FaresMorcy
search
Ctrlk
  • Whoami
  • Footprinting Labschevron-right
  • Shells & Payloads chevron-right
  • Password Attackschevron-right
  • Active Directory Enumeration & Attackschevron-right
  • SOC Hackthebox Notes & Labschevron-right
  • Malicious Document Analysis - HTB Noteschevron-right
  • Build Home Lab - SOC Automationchevron-right
  • Home Lab (Attack & Defense Scenarios)chevron-right
  • Home Lab (Active Directory Scenarios)chevron-right
  • Build ELK Labchevron-right
    • Configure Elasticsearch and Kibana setup in ubuntu
    • Configure Fluent-Bit to send logs to ELK
    • Set up Winlogbeat & Filebeat for log collection
    • Send Logs from Winlogbeat through Logstash to ELK
    • Enable Windows Audit Policy & Winlogbeat
    • Elasticsearch API and Ingestion Pipeline
  • CyberDefenderschevron-right
  • TryHackme Roomschevron-right
  • Powershell Scripting Fundamentals
  • Practical Windows Forensicschevron-right
  • Hackthebox Roomschevron-right
  • WEInnovate Training chevron-right
  • TryHackme SOC 1chevron-right
  • TryHackme SOC 2chevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Build ELK Lab

Configure Elasticsearch and Kibana setup in ubuntuchevron-rightConfigure Fluent-Bit to send logs to ELKchevron-rightSet up Winlogbeat & Filebeat for log collectionchevron-rightSend Logs from Winlogbeat through Logstash to ELKchevron-rightEnable Windows Audit Policy & Winlogbeatchevron-rightElasticsearch API and Ingestion Pipelinechevron-right
PreviousThe Investigationchevron-leftNextConfigure Elasticsearch and Kibana setup in ubuntuchevron-right