Enterprise-Grade SOC Lab Setup: Wazuh + Snort + Slack Integration Explained

Fazal

FazalFollow

2 min read

·

Oct 4, 2025

Project Overview

This project demonstrates the design and deployment of a fully integrated Security Operations Center (SOC) lab within a controlled virtualized environment. It brings together network and host monitoringincident detection, and real-time alerting to simulate how enterprise SOCs operate.

The setup uses multiple operating systems (Kali Linux, Ubuntu, Windows 10, Windows Server, and Amazon Linux EC2) to represent a real-world heterogeneous infrastructure. Each machine forwards security logs to a central SIEM manager (Ubuntu), configured with Wazuh and snort for end-to-end visibility.

Core Implementations

✅ 1. Multi-OS Virtual Environment:
Configured six different OS environments in VMware for simulating enterprise-scale endpoints — including local servers, user machines, and a cloud server.

✅ 2. Central SIEM Manager Setup:
Built on Ubuntu; integrated Wazuh ManagerSnort IDS, and ELK Stack to handle both host-based and network-based detection.

✅ 3. Promiscuous Mode Networking:
Enabled bridge-mode monitoring for packet capture and real-time inspection across VMs.

✅ 4. Snort IDS Deployment:
Installed and configured Snort as a network intrusion detection system, tuning it to capture malicious activities within the VM network.

✅ 5. Wazuh Agent Integration:
Deployed Wazuh Agents across multiple OS types (Linux, Windows, Cloud) for centralized log collection and correlation.

✅ 6. AWS EC2 Integration (Cloud Node):
Launched an Amazon Linux EC2 instance, connected securely to the on-prem SOC using Tailscale VPN, simulating hybrid enterprise infrastructure.

✅ 7. Detection Rules and Custom Alerts:
Created custom Wazuh rules for SSH brute-force, authentication failures, and suspicious behaviors — applied globally to all agents.

Get Fazal’s stories in your inbox

Join Medium for free to get updates from this writer.Subscribe

✅ 8. Slack Automation for Incident Alerts:
Configured Slack Webhook Integration so that any triggered alert in Wazuh automatically posts a structured JSON alert into a Slack channel for rapid SOC response.

✅ 9. Attack Simulation & Validation:
Executed simulated attacks (brute-force, port scans, etc.) to validate rule accuracy and verify detection pipeline functionality.

Deliverable

  • self-contained SOC Lab guide (.docx) hosted on GitHub.
  • Complete instructions to replicate the architecture from scratch — ideal for students, SOC aspirants, and cybersecurity lab builders.

🔗 GitHub Repository: [https://github.com/shaikfazal-del/vm-based-soc-lab.git]

Key Skills Demonstrated

  • SIEM and IDS/IPS Configuration (Wazuh + Snort)
  • Log Forwarding and Centralized Monitoring
  • Alert Automation and Incident Response via Slack
  • Cloud Security Integration (AWS EC2 + VPN)
  • Network Traffic Capture and Analysis
  • Multi-OS Security Environment Management

📫 Connect on LinkedIn: [https://www.linkedin.com/in/fazal-shaikk/]
🌐 Portfolio: [https://fazal-portfolio-git-main-fazals-projects-01b6c4d5.vercel.app/]

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *