Continuing the series on Selling Your Information Security Team, it’s now time to start building the Utility Virtual Machine that will host all the support programs and applications used in the demonstration. This post will cover building that very importation Swiss Army Knife of the demonstration … the Utility Virtual Machine. In Part 2 of this series, we built the host environment and defined the two networks joined by the firewall. Then in Part 3 we build the firewall to join the previously defined networks together.
Now it’s time to build the Swiss Army Knife of the demonstration: The Utility VM. This system will host the Snort IDS, the WebMail service and the cornerstone of the demonstration: the Splunk Service. In this part, we walk through installing the OS, Snort and WebMail.