a new major branch with an updated storage visualization stack and latest Suricata.
SELKS comes with 11 ready to use Kibana dashboards using more than 190 visualisations.
Please feel free to try it out, spread the word, feedback and let’s talk about SELKS 3.0.
To get you started (the download link is below this paragraph):
Once installed in order to upgrade all components follow the guide here.
Usage and logon credentials (OS user) – user: selks-user, password: selks-user (password in Live mode is live). The default root password is – StamusNetworks
Upon log in double click the Scirius icon on the desktop. Credentials are – user: selks-user, password: selks-user. In the left upper corner click the drop down menu and choose “ALL” dashboards. Choose default index(click on logstash-* and then the green star) as depicted below. Then choose “Dashboards” and choose your desired dashboards from the 11 available.
Stamus Networks is proud to announce the availability of Scirius 1.1.6. This new release brings interesting new features and a lot of bugfixes to our Suricata ruleset manager.
The main new features in release are:
The backup system adds a set of new commands to manage.py to backup and restore completely a Scirius instance.
scbackup will do a backup and
screstore will erase everything and restore latest backup. Backup can be done locally but it is also possible to use FTP, Dropbox or Amazon AWS to store and fetch backups.
On the usability feature side the most important is the support of thresholding. Scirius is now managing a
threshold.config that is used by Suricata to limit or suppress alert(s) for a signature under certain conditions. Easiest way to access this feature is to start from a rule page and look at new top source and destination tables:
The arrow down and the cross can be clicked to trigger edition of a form for a threshold (limit) or a suppression. For instance if you click on the cross, you will get something like:
If there is already a suppression activated for the network/IP, you get a warning:
Latest ruleset management feature is the handling of the new xbits and hostbits. When a rule is disable, all the rule sharing a flowbits, a xbits or a hostbits are also deactivated.
Scirius 1.1.6 may be a minor release for the number in term of features it adds a lots of things users were asking for. You can already get scirius 1.1.6 in latest amsterdam. And it will be part of SELKS 3.0 that will be available really soon.