Project | SOC / Security Monitoring
Wazuh SIEM / XDR
Wazuh deployed as a self-hosted SIEM and XDR platform in an LXC container on the Proxmox
cluster — collecting endpoint events, correlating Suricata network alerts, and providing
a real alert triage environment for SOC-style investigation practice.
Wazuh
SIEM
XDR
Suricata Integration
Endpoint Agents
Alert Triage
Integration
Suricata + Wazuh Correlation
Suricata runs on OPNsense's WAN interface in netmap mode and forwards IDS alerts to Wazuh via syslog. Network-layer detections and host-layer events appear in the same platform — a detection on the wire can be cross-referenced with what the endpoint was doing at the same time.
Visibility
Agent-Based Endpoint Coverage
Wazuh agents on Linux containers and Windows hosts collect authentication events, process creation, file integrity changes, and system-level activity. The manager correlates these against built-in and custom rules to surface meaningful alerts rather than raw log noise.
Workflow
Triage Practice Environment
Real alerts from the homelab infrastructure — failed logins, config changes, unexpected processes — create a low-stakes environment to practice the analyst triage loop: identify, contextualize, classify, and document. The same workflow scales directly to production SOC work.