@R3dH00d Among the things I'm thinking about doing: running host intrusion on all computers (right now, all user machines are Windows machines running Malwarebytes and Windows Defender); tuning Security Onion rules further (the professional Emerging Threats database is too expensive, though); maybe taking management off of a VLAN and running it truly out-of-band with a separate internet connection
@R3dH00d I'm unsure as to whether other IDS databases (such as Snort rules) can be used with Suricata in Security Onion