Install and Deploy Security Onion
Given a Linux Security Onion machine.
Fully functioning Security Onion NIDS receiving and parsing logs from target network segments.
Note: for lab/range use credentials from SharePoint.
Open Terminal → Click Applications
→ Utilities
→ Terminal
. Leave terminal off to the side.
Note: Use password from Step 1.1 in setup.
Select Yes, Continue!
Select Yes, configure /etc/...
ip address
Set a static IP → Make sure static is selected → Select Ok
.
Input IPv4 address → select Ok
→ refer to Terminal output.
Input your subnet CIDR → select Ok
.
ip route
Use IP after default via
for gateway.
nslookup google.com
Use displayed DNS servers.
hostname -f
Input everything after first period → select Ok
.
Configure sniffing interfaces → select Yes, configure...
Ensure management interface is NOT selected → select Ok
.
Select Yes, make changes!
Select Yes, Reboot!
Login to SO again → Use original credentials.
Launch setup again → double click setup icon.
Input system logon password.
Select Yes, Continue
to configure services.
Select Yes, skip...
to skip prior config.
Select Production Mode
.
Select New
deployment.
Input first user account (not default) → set password twice.
Select Best Practices
.
Select Emerging Threats Open
ruleset.
Select Snort
IDS engine.
Select Enable our sensors
.
Accept default port configurations → Select Ok
.
Review monitoring interfaces → confirm management interface NOT selected → Select Ok
.
Define HOME_NET subnets → Input each subnet in CIDR → comma separated.
Store logs locally → Select Yes
.
Accept default log size → Select Ok
.
Finish configuration → Select Yes, proceed...
Ok
six times.After initial setup, configure local firewall to permit necessary communications.
sudo so-allow
Allows workstations or ranges to access SO web interfaces.
sudo so-allow
Allows other SO boxes or apps to connect to Elasticsearch.
sudo so-allow
Allows Palo Alto to forward logs to SO.
sudo so-allow
Allows workstations/servers running Wazuh agent to report into SO.
sudo so-allow
Operator Note: Always validate and limit scope → use DAPE (Deny All, Permit by Exception) logic.
sudo ufw status numbered
sudo ufw delete <rule_number>
Operator Note: This step validates operational readiness → Kibana access confirms sensors and ingestion are online.
Tool | Platform | Installation | Usage |
---|---|---|---|
so-allow | Security Onion | Built-in | Configures firewall access rules |
Kibana | Web UI | Built-in | Visualize and search logs |
ElasticSearch | Backend | Built-in | Stores log data |
so-allow
for analyst, PAN, Wazuh, and OSSEC agents.so-allow
cautiously → opening too much access weakens NIDS.Security Onion Docs
Security Onion Docs - Local
Security Onion Walkthrough
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Final corrected version preserving original + expanded operator instructions, validation, and context | Leo |