I would say it is up to you. There are a few options:
- create a suppression or threshold for that IP for that alert in Scirius
- you can create a "pass" rule and custom add it through a file in Scirius
- you can disable that rule SID
...
I would do the first one. Go to Scirius - Suricata tab. Find the
"Sid", click and the look for the src or dst IP - 78.46.53.11 , click
on the "x" (cross) mark right next to it and "Add Suppress".
Update the ruleset/Suricata afterwards - that should do the trick.
> Thank you,
>
> --
> IRC: Let's talk about SELKS on Freenode IRC on the #SELKS channel
> Wiki:
https://github.com/StamusNetworks/SELKS/wiki
> GitHub:
https://github.com/StamusNetworks/SELKS
> Blog:
https://www.stamus-networks.com/theblog/
> Twitter: @StamusN
> g+: Stamus Networks
> ---
> You received this message because you are subscribed to the Google Groups
> "SELKS" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
selks+un...@googlegroups.com.
> To post to this group, send email to
se...@googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.
--
Regards,
Peter Manev