A SIEM Solution Implementation: TEK-UP University
A SIEM Solution Implementation: TEK-UP University
implementation
Prepared By:
Kais Slimeni
Maher Hannachi
1
General Conclusion .............................................................................................................. 37
Bibliography......................................................................................................................... 38
2
Figures table
Figure 1 : SIEM in infrastructure ...........................................................................................6
Figure 2 : Indexing .................................................................................................................8
Figure 3 : Searching with indexes ...........................................................................................9
Figure 4 : Splunk Searching Language.................................................................................. 10
Figure 5 : Splunk Universal Forwarder ................................................................................. 12
Figure 6 : Universal forwarder installation ............................................................................ 12
Figure 7 : Config of the receiving server ............................................................................... 12
Figure 8 : Client 1 Monitored Files ....................................................................................... 13
Figure 9 : Client 3 monitored files ........................................................................................ 14
Figure 10 : Download windows Splunk universal forwarder ................................................. 14
Figure 11 : Windows Splunk universal forwarder installation ............................................... 15
Figure 12 : Windows logs to be forwarded............................................................................ 15
Figure 13 : Set the deployment server IP address .................................................................. 16
Figure 14 : Username creation .............................................................................................. 16
Figure 15 :Configure the receiving server IP address and the listen port ................................ 17
Figure 16 : Installation finished ............................................................................................ 17
Figure 17 : Splunk Downloading .......................................................................................... 18
Figure 18 : Username and password creation ........................................................................ 19
Figure 19 : Splunk web interface address .............................................................................. 19
Figure 20 : Splunk web page................................................................................................. 19
Figure 21 : Splunk server configuration ................................................................................ 20
Figure 22 : Splunk server listen port configuration................................................................ 20
Figure 23 : Received log from the three clients ..................................................................... 21
Figure 24 : Source of the received logs ................................................................................. 21
Figure 25 : Creation new index ............................................................................................. 22
Figure 26 : Linux & Windows indexes ................................................................................. 23
Figure 27 : Add new server class .......................................................................................... 24
Figure 28 : Add new clients .................................................................................................. 24
Figure 29 : Add new App to server class ............................................................................... 25
Figure 30 : Installed Apps..................................................................................................... 25
Figure 31 : Deploymentclient.conf file.................................................................................. 26
Figure 32 :Linux input.conf File .......................................................................................... 27
Figure 33 : Windows Evnet viewer ....................................................................................... 27
Figure 34 : Windows input.conf file...................................................................................... 28
Figure 35 : Windows Event Log Analysis App ..................................................................... 29
Figure 36 : App installation .................................................................................................. 29
Figure 37 : Windows log events dashboard ........................................................................... 30
Figure 38 : Alerts configuration ............................................................................................ 32
Figure 39 : Receive Email configuration ............................................................................... 33
3
Figure 40 : Alert rules created............................................................................................... 34
Figure 41 : Brute force attack on kali machine client ............................................................ 34
Figure 42 : Valid credentials found successfully ................................................................... 35
4
General Introduction
In today's global digital economy, monitoring and protecting your business data
from increasingly sophisticated cyber threats is essential. And it's a safe bet that
your business has more data to process than it has ever had before. for that, the
SIEM is created.
5
Chapter 1: SIEM
Introduction
In order to achieve a high level of cyber security awareness most mid to large sized
companies use Security Information and Event Management (SIEM) embedded into a Security
Operations Center. These systems enable the centralized collection and analysis of security
relevant information generated by a variety of different systems, to detect advanced threats and
to improve reaction time in case of an incident.
1.1 SIEM
1.1.1 SIEM Definition
SIEM stands for Security Information and Event Management or management of security
information and events. SIEM can be defined as real-time event collection, monitoring,
correlation, and analysis of events across disparate sources.
6
1.1.4 SIEM Process
SIEM collects security data from network devices, servers, domain controllers, and more.
Then it stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect
threats, and enable organizations to investigate any alerts.
7
Network and machine data can be monitored on a real-time basis as the system scours for
potential vulnerabilities and can even point to abnormal behavior. Enterprise Security’s Notables
function displays alerts that can be refined by the user.
Splunk captures indexes and correlates real-time data in a searchable repository from which it
can generate graphs, reports, alerts, dashboards, and visualizations.
▪ Admin
▪ Power
▪ User
Splunk indexes are where Splunk stores events data for searching. Splunk administrators will
often use multiple indexes to segregate data.
As an example, there might be an index for our web data and one for our security data.
Having users only search the index that contains the events they need can make search more
efficient.
Figure 3 : Indexing
8
▪ An administrator can also use indexes to limit access to specific roles for security reasons
or for web reasons
▪ Indexes are searched by using the field name of “index” and the name of index to search
as the field value. It’s possible to search multiple indexes at the same time.
By default, all external events go to the index called main. However, you might want to send
some events to other indexes. For example, you might want to route all data from a particular
input to its own index. Or you might want to segment data or send event data from a noisy source
to an index that is dedicated to receiving it.
To send events to a specific index, the index must already exist on the indexer. If you route
any events to an index that doesn't exist, the indexer will drop those events.
We can specify a keyword to start our searching like "fail* AND password 22”
9
Figure 5 : Splunk Searching Language
Click Search History to view your past search history. Unlike jobs, which save the results of
your search for a short time, here you only see your search criteria, which are saved for a long
time. You will often have many searches. You can filter by time or content to find a search.
Conclusion
SIEM products and services fulfill two functions: centralize security logs and reporting within
an organization, and assist in the detection, analysis, and control of security incidents. And to
reach that functions, we choose to implement and configure Splunk Enterprise on a virtual
environment.
10
Chapter 2 : Splunk Implementation
Introduction
In this chapter, we will present the conception of our project as Diagram to make easier its
comprehension and its presentation.
11
2.2 Splunk Universal Forwarder Installation
2.2.1 Client 1: Ubuntu machine
Extract it to the destination folder in the Ubuntu client machine with name “Linux” with the
command:
Once the installation was completed, the configuration of the receiving server with ip
192.168.205.150 done with the command line as mentioned with the below command.
To assure the event log monitoring, we configure the log type to be forwarded to the splunk
server. The files we want to monitor are:
12
o Syslog file
o Auth.log file
o Boot.log file
Configure kali machine to forward log to the Splunk server 192.168.205.150 with the
receiving port 8001
To assure the event log monitoring, we configure the log type to be forwarded to the splunk
server. The files we want to monitor are:
o Auth.log
o Syslog
o Messages
o Faillog
o Boot.log
13
Figure 10 : Client 3 monitored files
We Select the “Check this box“to accept the License Agreement check box.
14
Figure 12 : Windows Splunk universal forwarder installation
We enter the username and password into the Username and Password fields.
We select the windows event logs that we will monitor with splunk server
Also, we can monitor AD or to choose a specified file to monitor with file path.
15
Username and password creation
Username: kais
Password: ********
Set the deployment server IP address and port
16
We define the receiving splunk server IP address and the listen port
Figure 16 :Configure the receiving server IP address and the listen port
Installation finished
17
2.3 Splunk Server Installation
The first step is to download Splunk enterprise from the official website and extract it to the
destination folder in the server machine kali-hacking20 with the command:
To run Splunk, we use start command and we use the argument –accept-license to accept the
license under the folder /opt/splunk/bin
After accepting the licence agreements, a Username & password need to be created and keys
were generated
18
Username: kais
Password: *********
19
Configuration of the splunk server
Now we must go to the server machine to verify if it’s receives the logs.
20
Figure 24 : Received log from the three clients
The universal forwarders are connected to the Splunk server and forwards the logs.
21
2.4 Indexing
With the main menu, we create new indexes (windows & Linux) to stores events data for easy
searching and to segregate data.
22
Figure 27 : Linux & Windows indexes
We install the deployment server with 2 server class that can contains one or more machines
1. Linux_clients
2. Windows_clients
23
Figure 29 : Add new server class
After server class creation, we can edit it to add clients IP address to be monitor to the
whitelist as shown below:
24
Also, we can edit apps to select the app to be added to those machines in this server class.
25
2.6.1 Deploymentclient.conf file
Path: /opt/splunkforwarder/etc/system/local
2.6.2 Inputs.conf
You can use inputs.conf to monitor files and directories with Splunk Enterprise. Inputs.conf
provides the most configuration options for setting up a file monitor input.
Paths:
$SPLUNK_HOME/etc/deployment-apps/linux_logs/local/Inputs.conf
$SPLUNK_HOME/etc/deployment-apps/windows_logs/local/Inputs.conf
26
Figure 35 :Linux input.conf File
For windows we can use the default source type log specified into Event Viewer application
27
In our project, we specified just 3 windows event Log in inputs.conf file :
WinEventLog://Application
WinEventLog://Security
WinEventLog://System
28
2.7 Dashboard & Log Analysis
The Windows Event Log Analysis app provides an intuitive interface to the Windows event
logs collected by the Splunk Universal Forwarder for Windows
From Splunk search & reporting field we select “install app from file” to select the
downloaded file and then continue the installation procedure
After installation of Window Event Log Analysis App, a dashboard is created for ease
manage the received log events.
29
Figure 40 : Windows log events dashboard
30
- The dashboard shows Real time log analysis
- We can filter logs by time, for example we need just to analyze logs from the last week or
the last month
- We can export a PDF reports or to schedule a PDF delivery for example every midnight a
report sent to the responsible.
- We can also edit the locations of the displayed panels, add panel, move, maximize,
minimize, change colors, dark background or white background etc.
- As you see, the windows event log analysis parses the received log and filter it Errors
logs, warnings logs, informational logs, Audit, Failure logon
- You can see also a very important panel or a critical panel “Accounts with 3 or more
failed logons”, this panel shows us the number of the failed logon for each account, Atef
total attempts 32 attempts, we put our attention on Islam account, we see that this account
make a huge attempts number 119 attempts in the last short period,
We can pull out more details for this account by simple click on Islam account , as you see
that the source of the result is search with Splunk language, index where stored the events
of the client windows 10, the source of the events, the failure reason and the user, we can
find the time of each attempt and more details.
The parsing shows us that this account maybe in attack and a best practice should be
implemented like password hardening for example the account locked at 3 failed logon to
prevent the brute force attack.
- Top computers generating events: we can see here all monitored windows machine and
the percentage of the events generated by those machines.
Windows events over time: we can see the time or the days that the client generate a huge
event log here Monday 31 August 2020 the top day of generated events.
2.8 Alerts
We create an alert with Splunk search language for monitoring any failed password for all
accounts or any attempts greater than or equal to 4 attempts to gain unauthorized access on Linux
machines
31
Figure 41 : Alerts configuration
Also, we configure the email that will receive the alerts as a report that have a high priority
and the expiration date
32
Figure 42 : Receive Email configuration
After alert configuration, we need to enable it, and you can edit the alert or it’s permission,
move or delete it.
33
Figure 43 : Alert rules created
The next step, we perform a brute force attack on the remote administration protocol SSH for
Linux machine with the tool Nmap
This command allows the combination of all the login and password possibilities of the two
files users.txt and passwords.txt
34
Figure 45 : Valid credentials found successfully
After this attack, an alert generated, and an email sent with generated csv and pdf reports and
the source IP address to the configured email.
35
Conclusion
we have presented, in this chapter our project design and the procedures of Splunk universal
forwarders installation ubuntu kali and windows. Also, we have showed the Splunk server
installation and configuration that allow us to monitor the critical incidents in real time with
dashboards & alerts.
36
General Conclusion
SIEM (Security Information and Event Management) is defined as the real-time collection,
monitoring, correlation and analysis of events from disparate sources. Today's SIEM solutions
enable your business to respond quickly and accurately to any threat or data breach.
A SIEM solution provides management, integration, correlation and analysis in one place,
making it easy to monitor and troubleshoot your IT infrastructure in real time.
37
Bibliography
https://docs.splunk.com/Documentation
https://docs.splunk.com/File:Deployment2-small_60.png
https://www.researchgate.net/publication/337946451_A_Security_Information_and_Event_M
anagement_Pattern
https://www.varonis.com/blog/what-is-siem/
38