Prerequisites
- Fresh machine with Ubuntu 24.04 LTS (other Linux OS may work as well, but not tested). We do not recommend using machines that have other services running except you understand what you are doing.
- System Requirements:
- Broadband internet connections
CPU | RAM (GB) | Storage (GB) | Remarks | |
---|---|---|---|---|
Minimum Requirements For trial deployments | 4 | 8 | 50 | Swap memory activation required |
Standard Requirements For production environments and continuous development | 8 | 12 | 100 | No need swap memory |
Installation Steps
First, you need to clone the repository:
Figure 1. T-Guard Installer Main Menu
Step 1: Update System and Install Prerequisites
In the Main Menu, type ‘1’ and press Enter. This will update existing packages, install all necessary dependencies, and set up Docker. Wait for the process to complete and it will then return to the Main Menu.Step 2: Install T-Guard SOC Package
In the Main Menu, type ‘2’ and press Enter. You’ll see a menu to choose the current network environment of your system for installing T-Guard, as shown in Figure 2.
FIgure 2. Network Environtment Options


Figure 3. Wazuh Installation

Figure 4. Shuffle Installation

Figure 5. IRIS-DFIR Instalation

Figure 6. MISP Installation

Figure 7. Dashboard Access and Default Credentials
.png)
Figure 8. Warning Page
.avif)
Figure 9. Wazuh Login Page
.png)
Figure 10. Wazuh Dashboard
.png)
Figure 11. Shuffle Dashboard
.avif)
Figure 12. IRIS Dashboard
.png)
Figure 13. MISP Dashboard
Credential Summary – T-Guard Modules
Service | Web Interface | Username | Password |
---|---|---|---|
Wazuh | https://<ip> | admin | SecretPassword |
DFIR-IRIS | https://<ip>:8443 | administrator | MySuperAdminPassword! |
Shuffle | http://<ip>:3001 | administrator | MySuperAdminPassword! |
MISP | https://<ip>:1443 | admin@admin.test | admin |
Integration Steps
In the Main Menu, type ‘3’ and press Enter. The system will prompt you to enter the IRIS API key, as shown in Figure 14.
Figure 14. Input API KEY



https://www.virustotal.com/ If you already have an account, log in, click your profile name, and select ‘API Key’ to view it.


- Go to your Shuffle dashboard.
- Select Experienced.
- Select New Workflow.
- Specify your preferred workflow name—for example, test. > select Done.
-
In the left panel, select Trigger tab, then drag the Webhook to the middle panel as illustrated below.
-
Click on Webhook module, then it will show up the configuration panel on the right.
- In the “Webhook URL” parameter, manually copy the URL by highlighting it until the end of the url, then press Ctrl+C.

- Paste it to the installation terminal, then press Enter. Wait until the process is finished.
- Go back to the Shuffle, click the Start button as illustrated below.

-
Next, select the Shuffle module in the middle panel, then it will show up the configuration panel on the right.
- In the “Find Actions” parameter, make sure to select ‘Repeat back to me’.
- In the “Call” parameter, change the value to
$exec
, then click the Save button, as illustrated below.




- Find Actions: Add a new case
- Apikey: (insert your IRIS API Key)
- Url: (your IRIS url)









Use Case

Use Case 1: Brute-Force Simulation



Use Case 2: Malware Detection and Auto-Response
In the PoC Menu, type ‘2’ and press Enter. Open your Wazuh page (https://<your_ip>). It would be appear an event about VirusTotal detect the malware, the deletion of the file, and the activated response regarding to the malware, illustrated below.

Use Case 3: Web Defacement Detection
In the PoC Menu, type ‘3’ and press Enter. Before simulate the web defacement, open the given link (http://<your_ip>:3000) in your browser. It will direct you to the example website that created by the script.

