If you need to change the screen resolution of your Security Onion installation:
- click the
Applicationsmenu in the upper left corner
- select your display
- choose your desired resolution
If you prefer a CLI method for changing screen resolution, you can use xrandr. For a list of available screen resolutions, simply execute
xrandr. To set the screen resolution (replace
H with the actual Width and Height desired):
xrandr -s WxH
If you have limited screen resolution options and are in a virtualized environment, you may need to install the Virtual Tools for your virtualization solution. For example, this can happen if you’re running VirtualBox and you can install the VirtualBox Extensions to get more resolution options.
Verify services are running:
If any services are not running, try starting them:
If you have problems with Snort/Suricata/Bro/PF-RING and have UEFI Secure Boot enabled, please see the Secure Boot section.
Log into Sguil, Squert, and Kibana and verify that you have events in the interfaces. If you don’t have any IDS alerts, you can try to generate one by typing the following at a terminal (only works if you have Internet access):
Full-time analysts may want to connect using a separate Analyst VM.
Setup defaults to only opening port 22 in the firewall. If you want to connect analyst VMs, Wazuh agents, or syslog devices, you can run the so-allow utility which will walk you through creating firewall rules to allow these devices to connect.
Run the following to see how your sensor is coping with the load. You should check this on a daily basis to make sure your sensor is not dropping packets. Consider adding it to a cronjob and having it emailed to you (see the “configure email” link below).
sudo sostat | less
Any IDS/NSM system needs to be tuned for the network it’s monitoring. Please see the tuning section.
Review and categorize alerts in Sguil or Squert on a daily basis. Categorizing alerts and tuning rules should be an iterative process with the goal being to categorize all events every day. You should only run the IDS rules you really care about.
Exclude unnecessary traffic from your monitoring using BPF.
Configure Ubuntu to use your preferred NTP server.
Add new Sguil user accounts with the following:
On the server running the Sguil database, set the
/etc/nsm/securityonion.confto however many days you want to keep in your archive. The default is 30, but you may need to adjust it based on your organization’s detection/response policy and your available disk space.
If you’re monitoring IP address ranges other than private RFC1918 address space (192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12), you may need to update your sensor configuration with the correct IP ranges. Modern versions of Setup should automatically ask you for
HOME_NETand configure these for you, but if you need to update it later, you would do the following. Sensor configuration files can be found in
/etc/nsm/$HOSTNAME-$INTERFACE/. Modify either
suricata.yaml(depending on which IDS engine you chose during
sosetup) and update the
HOME_NETvariable. You may also want to consider updating the
EXTERNAL_NETvariable. Then update Bro’s network configuration in
/opt/bro/etc/networks.cfg. Finally, restart the sensor processes:
Configure Email for alerting and reporting.
sudo apt install etckeeper
Need “remote desktop” access to your Security Onion sensor or server? One option is SSH X-Forwarding, but if you want something more rdp-like, you can install xrdp:
sudo apt install xrdp