Suricata can be configured to operate in three distinct ways depending on your security needs:
Active defense where the tool is placed "inline" to block malicious traffic automatically, dropping packets or resetting suspicious connections. SirCat's Tools
Generates detailed logs for protocols (HTTP, DNS, TLS), flow data, and file extractions, making it a powerful tool for post-incident forensics. Key Features Suricata can be configured to operate in three
Transaction pending. Do you want to get notified when it confirms?