Security Operation Lab

πŸ“Š 30-Days DFIR Lab: Centralized Logging with Elastic Stack

In this lab, I designed and deployed a centralized log collection and alerting architecture for blue-team and detection engineering practice.

🧠 Lab Overview

Image description
  • Objective: Collect logs across Windows and Linux systems, forward to ELK stack, visualize with Kibana, and trigger alerts.
  • Focus Areas:
    • DFIR readiness
    • Endpoint visibility
    • Threat detection
    • OSINT & alert integration

πŸ–₯️ Network & Architecture

Subnet: 192.168.100.0/24
Range: 192.168.100.1 – 254
Hypervisor: Proxmox VE

🧰 Lab Components

ComponentRole
ProxmoxHypervisor for spinning up all VMs
Fleet ServerAgent orchestration
Elastic StackElasticsearch + Kibana for analysis
Windows ServerForwarding logs via Elastic Agent (RDP)
Ubuntu ServerForwarding logs via Elastic Agent (SSH)
OS TicketingReceives alerts from Elastic
Kali LinuxSimulates attacker traffic from outside

πŸ” Workflow

  1. πŸ–₯️ Fleet agents installed on both Windows + Ubuntu endpoints
  2. πŸ“¦ Logs forwarded to ElasticSearch
  3. πŸ“ˆ Visualized via Kibana dashboard
  4. 🚨 Alerts generated and routed to OS Ticketing System
  5. πŸ§ͺ Simulated attacker activities via Kali Linux

πŸ” Security Focus

  • Event monitoring (Sysmon, auditd)
  • Inbound SSH & RDP logging
  • Alerting via Elastic rules
  • Incident triage through ticketing
πŸ“Έ Screenshots

_Elastic dashboard, Fleet agent overview, triggered alerts…

Image description

πŸš€ Tools Used

  • πŸ”§ Proxmox VE
  • πŸ“Š ELK Stack (ElasticSearch + Kibana)
  • πŸ“¦ Fleet server
  • πŸ’» Windows 2019 (with Elastic Agent)
  • 🐧 Ubuntu Server (with SSH + logging)
  • πŸ§ͺ Kali Linux (Attacker simulation)
  • πŸ“¬ OS Ticket

πŸ—’οΈ Notes

  • Elastic Agent enrollment required manual token setup
  • Fleet provides visual heartbeat of all connected agents
  • Custom rules used to detect suspicious logon behavior

βœ… What I Learned

  • How to create a full log pipeline from scratch
  • DFIR alerting in a home lab context
  • Elastic detection rules & correlation
  • Mapping alerts to real attacker TTPs