Dedicated Server → Configure SIEM

How to configure SIEM (Security Information and Event Management) on your dedicated server

Your server might look quiet on the surface, but what’s happening in the logs tells a very different story. Hidden threats, brute-force attempts, and subtle misconfigurations can slip by unnoticed—unless you’ve got the right eyes on everything. That’s where SIEM comes in.

What is SIEM and why does your server need it?

SIEM (Security Information and Event Management) is a centralized solution for collecting, analyzing, and responding to log data from across your server infrastructure. It combines real-time monitoring with historical data analysis to detect threats, maintain compliance, and support forensic investigations.

For dedicated servers, SIEM fills a critical gap in visibility. It helps:

Choosing the right SIEM tool for your setup

You don’t need to go full enterprise to benefit from SIEM. Here’s a breakdown of options:

Open source options:

Commercial tools:

Stick with Wazuh or OSSEC if you’re running a single dedicated server. They’re resource-conscious and highly capable.

SIEM prerequisites on your dedicated server

Before you install anything, make sure your server is ready:

Step-by-step: Installing a SIEM solution (Wazuh) on your server

Let’s walk through setting up Wazuh, which includes log analysis, a web dashboard, and rule-based alerting.

1. Install dependencies and update your server

sudo apt update && sudo apt upgrade -y
sudo apt install curl apt-transport-https lsb-release gnupg -y

2. Add Wazuh repository and install the manager

curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | sudo gpg –dearmor -o /usr/share/keyrings/wazuh.gpg

echo “deb [signed-by=/usr/share/keyrings/wazuh.gpg] https://packages.wazuh.com/4.x/apt/ stable main” | \
  sudo tee /etc/apt/sources.list.d/wazuh.list

sudo apt update
sudo apt install wazuh-manager -y

3. Start and enable Wazuh manager

sudo systemctl daemon-reexec
sudo systemctl enable –now wazuh-manage

4. Install and configure the Wazuh agent (optional on same server)

sudo apt install wazuh-agent -y
sudo nano /var/ossec/etc/ossec.conf
# Set <address> to your Wazuh manager’s IP if running agent separately
sudo systemctl enable –now wazuh-agent

5. Set up the Wazuh dashboard (via OpenSearch Dashboards)

Wazuh ships with its own dashboard. Quick setup:

curl -sO https://packages.wazuh.com/4.6/wazuh-install.sh
sudo bash wazuh-install.sh -a

This installs the full Wazuh stack with OpenSearch and dashboards.

Integrating SIEM with other tools and log sources

Once installed, expand your SIEM coverage:

Example for Apache logs:

<localfile>
  <log_format>syslog</log_format>
  <location>/var/log/apache2/access.log</location>
</localfile>

Configuring alerts and monitoring rules

Wazuh includes a rule-based engine that supports email, Slack, or custom webhook alerts.

Steps:

Example Slack alert integration via webhook:

Performance tips for running SIEM on a dedicated server

SIEM can eat resources fast if not tuned. Keep it lean:

Additional resources

What is a dedicated server? →

Benefits, use cases, and how to get started

Is renting or buying a dedicated server better for your business? →

Explore the pros and cons of renting vs. buying a dedicated server to make the best decision for your business.

Fully managed dedicated hosting →

What it means and what fully managed services cover on dedicated hosting

After studying Mechanical Engineering at Lawrence Technological University, Jeff Goudie earned a Computer Science degree at Eastern Michigan University. He began his career as a mainframe operator, unaware that the tiny IBM XT personal computers he was installing would take off and revolutionize the way we live. Eventually, he was hired directly at Chrysler to support their lab equipment, computers, and dynamometers, a tech journey that led him to Liquid Web.