--- /dev/null
+Rule Management with Suricata-Update
+====================================
+
+.. note:: ``suricata-update`` is in active development and is not yet
+ considered 'production quality'. Proceed with care.
+
+While it is possible to download and install rules manually, it is
+recommended to use a management tool for this. Suricata-Update is the
+official way to update and manage rules for Suricata.
+
+
+To install suricata-update
+
+::
+
+ sudo apt install python-pip python-yaml
+ sudo pip install --pre --upgrade suricata-update
+
+To download the Emerging Threats Open ruleset, it is enough to simply run:
+
+::
+
+ sudo suricata-update
+
+This will download the ruleset into /var/lib/suricata/rules/
+
+Suricata's configuration will have to be updated to have a rules config like
+this:
+
+::
+
+ default-rule-path: /var/lib/suricata/rules
+ rule-files:
+ - suricata.rules
+
+Now (re)start Suricata.
+
+
+Updating your rules
+~~~~~~~~~~~~~~~~~~~
+
+To update the rules, simply run
+
+::
+
+ sudo suricata-update
+
+It is recommended to update your rules frequently.
+
+
+Using other rulesets
+~~~~~~~~~~~~~~~~~~~~
+
+Suricata-Update is capable of making other rulesets accessible as well.
+
+To see what is available, fetch the master index from the OISF hosts:
+
+::
+
+ sudo suricata-update update-sources
+
+Then have a look at what is available:
+
+::
+
+ sudo suricata-update list-sources
+
+This will give a result similar to
+
+.. image:: suricata-update/suricata-update.png
+
+To enable 'oisf/trafficid', enter:
+
+::
+
+ sudo suricata-update enable-source oisf/trafficid
+ sudo suricata-update
+
+Now restart Suricata again and the rules from the OISF TrafficID ruleset are loaded.
+
+To see which rulesets are currently active, use "list-enabled-sources".
+
+Controlling which rules are used
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+By default suricata-update will merge all rules into a single file
+"/var/lib/suricata/rules/suricata.rules".
+
+To enable rules that are disabled by default, use '/etc/suricata/enable.conf'
+
+::
+
+ 2019401 # enable this sid
+ group:emerging-icmp.rules # enable this rulefile
+ re:trojan # enable all rules with this string
+
+
+Similarly, to disable rules use /etc/suricata/disable.conf:
+
+::
+
+ 2019401 # enable this sid
+ group:emerging-info.rules # disable this rulefile
+ re:heartbleed # disable all rules with this string
+
+After updating these files, rerun ``suricata-update`` again:
+
+::
+
+ sudo suricata-update
+
+Finally restart Suricata.
+
+Further reading
+~~~~~~~~~~~~~~~
+
+See http://suricata-update.readthedocs.io/en/latest/