Exercise 1 – Setting up and configuring Security Onion
As the first exercise for this chapter, we are going to deploy and configure a Security Onion VM. We will be extending the functionality of this Security Onion appliance throughout the remainder of this part of the book and will be using its analytics and search capabilities extensively throughout the third part of this book, Part 3 – Threat Hunting.
Deploying the Security Onion VM
We will now deploy a Security Onion VM for our lab environment. Follow along with the next process to get the VM up and running:
- Head on over to https://securityonionsolutions.com/software/ and download the latest version of the Security Onion appliance (2.3.21 as of the writing of this book), as illustrated in the following screenshot:
- With the Security Onion appliance International Organization for Standardization (ISO) file downloaded, open VMware Workstation...