-
Notifications
You must be signed in to change notification settings - Fork 522
PostInstallation
Please note! This wiki is no longer maintained. Our documentation has moved to https://securityonion.net/docs/. Please update your bookmarks. You can find the latest version of this page at: https://securityonion.net/docs/PostInstallation.
-
Verify services are running:
sudo so-status
-
If any services are not running, try starting them:
sudo so-start
-
If you have problems with Snort/Suricata/Bro/PF_RING and have UEFI Secure Boot enabled, please see Secure Boot.
-
Check your sniffing interfaces to see if they have Receive Side Scaling (RSS) queues (if so, you may need to reduce to 1): http://suricata.readthedocs.io/en/latest/performance/packet-capture.html
-
Are you monitoring network traffic that has VLAN tags? If so, take a look at our VLAN page.
-
If you’re monitoring IP address ranges other than private RFC1918 address space (192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12), you should update your sensor configuration with the correct IP ranges. Sensor configuration files can be found in
/etc/nsm/$HOSTNAME-$INTERFACE/
. Modify eithersnort.conf
orsuricata.yaml
(depending on which IDS engine you chose duringsosetup
) and update theHOME_NET
variable. (As of securityonion-setup - 20120912-0ubuntu0securityonion222, Setup should automatically ask you for HOME_NET and configure these for you.) You may also want to consider updating theEXTERNAL_NET
variable. If you're running prads (you're probably not), then update thehome_nets
variable inprads.conf
. Then update Bro’s network configuration in/opt/bro/etc/networks.cfg
. Restart the sensor processes:
sudo so-sensor-restart
-
If you have Internet access, create an IDS alert by typing the following at a terminal:
curl http://testmyids.com
-
As of securityonion-setup - 20120912-0ubuntu0securityonion201, Setup now defaults to only opening port 22 in the firewall. If you need to connect OSSEC agents, syslog devices, or analyst VMs, you can run the new
so-allow
utility which will walk you through creating firewall rules to allow these devices to connect. For more information, please see the firewall page. -
Full-time analysts should use an Analyst VM.
-
Login to Sguil and review your IDS alerts. Squert and Kibana can be accessed by visiting https://YourSecurityOnionBox/ (please note the HTTPS) for additional in-depth analysis.
-
Run the following to see how your sensor is coping with the load. You should check this on a daily basis to make sure your sensor is not dropping packets. Consider adding it to a cronjob and having it emailed to you (see the “configure email” link below).
sudo sostat | less
-
Any IDS/NSM system needs to be tuned for the network it’s monitoring. Please see ManagingAlerts. You should only run the signatures you really care about.
-
Review and categorize events every day with the goal being to categorize all events every day. Neglecting to do so will result in database/Sguil issues as the number of uncategorized events continues to increase on a daily basis.
-
On the server running the Sguil database, set the
DAYSTOKEEP
variable in/etc/nsm/securityonion.conf
to however many days you want to keep in your archive. The default is 30, but you may need to adjust it based on your organization’s detection/response policy and your available disk space. -
Tune the number of PF_RING instances for Snort/Suricata and Bro: PF_RING
-
Optional: exclude unnecessary traffic from your monitoring using BPF.
-
Optional: configure Ubuntu to use your preferred NTP server.
-
Optional: add new Sguil user accounts with the following:
sudo so-user-add
-
Optional, but highly recommended: configure Email for alerting and reporting.
-
Optional: place
/etc
under version control. If your organization doesn't already have a standard version control tool, you can use bazaar, git, etckeeper:
sudo apt-get install etckeeper
-
Optional: need “remote desktop” access to your Security Onion sensor or server? We recommend SSH X-Forwarding as shown above, but if you want something more rdp-like, you can install FreeNX or xrdp (please note we do NOT support either of these):
sudo apt-get install xrdp
- Read more about the tools contained in Security Onion: Tools
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs