You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add a filtering language to the core diverter that can detect flows to certain connections and just drop them.
Probably should just use the suricata format so we can consume rules from places like emerging threats. However, if this is too complex for quick release, just start off with something sufficient for catching and blocking connections made by the host OS. The reason for this goal is because Windows 10, despite locking down security and privacy settings, makes constant connections to MS servers and partners. For privacy sake, we want to have binary control of these. Must be able to permit Windows update communication.
The text was updated successfully, but these errors were encountered:
Add a filtering language to the core diverter that can detect flows to certain connections and just drop them.
Probably should just use the suricata format so we can consume rules from places like emerging threats. However, if this is too complex for quick release, just start off with something sufficient for catching and blocking connections made by the host OS. The reason for this goal is because Windows 10, despite locking down security and privacy settings, makes constant connections to MS servers and partners. For privacy sake, we want to have binary control of these. Must be able to permit Windows update communication.
The text was updated successfully, but these errors were encountered: