How to Install and Configure an SIEM System

Video Activity

In this lesson, participants meet the subject matter expert (SME) for this course and also learn which prerequisites are needed for this course. This course covers Log Security Incident and Event Management (SIEM) which consists of: - Log aggregation and retention: a SIEM can securely store logs from all networking systems in one centralized locati...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

1 hour 18 minutes
Video Description

In this lesson, participants meet the subject matter expert (SME) for this course and also learn which prerequisites are needed for this course. This course covers Log Security Incident and Event Management (SIEM) which consists of: - Log aggregation and retention: a SIEM can securely store logs from all networking systems in one centralized location. - Correlation Engine: looks for patterns and trends in logs, seeking any suspicious activity. - Alerting and Analysis: these allow network engineers to take appropriate action as needed. - Reporting and dashboards: provides visibility into which machines are most targeted. - Compliance: these can provide audit reports Course objectives are: - Develop an understanding of SIEM technology - Plan and architect OSSIM installations - Perform OSSIM installations - Sends logs to OSSIM sensors - Install the OSSEC local agents - Configure the OSSIM server In order to get the most out of this course, participants are encouraged to have the following tools: - Powerful PC or multiple PC lab setup with 12 or more gigs of RAM - Virtualization Software (VirtualBox or VMWare) - OSSIM Image - Additional Virtual Machines Upon successful completion of this course, participants will be able to install, configure and tune an SIEM installation from the ground up. Regardless of which SIEM one decides to specialize in, having experience with one SIEM lays the groundwork for learning another. In addition, participants will also be able to set up an OSSIM system by looking at a diagram and then being able to determine to best placement and utilization for an OSSIM structure. This course offers step by step instructions in installation and configuration, how to leg logs to a SIEM, the installation of host and detection agents as well as how to work on settings to customize them to an organization's specific needs. This course assumes no prior knowledge and teaches participants basic skills and deployments.

Video Transcription
Welcome Toe Society in Part one. Installation and configuration
in this presentation will be going over the course objectives, pre records, the tools you'll need to follow along and a brief background in my professional work.
I've worked for a couple of years as both a security analyst incident responder
in My latest role I've been working with Ellie involves us M for close to a year.
U. S M is a paid premium version of OS Asylum, which we'll be covering in this course.
Throughout the past year, I've installed Configured, managed in tune a Sim insulation from the ground up.
I'm going to break down what I've learned into the bare essentials to help you get started.
Now you may be asking, What even is a sin?
Well, Sim is an acronym that stands for a security incident. An event management,
and this course will be focusing on alien vaults.Open source, Security Incident Management System or Oasis. I am for Short
Sims are crucial for businesses to ensure they're protected and have active alerting for security incidents on their network.
Simms have many features and uses. However, most of them boiled down into these main points
Simpson just logs from everything they possibly can
to make controllers work. Station's Web servers, firewalls, routers, hyper visors, another networking equipment
all need to have a relaxant.
Simkin. Take these logs and store them securely and one centralized location
assume can take decentralized logs and run them through a correlation engine.
This engine looks for trends and indicators in the log Sprint for malicious activity
when it seemed to text malicious activity, they create events and alarms.
These alarms notify stock analyst to investigate.
A stock analyst can utilize the SIM to perform in depth analysis and re after the alarms. Accordingly,
these alarms, events and logs can all be used for in depth reporting and trending dashboards.
These dashboards could help provide visibility into which machines are most often targeted,
what offenders are most frequent common attack types and much more
taking reporting a step further. Some since feature compliance reporting
thes audit reports could be ran and given to the order.
If you ever went through an audit without automated reporting, you know how much time and headaches this can save.
By the end of this course, you'll have a full understanding of what a SIM system is
whether you go with Andrea vaults, Oasis, I am or another vendor. The main concepts are very similar.
Just have a experience working with once in translates very well until learning another.
You will also have a solid grasp on what it takes to set up on us. I am installation.
You will be able to look at a network diagram. I know exactly where the oasis I am. If a structure will be best utilized in place,
taking this a step forward, you will be able to perform the server and sensor installations.
I'll be walking through the entire process from start to finish. In my own virtual lab,
you can follow along in the lab or create your own set up entirely.
You'll learn how to send logs. Tau Oasis I am sensors.
Logs are the lifeblood of a sim, and you want all the locks you can possibly get.
Additionally, you'll learn how to install host intrusion detection agents onto a machine that the use of oh sec.
Once you get the servers installed, you'll be able to go into the configuration settings. I know how to set everything exactly to your liking.
Well, this course is designed around setting up a lot of environment to gain. Familiarity with the same
thes skills will be a great addition to your resume.
And if you're more interested in offensive security, understanding how a sim on other security appliances that work will help you become a much better penetration tester.
This course is centered around free software and tools.
I'd recommend using a PC with a quad core higher and 12 or more gigs of RAM.
Well, you can make do with less. You'll find the appliances run quite a bit slower.
This course will work just as well. Using a lab of multiple computers. However, the networking and lab setup is out of this course of scope.
I'd recommend using one computer and virtual ization software,
Virtual Box and VM. Where are both great options?
Personally, I like to use virtual box, and we bill using it. For all of the examples in this course,
if you want to follow along exactly click by click, I'd recommend using virtual box.
You'll also have to download the Oasis. I am image
if you haven't downloaded already, I'll be providing a link in the course materials tab
for my lab. I'm going to be setting up a Lennox Web server
going into the Web server set up and configuration is out of this course of scope.
However, I'll provide a link in the course materials tab for reference.
You should feel free to also create any other virtual machines and send those logs over as well.
The Morlocks you have being sent to us. I am, the easier it is to really dig into the sim and grass palette works.
This course will soon no prior knowledge. By the end of this course, you'll be able to create and develop your own oasis. I am installation,
and the next presentation will be answering several questions, such as What exactly is Oasis I am? And how does always a sigh in work?
We'll also discuss the eligible infrastructure and how the best plan for your use case.
I lost a boot giving a couple examples of basic deployments and go from my lap configuration
in closing. I'd like to thank you for your time. I hope to see you in my next presentation.
Up Next