IncidentResponsev2

4.09 Install and Deploy Security Onion

Task

Install and Deploy Security Onion


Conditions

Given a Linux Security Onion machine.


Standards


End State

Fully functioning Security Onion NIDS receiving and parsing logs from target network segments.


Manual Steps

Configuring Security Onion from an instantiated virtual machine


Setup Security Onion Firewall Rules (so-allow)

After initial setup, configure local firewall to permit necessary communications.

Allow analyst access

Allows workstations or ranges to access SO web interfaces.

sudo so-allow

Screenshot

Allow Elasticsearch access

Allows other SO boxes or apps to connect to Elasticsearch.

sudo so-allow

Screenshot

Allow PAN syslog device

Allows Palo Alto to forward logs to SO.

sudo so-allow

Screenshot

Allow Wazuh/OSSEC agent connectivity

Allows workstations/servers running Wazuh agent to report into SO.

sudo so-allow

Screenshot

Operator Note: Always validate and limit scope → use DAPE (Deny All, Permit by Exception) logic.


Connecting to Security Onion from Another Box

Operator Note: This step validates operational readiness → Kibana access confirms sensors and ingestion are online.


Dependencies


Other Available Tools

Tool Platform Installation Usage
so-allow Security Onion Built-in Configures firewall access rules
Kibana Web UI Built-in Visualize and search logs
ElasticSearch Backend Built-in Stores log data

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

Security Onion Docs
Security Onion Docs - Local
Security Onion Walkthrough


Revision History

Date Version Description Author
2025-05-02 1.0 Final corrected version preserving original + expanded operator instructions, validation, and context Leo