SIEM Implementation
SIEM Implementation
Servers
Procedure to set up SIEM (Security Information and Event Manage-
ment) on your servers, including requirements, installation, configura-
tion, and monitoring.
� 1. Understanding SIEM
A SIEM solution collects, analyzes, and correlates security logs from multi-
ple sources, enabling real-time threat detection, log management, and
compliance monitoring.
� Key Features:
� Log collection & storage
� Real-time threat detection
� Security incident response
� Forensic analysis
� Compliance reporting (PCI-DSS, HIPAA, GDPR, SOC 2, etc.)
Open-Source Enterprise
Wazuh + ELK Stack Splunk
OSSEC IBM QRadar
Graylog Microsoft Sentinel
SIEMonster ArcSight
For this guide, we’ll use Wazuh + ELK Stack (free, open-source, and power-
ful).
� 2. System Requirements
� Minimum System Requirements: (For a small deployment, 5-10 servers)
| Component | Requirement | |————|————| | OS | Ubuntu 22.04 (Recom-
mended) / CentOS 8 / RHEL 8 | | CPU | 4 Cores (8+ for large deployments)
| | RAM | 8GB (16GB+ for large deployments) | | Disk Space | 100GB SSD+
(500GB+ for long retention) | | Network | 1 Gbps (low latency recommended) |
1
For large-scale deployment (100+ servers), consider distributed archi-
tecture with separate Wazuh Manager, Elasticsearch, Kibana, and File-
beat servers.
• CPU: 1 core
• RAM: 512MB
• Disk: 2GB
3. Deployment Options
• On-Premise: Full control on your own hardware (this guide uses an
on-premise setup).
• Cloud: Deploy on AWS, Azure, or GCP using managed services.
• Hybrid: A combination of on-premise and cloud deployments.
4. Installation Steps
A. Install Wazuh Server
1. Update and Install Dependencies
sudo apt update && sudo apt upgrade -y
sudo apt install curl apt-transport-https unzip -y
2. Add the Wazuh Repository and Install Wazuh Manager
curl -sO https://packages.wazuh.com/key/GPG-KEY-WAZUH
sudo apt-key add GPG-KEY-WAZUH
echo "deb https://packages.wazuh.com/4.x/apt/ stable main" | sudo tee /etc/apt/sources.
sudo apt update
sudo apt install wazuh-manager -y
3. Start Wazuh Manager
sudo systemctl enable wazuh-manager
sudo systemctl start wazuh-manager
2
B. Install OpenSearch (Log Storage)
1. Install OpenSearch
wget -qO - https://artifacts.opensearch.org/packages/2.x/opensearch-keyring.asc | sudo
echo "deb [signed-by=/usr/share/keyrings/opensearch-keyring.gpg] https://artifacts.open
sudo apt update && sudo apt install opensearch -y
2. Configure OpenSearch
Edit /etc/opensearch/opensearch.yml and add/modify:
network.host: 0.0.0.0
cluster.name: wazuh-cluster
node.name: node-1
3. Start OpenSearch
sudo systemctl enable opensearch
sudo systemctl start opensearch
3
output.elasticsearch:
hosts: ["http://localhost:9200"]
setup.kibana:
host: "http://localhost:5601"
4. Start Filebeat
sudo systemctl enable filebeat
sudo systemctl start filebeat
4
2.1 Configure with gui
4. Start the Agent Service
net start WazuhSvc
• Read Official Guide for Windows Agent
•
5
3. Check Agent Connectivity:
On the SIEM server, run:
/var/ossec/bin/agent_control -l
This command lists connected agents to ensure they’re communicating
properly with the server.
7. Conclusion
Your SIEM system is now fully deployed and operational. You can monitor
logs, detect threats, and ensure compliance. For further customizations—such
as adding custom rules or email alerts—refer to the official documentation:
• Wazuh Documentation
• OpenSearch Documentation
Author: Abubakkar Khan Fazla Rabbi