|
This chapter provided practical knowledge of the open-source IDS Snort, and how it can help you with your security concerns. You learned about the history of Snort, how the Snort architecture works, and system requirements.
Additionally, you learned about Snort's different uses. These include using Snort as a packet sniffer, a packet logger, and an IDS. You also learned about some pitfalls with Snort, including false positives.
Finally, this chapter touched on some security considerations you should have when running a Snort system. It's critical to keep the system as secure as possible, especially as an active packet logger or IDS.
|