We are currently running snort as IDS/IPS on some of our firewalls. Is there a "comfortable" way of analysing snort's output-messages (Unified2-format) to have a nice looking integration withinin PRTG? I tried using the syslog-messages, but by using them we only get a table of those messages and not an analysis of what is really going on.
Any suggestions?
Add comment