Install and Deploy Security Onion
Given a Linux Security Onion machine.
Fully functioning Security Onion NIDS receiving and parsing logs from target network segments.
Note: for lab/range use credentials from SharePoint.
Open Terminal → Click Applications → Utilities → Terminal. Leave terminal off to the side.
Note: Use password from Step 1.1 in setup.
Select Yes, Continue!
Select Yes, configure /etc/...
ip addressSet a static IP → Make sure static is selected → Select Ok.
Input IPv4 address → select Ok → refer to Terminal output.
Input your subnet CIDR → select Ok.
ip route
Use IP after default via for gateway.
nslookup google.com
Use displayed DNS servers.
hostname -f
Input everything after first period → select Ok.
Configure sniffing interfaces → select Yes, configure...
Ensure management interface is NOT selected → select Ok.
Select Yes, make changes!
Select Yes, Reboot!
Login to SO again → Use original credentials.
Launch setup again → double click setup icon.
Input system logon password.
Select Yes, Continue to configure services.
Select Yes, skip... to skip prior config.
Select Production Mode.
Select New deployment.
Input first user account (not default) → set password twice.
Select Best Practices.
Select Emerging Threats Open ruleset.
Select Snort IDS engine.
Select Enable our sensors.
Accept default port configurations → Select Ok.
Review monitoring interfaces → confirm management interface NOT selected → Select Ok.
Define HOME_NET subnets → Input each subnet in CIDR → comma separated.
Store logs locally → Select Yes.
Accept default log size → Select Ok.
Finish configuration → Select Yes, proceed...
Ok six times.After initial setup, configure local firewall to permit necessary communications.
sudo so-allow
Allows workstations or ranges to access SO web interfaces.
sudo so-allow
Allows other SO boxes or apps to connect to Elasticsearch.
sudo so-allow
Allows Palo Alto to forward logs to SO.
sudo so-allow
Allows workstations/servers running Wazuh agent to report into SO.
sudo so-allow
Operator Note: Always validate and limit scope → use DAPE (Deny All, Permit by Exception) logic.
sudo ufw status numbered
sudo ufw delete <rule_number>
Operator Note: This step validates operational readiness → Kibana access confirms sensors and ingestion are online.
| Tool | Platform | Installation | Usage |
|---|---|---|---|
| so-allow | Security Onion | Built-in | Configures firewall access rules |
| Kibana | Web UI | Built-in | Visualize and search logs |
| ElasticSearch | Backend | Built-in | Stores log data |
so-allow for analyst, PAN, Wazuh, and OSSEC agents.so-allow cautiously → opening too much access weakens NIDS.Security Onion Docs
Security Onion Docs - Local
Security Onion Walkthrough
| Date | Version | Description | Author |
|---|---|---|---|
| 2025-05-02 | 1.0 | Final corrected version preserving original + expanded operator instructions, validation, and context | Leo |