@@ -8,6 +8,7 @@ The following values will be generated while following the setup:
8
8
- CORTEX_API_KEY
9
9
10
10
### Networking
11
+
11
12
Optionally adjust ` DOCKER_SUBNET ` and ` DOCKER_GATEWAY ` if it overlaps with an external network.
12
13
Since docker-compose doesn't allow setting the gateway of a network's IPAM manually, ` DOCKER_GATEWAY ` must be set to the first address in the subnet.
13
14
@@ -17,6 +18,15 @@ Set the `HTTP_BASIC_AUTH` env to configure authentication for some web interface
17
18
18
19
The host device needs to be reachable over the internet to request https certificates.
19
20
21
+ ### MISP
22
+
23
+ MISP needs to know the external hostname. T
24
+ This is set in ` MISP_BASEURL ` , for example ` misp-sopoc.duckdns.org ` .
25
+
26
+ Edit ` MISP_ADMIN_EMAIL ` and ` MISP_ADMIN_PASSPHRASE ` .
27
+ Changing these values won't change the default login of ` admin@admin.test ` with password ` admin ` .
28
+ See further configuration instructions below.
29
+
20
30
### Ntop
21
31
22
32
Configure ` CAPTURE_INTERFACE ` to the sniffing interface and ` HOME_NET ` to a comma separated list of CIDR ranges representing local networks.
@@ -59,4 +69,46 @@ Special configuration is required for setting up TheHive.
59
69
- Go to users, add a new user named "security-onion".
60
70
- Enable read/write for this user and enable alert creation.
61
71
- Generate the api key for the user security-onion.
62
- - This is the api key used in ElastAlert rules with the hivealerter alert system.
72
+ - This is the api key used in ElastAlert rules with the hivealerter alert system.
73
+
74
+ ## 4. MISP
75
+
76
+ ### Misp instance
77
+
78
+ Misp starts with a default login, despite setting the email and password in the ` .env ` file.
79
+ - Open the MISP web interface
80
+ - Login with email ` admin@admin.test ` and password ` admin ` .
81
+ - Change password to the value of ` MISP_ADMIN_PASSPHRASE ` , set earlier in ` .env ` .
82
+ - Open the "Edit my profile" page.
83
+ - Change email to the value of ` MISP_ADMIN_EMAIL ` , set earlier in ` .env ` .
84
+ - Go to the "My profile" page.
85
+ - Copy the AuthKey, this is the api key used by securityonion-misp.
86
+
87
+ ### Security Onion
88
+
89
+ Ssh into the Security Onion vm and clone the repository:
90
+ ```
91
+ git clone https://github.com/weslambert/securityonion-misp
92
+ ```
93
+
94
+ Apply a small patch and run the install script:
95
+ ```
96
+ sed -i "s/is_ip() {/is_ip() {\nreturn 0/" securityonion-misp/so-misp-setup
97
+ sudo securityonion-misp/so-misp-setup
98
+ ```
99
+ Follow the installation instructions:
100
+ - Enter the ip address and port of the MISP instance.
101
+ The ip address is the SO vm's gateway. The port is exposed by the misp-proxy container.
102
+ For example: ` 192.168.101.1:6000 `
103
+ - Enter http as protocol
104
+ - Paste your api key and press enter, your input is hidden.
105
+ - Type ` YES ` for configuring NIDS rules.
106
+ - Type ` YES ` for configuring Zeek intel data.
107
+ - Type ` YES ` to confirm.
108
+
109
+ Finally update the ruleset:
110
+ ```
111
+ sudo rule-update
112
+ ```
113
+
114
+ NIDS rules are now synchronized daily with the MISP rule generator.
0 commit comments