aleemladha.wazuh_server_install
Ansible Role to Install Wazuh SIEM Unified XDR and SIEM Protection with SOC Fortress Rules
Why Use Wazuh with SocFortress Rules: SocFortress Blog
The goal of this repository is to offer the Wazuh community improved detection rules that are more precise and informative, drawn from various sources.
Here’s why:
- Detection rules can be complicated, and we believe everyone should access a robust and evolving set of rules.
- Wazuh is a good Endpoint Detection and Response (EDR) agent, but we think its default rules are not strict enough. We want to create a strong collection of Wazuh rules that the community can use and expand as new threats emerge.
- Cybersecurity is challenging enough; let’s collaborate! :smile:
Ansible Role: Wazuh SIEM Deployment
This is an Ansible role that installs the Wazuh SIEM on a Linux system. The password is automatically generated and shown in the logs by default. If needed, you can manually set it using the variable wazuh_admin_password
.
Requirements
None.
Role Variables
Here are the available variables with default values (check defaults/main.yml
):
- Wazuh installation script URL
wazuh_install_script_url: "https://packages.wazuh.com/4.7/wazuh-install.sh"
- SOCFORTRESS Wazuh rules script URL
socfortress_rules_script_url: "https://raw.githubusercontent.com/aaladha/Wazuh-Rules/main/wazuh_socfortress_rules.sh"
- (Optional) Force admin password
wazuh_admin_password: Wazuh-123
Example Playbook
- hosts: wazuh-siem
roles:
- aleemladha.wazuh_server_install
Example Ludus Range Config
ludus:
- vm_name: "{{ range_id }}-wazuh-siem"
hostname: "{{ range_id }}-wazuh-siem"
template: kali-x64-desktop-template
vlan: 20
ip_last_octet: 2
ram_gb: 8
cpus: 4
linux: true
testing:
snapshot: false
block_internet: false
roles:
- aleemladha.wazuh_server_install
role_vars:
wazuh_admin_password: Wazuh-123
Ludus Setup
# Add the role to your Ludus host
ludus ansible roles add aleemladha.wazuh_server_install
# Save your configuration to a file for a VM
ludus range config get > config.yml
# Edit the config file to add the role to the VMs you want as Wazuh SIEM servers
ludus range config set -f config.yml
# Deploy the range and get access to the Wazuh SIEM
ludus range deploy
# By default, the username and password are generated automatically, but you can view them using:
ludus range logs -f
You'll see output like:
ok: [SCCM-wazuh] => {
"msg": [
"Username: admin",
"Password: 8DWmsgBD9*ICMqv?8xnyInr?IMqerI*7"
]
}
Once deployed, you can access the Wazuh UI at https://<IP>:<port>
.
Ludus Game of Active Directory (GOAD) Wazuh Setup
ludus:
- vm_name: "{{ range_id }}-GOAD-DC01"
hostname: "{{ range_id }}-DC01"
template: win2019-server-x64-template
vlan: 10
ip_last_octet: 10
ram_gb: 4
cpus: 2
windows:
sysprep: true
# Other VM configurations follow similar format...
License
Apache-2.0
Author Information
This role was created by Aleem Ladha.
Resources/Credits
Informazioni sul progetto
Install WAZUH SIEM and enhanced with SOC FORTRESS Rules
Installa
ansible-galaxy install aleemladha.wazuh_server_install
Licenza
Unknown
Download
247
Proprietario