Set up a two-VM SIEM lab using Wazuh to simulate an insider threat scenario, and got it to detect a new Windows user account being created in real time.
I built this lab to get hands-on with how a SIEM actually works, not just read about it. The goal was to set up Wazuh to monitor a Windows endpoint and see if it could catch suspicious activity as it happened.
The setup was two virtual machines on a host-only network:
The main thing I wanted to understand was how logs flow from an endpoint through to the SIEM and how the alerting system works. It is one thing to know it happens, it is another to actually watch it in action.
To test the detection, I created a new local Windows user account called HackerTest on the monitored machine. This triggered Windows Security Event ID 4720, which the Wazuh Agent picked up immediately, forwarded to the manager, and escalated as a Level 8 High-Severity alert.
This maps to MITRE ATT&CK T1136 — Create Account, which is a persistence technique attackers use to maintain access after an initial compromise.
Once both VMs were set up and the agent was registered, I confirmed the connection was working through the Wazuh dashboard.
To simulate the attack, I created a new local user account on the Windows machine:
That immediately generated Event ID 4720 in the Windows Security logs.
The Wazuh Agent was already monitoring the event log in real time. As soon as the event appeared, it forwarded it to the manager, which matched it against Rule ID 60109 and raised a Level 8 High-Severity alert within seconds.
Seeing the alert pop up in Kibana almost immediately after running the command was a good moment. It made the whole pipeline feel real.
| Field | Value |
|---|---|
| Rule ID | 60109 |
| Event ID | 4720 |
| Severity | Level 8 — High |
| Technique | T1136 — Create Account |
| Account Created | HackerTest |
| Source Endpoint | Windows10-VM |
| Detection Platform | Wazuh SIEM |
Creating extra user accounts is a common way attackers keep access after they are already in. If the original account gets locked or discovered, the backup account keeps them in the network. It is a simple technique but it works.
What this lab showed me is how quickly a SIEM can catch it when the monitoring is set up properly. The whole detection happened in real time without any manual log review.
It also helped me understand a few core SOC ideas in a practical way:
Things to watch for:
Ways to defend against it:
This project gave me a much better feel for how SIEMs work in practice. Setting it up from scratch, watching the agent connect, and then seeing a real alert fire in the dashboard made the whole thing click in a way that just reading about it never did.