<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Untitled Publication]]></title><description><![CDATA[Untitled Publication]]></description><link>https://blog.suyogadhikari05.com.np</link><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 14:08:34 GMT</lastBuildDate><atom:link href="https://blog.suyogadhikari05.com.np/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Inter-Forest Active Directory Migration Using ADMT]]></title><description><![CDATA[Objective
To successfully migrate users, groups, computers, and associated resources from Company A's Active Directory forest to Company B's forest using the Active Directory Migration Tool (ADMT), ensuring minimal disruption, preservation of securit...]]></description><link>https://blog.suyogadhikari05.com.np/inter-forest-active-directory-migration-using-admt</link><guid isPermaLink="true">https://blog.suyogadhikari05.com.np/inter-forest-active-directory-migration-using-admt</guid><dc:creator><![CDATA[Suyog Adhikari]]></dc:creator><pubDate>Fri, 16 May 2025 05:15:21 GMT</pubDate><content:encoded><![CDATA[<h2 id="heading-objective">Objective</h2>
<p>To successfully migrate users, groups, computers, and associated resources from <strong>Company A's</strong> Active Directory forest to <strong>Company B's</strong> forest using the Active Directory Migration Tool (ADMT), ensuring minimal disruption, preservation of security identifiers (SIDs), and maintenance of user access to resources.</p>
<hr />
<h2 id="heading-1-understanding-the-migration-scenario">1. Understanding the Migration Scenario</h2>
<p>In scenarios such as mergers, acquisitions, or organizational restructuring, it's often necessary to consolidate Active Directory environments.
An inter-forest migration involves moving objects between two separate AD forests, which can be complex due to differences in configurations, policies, and trust relationships.</p>
<hr />
<h2 id="heading-2-pre-migration-planning">2. Pre-Migration Planning</h2>
<h3 id="heading-21-assess-the-current-environments">2.1. Assess the Current Environments</h3>
<ul>
<li><strong>Inventory Objects</strong>: List all users, groups, computers, and service accounts in <strong>Company A's</strong> forest.</li>
<li><strong>Analyze Dependencies</strong>: Identify applications and services that rely on AD authentication.</li>
<li><strong>Review Group Policies</strong>: Document existing Group Policy Objects (GPOs) and their settings.</li>
<li><strong>Check DNS Configurations</strong>: Ensure DNS settings are correctly configured for name resolution between forests.</li>
</ul>
<h3 id="heading-22-define-the-target-environment">2.2. Define the Target Environment</h3>
<ul>
<li><strong>Design OU Structure</strong>: Plan the Organizational Unit (OU) hierarchy in <strong>Company B's</strong> forest to accommodate migrated objects.</li>
<li><strong>Establish Naming Conventions</strong>: Decide on consistent naming for users, groups, and computers.</li>
<li><strong>Set Up GPOs</strong>: Prepare necessary GPOs in the target environment to maintain security and compliance.</li>
</ul>
<hr />
<h2 id="heading-3-establishing-trust-between-forests">3. Establishing Trust Between Forests</h2>
<h3 id="heading-31-create-forest-trust">3.1. Create Forest Trust</h3>
<ul>
<li>Use Active Directory Domains and Trusts: On a domain controller in <strong>Company B's</strong> forest, open the tool and create a new forest trust pointing to <strong>Company A's</strong> forest.</li>
<li>Select Trust Type: Choose "Forest Trust" and ensure it's transitive.</li>
<li>Set Trust Direction: Configure the trust as two-way to allow bidirectional authentication.</li>
</ul>
<h3 id="heading-32-verify-trust">3.2. Verify Trust</h3>
<ul>
<li>Validate Trust: Use the "Validate" option to ensure the trust is functioning correctly.</li>
<li>Check Name Resolution: Confirm that DNS name resolution works between forests.</li>
</ul>
<hr />
<h2 id="heading-4-preparing-the-migration-environment">4. Preparing the Migration Environment</h2>
<h3 id="heading-41-install-admt">4.1. Install ADMT</h3>
<ul>
<li>Download ADMT: Obtain the latest version of ADMT from Microsoft's official website.</li>
<li>Install on Target Domain: Set up ADMT on a member server in <strong>Company B's</strong> forest.</li>
<li>Configure SQL Server: ADMT requires a SQL Server instance; install SQL Server Express if necessary.</li>
</ul>
<h3 id="heading-42-set-up-password-export-server-pes">4.2. Set Up Password Export Server (PES)</h3>
<ul>
<li>Install PES on Source Domain: On a domain controller in <strong>Company A's</strong> forest, install the PES service.</li>
<li>Generate Encryption Key: On the ADMT server, run the following command:</li>
</ul>
<pre><code class="lang-bash">admt key /option:create /sourcedomain:CompanyA.local /keyfile:<span class="hljs-string">"C:\Key\key.pes"</span> /keypassword:YourPassword
</code></pre>
<ul>
<li>Transfer Key File: Copy the generated key file to the PES server in <strong>Company A's</strong> forest.</li>
<li>Configure PES: During installation, provide the path to the key file and the corresponding password.</li>
</ul>
<hr />
<h2 id="heading-5-configuring-source-and-target-domains">5. Configuring Source and Target Domains</h2>
<h3 id="heading-51-enable-auditing">5.1. Enable Auditing</h3>
<p>To migrate SID history, auditing must be enabled on both source and target domains.</p>
<ul>
<li><p>Edit Default Domain Controllers Policy:</p>
<ul>
<li>Navigate to <code>Computer Configuration &gt; Windows Settings &gt; Security Settings &gt; Local Policies &gt; Audit Policy</code>.</li>
<li>Enable "Audit account management" and "Audit directory service access" for success and failure.</li>
</ul>
</li>
<li><p>Update Group Policy:</p>
<pre><code class="lang-bash">gpupdate /force
</code></pre>
</li>
</ul>
<h3 id="heading-52-create-migration-group">5.2. Create Migration Group</h3>
<p>In the source domain (<strong>Company A</strong>), create a local group named <code>CompanyA$$$</code>. This group is required for SID history migration.</p>
<ul>
<li>Using Active Directory Users and Computers:<ul>
<li>Create a new group in the "Users" container.</li>
<li>Name it <code>CompanyA$$$</code>.</li>
<li>Set the group scope to "Domain Local" and type to "Security".</li>
</ul>
</li>
</ul>
<h3 id="heading-53-modify-registry-for-tcpipclientsupport">5.3. Modify Registry for TcpipClientSupport</h3>
<p>On the primary domain controller in the source domain, enable <code>TcpipClientSupport</code>.</p>
<ul>
<li><p>Registry Path:</p>
<pre><code class="lang-plaintext">HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
</code></pre>
</li>
<li><p>Add DWORD: <code>TcpipClientSupport</code> with a value of <code>1</code>.</p>
</li>
<li>Restart Server: Reboot the domain controller to apply changes.</li>
</ul>
<hr />
<h2 id="heading-6-performing-the-migration">6. Performing the Migration</h2>
<h3 id="heading-61-migrate-groups">6.1. Migrate Groups</h3>
<ul>
<li>Open ADMT: Launch the ADMT console on the target domain.</li>
<li>Select Group Account Migration Wizard: Follow the wizard to select source and target domains.</li>
<li>Choose Groups: Select the groups to migrate.</li>
<li>Configure Options:<ul>
<li>Enable SID history migration.</li>
<li>Update group memberships.</li>
</ul>
</li>
<li>Run Migration: Execute the migration and review the logs for any errors.</li>
</ul>
<h3 id="heading-62-migrate-users">6.2. Migrate Users</h3>
<ul>
<li>Select User Account Migration Wizard: In ADMT, choose the user migration wizard.</li>
<li>Choose Users: Select users from the source domain.</li>
<li>Set Target OU: Specify the Organizational Unit in the target domain.</li>
<li>Configure Options:<ul>
<li>Migrate passwords using PES.</li>
<li>Enable SID history migration.</li>
<li>Translate roaming profiles and user rights.</li>
</ul>
</li>
<li>Run Migration: Start the process and monitor for issues.</li>
</ul>
<h3 id="heading-63-migrate-computers">6.3. Migrate Computers</h3>
<ul>
<li>Select Computer Migration Wizard: Use ADMT to initiate computer migration.</li>
<li>Choose Computers: Select the computers to migrate.</li>
<li>Install Agent: ADMT will install an agent on each computer to facilitate the migration.</li>
<li>Configure Options:<ul>
<li>Translate local profiles.</li>
<li>Update user rights.</li>
</ul>
</li>
<li>Run Migration: Execute and ensure computers reboot into the new domain.</li>
</ul>
<h3 id="heading-64-security-translation">6.4. Security Translation</h3>
<p>To maintain access to resources, perform security translation.</p>
<ul>
<li>Select Security Translation Wizard: In ADMT, choose this option.</li>
<li>Choose Objects: Select users and computers requiring translation.</li>
<li>Configure Options:<ul>
<li>Translate file and folder permissions.</li>
<li>Update local group memberships.</li>
<li>Translate user profiles.</li>
</ul>
</li>
<li>Run Translation: Execute and verify access to resources.</li>
</ul>
<hr />
<h2 id="heading-7-post-migration-tasks">7. Post-Migration Tasks</h2>
<h3 id="heading-71-validate-migration">7.1. Validate Migration</h3>
<ul>
<li>Check Object Integrity: Ensure all users, groups, and computers exist in the target domain.</li>
<li>Verify Access: Confirm users can access necessary resources.</li>
<li>Review Logs: Analyze ADMT logs for any errors or warnings.</li>
</ul>
<h3 id="heading-72-decommission-source-domain">7.2. Decommission Source Domain</h3>
<ul>
<li>Disable Accounts: In <strong>Company A's</strong> domain, disable migrated user and computer accounts.</li>
<li>Monitor for Issues: Wait for a predefined period to ensure stability.</li>
<li>Remove Trust: Once confident, remove the trust relationship between forests.</li>
<li>Decommission Domain Controllers: Safely demote and decommission domain controllers in the source domain.</li>
</ul>
<hr />
<h2 id="heading-conclusion">Conclusion</h2>
<p>By following this detailed guide, organizations can effectively migrate Active Directory objects between forests using ADMT. Proper planning, thorough testing, and careful execution are critical to ensure a smooth transition with minimal impact on users and services.</p>
<hr />
<h2 id="heading-references">References</h2>
<ul>
<li><a target="_blank" href="https://learn.microsoft.com/en-us/windows-server/identity/admt/active-directory-migration-tool">Microsoft Learn: Active Directory Migration Tool (ADMT)</a></li>
<li><a target="_blank" href="https://www.varonis.com/blog/active-directory-migration-tool">Varonis: Active Directory Migration Tool (ADMT): Your Essential Guide</a></li>
<li><a target="_blank" href="https://learn.microsoft.com/en-us">Microsoft Docs: How to troubleshoot inter-forest sIDHistory migration with ADMTv2</a></li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Building a Wazuh SIEM Lab Using VirtualBox on a Windows 11 Host]]></title><description><![CDATA[Building a Wazuh SIEM Lab Using VirtualBox on a Windows 11 Host
Introduction
Let’s face it: the cyber threat landscape is evolving faster than ever. With more devices, more data, and more vulnerabilities, staying ahead of attackers is a serious chall...]]></description><link>https://blog.suyogadhikari05.com.np/home-lab-setup</link><guid isPermaLink="true">https://blog.suyogadhikari05.com.np/home-lab-setup</guid><dc:creator><![CDATA[Suyog Adhikari]]></dc:creator><pubDate>Sun, 09 Jun 2024 16:25:29 GMT</pubDate><content:encoded><![CDATA[<h1 id="heading-building-a-wazuh-siem-lab-using-virtualbox-on-a-windows-11-host">Building a Wazuh SIEM Lab Using VirtualBox on a Windows 11 Host</h1>
<h2 id="heading-introduction">Introduction</h2>
<p>Let’s face it: the cyber threat landscape is evolving faster than ever. With more devices, more data, and more vulnerabilities, staying ahead of attackers is a serious challenge. That’s where SIEM (Security Information and Event Management) solutions come into play. These tools are like the central nervous system of modern cybersecurity operations—collecting, analyzing, and responding to security data in real-time.</p>
<p>In this guide, we’ll explore how to deploy one of the most popular open-source SIEM platforms: Wazuh. But this isn’t just a technical manual. We’ll dig into the <em>what</em>, <em>why</em>, and <em>how</em> of Wazuh, walk you through a real-world lab setup using VirtualBox, and make sure you’re not just following commands—but truly understanding the power of what you’re building.</p>
<hr />
<h2 id="heading-what-exactly-is-wazuh">What Exactly is Wazuh?</h2>
<p>Imagine having eyes and ears on every server, desktop, and device in your network. That’s what Wazuh does. It’s an open-source security monitoring platform born from the original OSSEC project but now fully evolved into a modern SIEM powerhouse. Wazuh monitors your systems, detects intrusions, enforces compliance policies, analyzes logs, and helps you respond to incidents—all from one central dashboard.</p>
<p>Behind the scenes, Wazuh works like a well-coordinated orchestra. It has lightweight agents that sit on each machine, keeping tabs on system activity. These agents send data to a manager component that processes everything using a ruleset. Then, the indexer (a customized Elasticsearch fork) stores and structures that data, and finally, the dashboard (based on Kibana) lets you visualize and interact with the alerts and events.</p>
<p>Wazuh can be deployed in the cloud, on-premises, or in hybrid environments. It supports Windows, Linux, macOS, and even Docker containers. Whether you’re monitoring a few endpoints or thousands, Wazuh is built to scale.</p>
<hr />
<h2 id="heading-why-wazuh-and-not-something-else">Why Wazuh and Not Something Else?</h2>
<p>There are plenty of commercial SIEMs out there—Splunk, QRadar, ArcSight to name a few. But here’s the kicker: they can be expensive, complex to license, and not always customizable. Wazuh flips the script. It’s free, open-source, and incredibly powerful. You get full control over your SIEM stack with no vendor lock-in. </p>
<p>On top of that, Wazuh integrates seamlessly with the Elastic Stack, so you can leverage the speed and scalability of Elasticsearch along with the visualization power of Kibana. And with features like active response, compliance auditing, and file integrity monitoring baked in, it’s more than just a log collector—it’s a full-fledged security operations platform.</p>
<hr />
<h2 id="heading-how-wazuh-works-the-magic-behind-the-curtain">How Wazuh Works – The Magic Behind the Curtain</h2>
<p>Think of Wazuh as a five-layer system. First, you have the <strong>Wazuh Agents</strong>, tiny programs installed on endpoints that watch everything—logins, file changes, system events. They talk securely to the <strong>Wazuh Manager</strong>, which processes all that juicy data, comparing it against known rules and generating alerts when something fishy happens.</p>
<p>Next comes <strong>Filebeat</strong>, a log shipper that ferries the alerts from the manager to the <strong>Wazuh Indexer</strong>. This indexer is like a giant library that catalogs every alert and log entry so you can search, filter, and analyze them in real time. Finally, the <strong>Wazuh Dashboard</strong> gives you a sleek web interface to visualize it all. Pie charts, timelines, filters—you name it. It’s like your security command center.</p>
<p>Altogether, these components create a closed-loop system that detects, processes, stores, and visualizes every event across your network.</p>
<hr />
<h2 id="heading-why-build-this-lab">Why Build This Lab?</h2>
<p>If you want to understand cybersecurity, theory isn’t enough. You need practice. This lab simulates a real-world enterprise setup with multiple endpoints, a firewall, and centralized SIEM monitoring. You’ll not only install Wazuh, but configure a firewall (pfSense), generate network traffic, simulate attacks, and watch the alerts pop up live.</p>
<p>It’s the perfect playground for students, aspiring SOC analysts, blue teamers, or IT admins making the leap into cybersecurity. And since we’re using VirtualBox, you don’t need expensive hardware or cloud infrastructure. Just a decent PC and some time to tinker.</p>
<hr />
<h2 id="heading-the-lab-setup-what-youre-building">The Lab Setup – What You’re Building</h2>
<p>We’re building a mini enterprise network inside your Windows 11 machine using VirtualBox. Picture this: your host machine is running four virtual machines. One is a firewall to segment the network and simulate real-world conditions. Two are Wazuh components—one for the indexer and one for the server/dashboard. And then you’ve got two endpoints—a Linux desktop and a Windows machine—to act as monitored systems.</p>
<p>The internal network is set to 10.10.20.0/24. The firewall has IP 10.10.20.1 and connects to the internet via NAT. The Wazuh Indexer gets 10.10.20.10, and the Server/Dashboard takes 10.10.20.11. The endpoints get their IPs via DHCP. Each VM is carefully configured with realistic resource allocations to mimic production behavior.</p>
<hr />
<h2 id="heading-getting-started-prepare-the-playground">Getting Started – Prepare the Playground</h2>
<p>First, install VirtualBox and its Extension Pack from the official website. You’ll also need the ISO files for Ubuntu Server, Ubuntu Desktop, Windows 10 or 11, and pfSense. Create a host-only network in VirtualBox to simulate your internal lab network. Let’s call it <code>vboxnet0</code>. Disable its DHCP server—we’ll assign static IPs manually for consistency.</p>
<p>Start by setting up the pfSense firewall. Give it two network adapters: one NAT (for internet access) and one on <code>vboxnet0</code> for LAN. Install pfSense, configure interfaces, and assign the LAN IP to 10.10.20.1.</p>
<p>Next, create the Wazuh Indexer VM. Use Ubuntu Server, allocate 3GB RAM and 2 CPUs. Assign it IP 10.10.20.10 and install the Wazuh Indexer using official packages. Repeat the process for the Wazuh Server/Dashboard VM, assigning IP 10.10.20.11 and installing the Wazuh manager, Filebeat, and the dashboard.</p>
<p>Finally, spin up your Linux and Windows endpoints. Use DHCP to assign them IPs automatically. These will serve as monitored systems, where you’ll install the Wazuh agent and simulate events.</p>
<hr />
<h2 id="heading-installing-the-pieces-step-by-step">Installing the Pieces – Step by Step</h2>
<p>On the Wazuh Indexer VM:</p>
<pre><code class="lang-bash">sudo apt update &amp;&amp; sudo apt install wazuh-indexer -y
</code></pre>
<p>On the Wazuh Server/Dashboard VM:</p>
<pre><code class="lang-bash">sudo apt update &amp;&amp; sudo apt install wazuh-manager filebeat wazuh-dashboard -y
</code></pre>
<p>Enable and start the services, then access the dashboard via <code>https://10.10.20.11</code>. Default login is <code>admin/admin</code>. Make sure to change the password after logging in.</p>
<p>On your Linux endpoint:</p>
<pre><code class="lang-bash">curl -sO https://packages.wazuh.com/4.x/apt/install.sh
sudo bash install.sh --agent
sudo /var/ossec/bin/agent-auth -m 10.10.20.11
sudo systemctl <span class="hljs-built_in">enable</span> --now wazuh-agent
</code></pre>
<p>On the Windows endpoint, download the agent installer from the Wazuh site, install it, and configure it to point to the manager’s IP.</p>
<hr />
<h2 id="heading-watching-it-all-come-together">Watching It All Come Together</h2>
<p>Log in to your Wazuh dashboard and navigate to the <strong>Agents</strong> tab. If everything’s working, you’ll see your endpoints listed and connected. Trigger some events—like modifying system files, creating users, or installing software—and watch the alerts roll in.</p>
<p>This is the real magic of Wazuh. You get full visibility across your systems, real-time alerting, and an intuitive dashboard to manage everything.</p>
<hr />
<h2 id="heading-where-to-go-from-here">Where to Go From Here</h2>
<p>Once your lab is running, don’t stop there. Try integrating threat intelligence feeds. Tune the rules to reduce false positives. Enable email or Slack notifications. You can also explore advanced log pipelines using Logstash, or even forward logs from cloud services into Wazuh.</p>
<p>This lab is just the beginning. Mastering Wazuh means diving deep into alert tuning, detection engineering, and automation. It’s your first step into the world of blue team operations.</p>
<hr />
<h2 id="heading-references">References</h2>
<p>Wazuh Official Docs: https://documentation.wazuh.com<br />Elastic Stack Overview: https://www.elastic.co/what-is/elk-stack<br />Wazuh GitHub: https://github.com/wazuh/wazuh<br />pfSense Firewall: https://www.pfsense.org/download/<br />Filebeat Documentation: https://www.elastic.co/guide/en/beats/filebeat/current/index.html<br />OSSEC Project: https://www.ossec.net<br />SANS SIEM White Papers: https://www.sans.org/white-papers/siem/<br />Compliance Features: https://documentation.wazuh.com/current/compliance/index.html</p>
<hr />
<p><em>This guide is designed to empower curious minds to build real security solutions with real tools. Stay tuned for upcoming posts on detection tuning, active response, and cloud SIEM integration.</em></p>
]]></content:encoded></item></channel></rss>