Skip to content

jaydenwilliams-cyber/Splunk-SIEM-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Splunk SIEM Lab

Project Overview

In this project, I built a functional SIEM environment using Splunk Enterprise and a Windows endpoint. I configured log forwarding from a Windows system to a Linux-based Splunk server and validated ingestion using internal logs and TCP connection data. This project demonstrates how security teams collect, monitor, and analyze logs to detect suspicious activity.

Lab Architecture

  • Splunk Enterprise Server on Linux VM
  • Windows 10 Endpoint with Splunk Universal Forwarder
  • TCP-based log forwarding
  • Centralized log ingestion and analysis

Configuration Steps

  1. Installed Splunk Enterprise on a Linux virtual machine
  2. Installed Splunk Universal Forwarder on a Windows 10 endpoint
  3. Configured the forwarder to send logs to the Splunk server over TCP
  4. Verified SplunkForwarder service was running on the Windows system
  5. Confirmed network connectivity between forwarder and server
  6. Validated log ingestion using internal Splunk indexes

Ingestion Validation

Splunk Web Dashboard

Dashboard

Internal Index Search

Internal Search

TcpInputProc Verification

TcpInputProc

Connection Validation

Connection

Forwarder Service Running

Service

Forwarder Install Path

Install Path

Detection Use Case

Scenario

A security analyst monitors incoming logs to ensure systems are properly reporting activity and to detect suspicious behavior across endpoints.

Detection Logic

Use Splunk searches to validate log ingestion and identify anomalies:

  • index=_internal → confirms system activity
  • index=_internal TcpInputProc → verifies data input pipelines
  • index=_internal "Connection from" → confirms forwarder connectivity

Investigation

I performed searches within Splunk to confirm:

  • Logs were successfully received from the Windows endpoint
  • TCP connections were established between systems
  • The forwarder was actively sending data

This process simulates how analysts verify data pipelines before relying on SIEM alerts for threat detection.

Key Findings

  • Splunk successfully ingested logs from a remote Windows endpoint
  • TCP connections confirmed reliable log forwarding
  • Internal indexes provided visibility into system health and ingestion
  • Forwarder service ensured continuous data flow

Investigation Insight

This project demonstrates the importance of validating log ingestion in a SIEM environment. Without reliable data collection, security teams cannot detect or respond to threats. Ensuring proper log flow is a critical first step in building an effective monitoring system.

What I Learned

This project showed how to deploy and configure a SIEM system from scratch. I learned how to forward logs, validate ingestion, and confirm system connectivity using Splunk searches. This experience reflects how SOC teams ensure visibility across systems before performing threat detection and analysis.

Skills Demonstrated

  • SIEM deployment and configuration
  • Log forwarding and ingestion validation
  • Splunk search and query analysis
  • Windows service management
  • Linux system configuration
  • TCP connection verification
  • Virtual machine setup and administration

About

Built a functional Splunk SIEM lab using Windows and Linux VMs with log forwarding and ingestion validation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors