Project Name

SIEM Threat Detection & Log Analysis Lab (Wazuh)

One-line Summary

Set up a two-VM SIEM lab using Wazuh to simulate an insider threat scenario, and got it to detect a new Windows user account being created in real time.

Full Description

I built this lab to get hands-on with how a SIEM actually works, not just read about it. The goal was to set up Wazuh to monitor a Windows endpoint and see if it could catch suspicious activity as it happened.

The setup was two virtual machines on a host-only network:

The main thing I wanted to understand was how logs flow from an endpoint through to the SIEM and how the alerting system works. It is one thing to know it happens, it is another to actually watch it in action.

To test the detection, I created a new local Windows user account called HackerTest on the monitored machine. This triggered Windows Security Event ID 4720, which the Wazuh Agent picked up immediately, forwarded to the manager, and escalated as a Level 8 High-Severity alert.

This maps to MITRE ATT&CK T1136 — Create Account, which is a persistence technique attackers use to maintain access after an initial compromise.

Lab Architecture

Assessment Methodology

  1. Deploy Wazuh Manager on Ubuntu Server
  2. Install and register Wazuh Agent on Windows 10 endpoint
  3. Verify the agent and manager could communicate
  4. Simulate insider threat activity on the Windows machine
  5. Check the Windows Security Event Logs
  6. Watch the SIEM alert appear in real time
  7. Map the detected event to MITRE ATT&CK
  8. Review what defences could have stopped it

Execution

Once both VMs were set up and the agent was registered, I confirmed the connection was working through the Wazuh dashboard.

To simulate the attack, I created a new local user account on the Windows machine:

net user HackerTest Password123! /add

That immediately generated Event ID 4720 in the Windows Security logs.

The Wazuh Agent was already monitoring the event log in real time. As soon as the event appeared, it forwarded it to the manager, which matched it against Rule ID 60109 and raised a Level 8 High-Severity alert within seconds.

Seeing the alert pop up in Kibana almost immediately after running the command was a good moment. It made the whole pipeline feel real.

Alert Details

Field Value
Rule ID 60109
Event ID 4720
Severity Level 8 — High
Technique T1136 — Create Account
Account Created HackerTest
Source Endpoint Windows10-VM
Detection Platform Wazuh SIEM

Security Analysis

Creating extra user accounts is a common way attackers keep access after they are already in. If the original account gets locked or discovered, the backup account keeps them in the network. It is a simple technique but it works.

What this lab showed me is how quickly a SIEM can catch it when the monitoring is set up properly. The whole detection happened in real time without any manual log review.

It also helped me understand a few core SOC ideas in a practical way:

Detection Opportunities

Things to watch for:

Ways to defend against it:

Recommendations

Tools & Technologies Used

Key Skills Demonstrated

This project gave me a much better feel for how SIEMs work in practice. Setting it up from scratch, watching the agent connect, and then seeing a real alert fire in the dashboard made the whole thing click in a way that just reading about it never did.

Wazuh dashboard showing Level 8 alert for new user creation Successful connection between Wazuh agent on Windows 10 and manager on Ubuntu Server Adding new user account on Windows 10 Wazuh Level 8 alert triggered for HackerTest account