DetectionLabELK is a fork from Chris Long’s DetectionLab with ELK stack instead of Splunk.
DetectionLabELK is the perfect lab to use if you would like to build effective detection capabilities. It has been designed with defenders in mind. Its primary purpose is to allow blueteams to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
A popular use case for DetectionLabELK is when you consider adopting MITRE ATT&CK framework and would like to develop detections for its tactics. You can use DetectionLabELK to quickly run atomic tests, see what logs are being generated and compare it to your production environment. This way you can:
\\wef\pslogs
* WEF Server Configuration GPO
* Powershell logging GPO
* Enhanced Windows Auditing policy GPO
* Sysmon
* osquery
* Elastic Beats Forwarder (Forwards Sysmon & osquery)
* Sysinternals Tools
* Microsft Advanced Threat Analytics Lightweight Gateway
* Microsoft Advanced Threat Analytics
* Windows Event Collector
* Windows Event Subscription Creation
* Powershell transcription logging share
* Sysmon
* osquery
* Elastic Beats Forwarder (Forwards WinEventLog & Powershell & Sysmon & osquery)
* Sysinternals tools
* Simulates employee workstation
* Sysmon
* osquery
* Sysinternals Tools
* Kibana
* Fleet osquery Manager
* Bro
* Suricata
* Elastic Beats Forwarder (Forwards Bro logs & Suricata & osquery)
* Guacamole
* Velociraptor
* [Install Vagrant](<https://www.vagrantup.com/downloads.html> "Install Vagrant" ) on your system.
* [Install Packer](<https://packer.io/downloads.html> "Install Packer" ) on your system.
* Install the Vagrant-Reload plugin by running the following command: `vagrant plugin install vagrant-reload`.
* Download DetectionLabELK to your local machine by running `git clone https://github.com/cyberdefenders/DetectionLabELK.git` from command line OR download it directly via [this link](<https://github.com/cyberdefenders/DetectionLabELK/archive/master.zip> "this link" ).
* `cd` to "DetectionLabELK/Vagrant" and execute `vagrant up`.
* [Install Vagrant](<https://www.vagrantup.com/downloads.html> "Install Vagrant" ) on your system.
* [Install Packer](<https://packer.io/downloads.html> "Install Packer" ) on your system.
* Install "Vagrant-Reload" plugin by running the following command: `vagrant plugin install vagrant-reload`.
* Download DetectionLabELK to your local machine by running `git clone https://github.com/cyberdefenders/DetectionLabELK.git` from command line OR download it directly via [this link](<https://github.com/cyberdefenders/DetectionLabELK/archive/master.zip> "this link" ).
* `cd` to "DetectionLabELK" base directory and build the lab by executing `./build.sh virtualbox` (Mac & Linux) or `./build.ps1 virtualbox` (Windows).
DetectionLabELK/Vagrant
directory and run vagrant status
. The four machines (wef,dc,logger and win10) should be running. if one of the machines was not running, execute vagrant reload <host>
. If you would like to pause the whole lab, execute vagrant suspend
and resume it using vagrant resume
.Vagrant
folder as vagrant_up_<host>.log
Support: If you face any problem, please open a new issue and provide relevant log file.
github.com/clong/DetectionLab
github.com/cyberdefenders/DetectionLabELK
github.com/cyberdefenders/DetectionLabELK/archive/master.zip
github.com/cyberdefenders/DetectionLabELK/issues
github.com/palantir/osquery-configuration
github.com/palantir/windows-event-forwarding
github.com/palantir/windows-event-forwarding/tree/master/AutorunsToWinEventLog