Post

Wazuh Project Overview

Overview of my Wazuh SIEM Project.

Wazuh Project Overview

Purpose:

The goal of this project is to expand my own understanding of the Wazuh SIEM product by building out my own fully functional setup. Not only does this provide a foundation of understanding when it comes to the general architecture of SIEM applications, but it also gives me a chance to troubleshoot issues before I ever have to do it in a production/work environment.

Project Content:

  • A self-hosted Wazuh Instance with a Server, Indexer, and Dashboard all contained in my Home Lab.
    • Includes a secured Virtual Machine for the service to run 24/7.
  • A securely configured Tailscale VPN to provide Log connectivity to each node that is using the Wazuh service (no matter there geolocation).
    • Using the ACL functionality of Tailscale
    • using Tailscale SSH for quicker deployments and troubleshooting on Linux nodes.
  • Active Logging and tracking of endpoint data using Wazuh’s endpoint agent.
  • Deployment of Wazuh endpoint agents in Linux, MacOS, and Windows setups.
  • Translating the log data into a useable dashboard accessible via the Wazuh Dashboard.
  • Running Audit reports for key compliance specifications, specifically PCI DSS, HIPAA, and GDPR.

Value Added:

  • 40+ hours in Standing up, Onboarding, and troubleshooting a geographically distributed Wazuh Integrated Network.
  • A practical-examination of my own understanding of IP addresses and troubleshooting connectivity between separate nodes.
  • Insight in ACL construction and implementation.
  • Insight in setting up SSH, as well as the downsides, upsides, and general limitations of the protocol.
  • Lots of troubleshooting network connectivity between nodes, making sure various endpoints have connection but ONLY the connection they need.
  • A understanding of the key benefits, qualities, and functionality of the Wazuh platform and how it can be used.
  • Deeper understanding of Log Data as well as the possibilities and utilities of it in a security environment.

Pictures:

  • ADD PICTURES PLUS CAPTIONS FOR PROOF
  • I can log in via the Tailscale Static IP address that is assigned to the individual node that is the VM hosting the service. In that VM, I had open the adequate port (443 for HTTPS access). I also had to configure adequate ACL on the TailScale Network so that my computer had network access to that device’s HTTPs port. VPN-Internal_IP_Access_Wazuh

  • The following is a picture of the initial Dashboard I set up. ExampleDashboard_Wazh

  • The hardware requirements aren’t crazy. Mainly, from what I saw it would be best to make sure to have a VM that could have 16 GBs of Ram, 4 CPU Cores, and around 500 GBs of storage. Smaller or bigger setups would work… But for a Lab-setup there isn’t any huge reason to go bigger. The full cost of the hardware for this was right around $300. DellOptiplexPic

Few Thoughts

While I didn’t hit all of the aspects that Wazuh has to offer (Multi-Cluster Indexing, Alerts/Notifications) I did as much as I could do without spending any money past the minimal hardware. What I would like to do in a future post is to expand into Cloud applications, potentially spin up a AWS network and make sure that the functionality there makes sense and works like I expect it to. That combined with a few key things (such as Alerts/Notifications) would be the last parts I haven’t had my hands fully on.

If you find this project interesting/informative, feel free to reach out with any questions or thoughts! I am always happy to chat about Tech, Security, or life in general. Cheers!

Specific Technical Details:

This post is licensed under CC BY 4.0 by the author.

Trending Tags