This document provides comprehensive instructions for deploying the AI-Augmented Security Operations Center (AI-SOC) platform. The deployment process has been designed to minimize technical complexity while maintaining enterprise-grade security and performance standards.
The AI-SOC platform requires two foundational software packages for operation. Both components are freely available and must be installed prior to system deployment.
Docker Desktop provides the containerization infrastructure necessary for AI-SOC service orchestration. The platform utilizes Docker Compose for multi-container deployment and management.
Installation Procedure (Windows):
- Navigate to https://www.docker.com/products/docker-desktop/
- Execute the installer package
- Select "Use WSL 2" (Windows Subsystem for Linux 2) when prompted
- Complete system restart as required
- Verify Docker Desktop initialization via system tray indicator
Minimum System Requirements:
- Memory: 16GB RAM (32GB recommended for optimal performance)
- Storage: 50GB available disk space
- Operating System: Windows 10/11 (Professional or Home edition)
Python 3.x serves as the runtime environment for the graphical launcher interface and web dashboard components.
Installation Procedure:
- Download installer from https://www.python.org/downloads/
- Execute installer package
- Select "Add Python to PATH" during installation (critical requirement)
- Complete installation using default configuration
Note: The "Add to PATH" option ensures command-line accessibility for the launcher scripts.
The AI-SOC platform provides a graphical launcher interface for simplified deployment. This method is recommended for standard operational use.
Execution Procedure:
- Navigate to the AI_SOC installation directory
- Execute
START-AI-SOC.batvia double-click operation - The graphical control interface will initialize
- Select "START AI-SOC" to initiate service deployment
- Allow 1-2 minutes for complete service initialization
- Select "Open Dashboard" to access the web-based monitoring interface
Expected Behavior: The launcher will automatically validate prerequisites, install required Python dependencies, and initialize the control interface.
For command-line operation, the launcher may be invoked directly:
python AI-SOC-Launcher.pyThis method provides identical functionality through a terminal-based workflow.
The graphical control interface provides comprehensive system management capabilities through an integrated dashboard.
The interface employs color-coded status indicators for real-time system health monitoring:
- Green: All services operational and healthy
- Yellow: Services in initialization state (transient)
- Red: Service failure or attention required (consult system log)
The interface provides the following operational controls:
- START AI-SOC: Initiates all platform services via Docker Compose orchestration
- STOP AI-SOC: Gracefully terminates all running services
- Open Dashboard: Launches the web-based monitoring interface in the default browser
The status panel displays real-time operational state for all platform components:
- Wazuh Indexer (OpenSearch database backend)
- Wazuh Manager (SIEM core and security event processing)
- ML Inference (Machine learning threat detection engine)
- Alert Triage (Intelligent alert prioritization service)
- RAG Service (Retrieval-Augmented Generation knowledge base)
The integrated log console displays real-time system events, service initialization progress, and diagnostic information.
Following successful system initialization, the web dashboard provides comprehensive real-time monitoring capabilities.
Access URL: http://localhost:3000
The monitoring interface provides the following information panels:
- System Status: Overall platform health indicator (color-coded: green = operational, yellow = initializing, red = service failure)
- Service Count: Quantitative metric displaying number of active services versus total deployed services
- Service Details: Individual health status for each microservice component
- Auto-Refresh: Automatic status updates every 5 seconds via asynchronous polling
Symptom: Launcher reports Docker is not installed or not found.
Resolution:
- Complete Docker Desktop installation as described in Prerequisites section
- Verify Docker Desktop is running via system tray indicator
Symptom: Services fail to start with Docker daemon error.
Resolution:
- Locate Docker Desktop icon in system tray
- Right-click and select "Start" to initialize Docker daemon
- Wait for status message "Docker Desktop is running"
Symptom: Batch launcher reports Python is not installed or not in PATH.
Resolution:
- Reinstall Python runtime environment
- Ensure "Add Python to PATH" option is selected during installation
Symptom: One or more services fail to start or remain in unhealthy state.
Diagnostic Steps:
- Verify Docker Desktop is operational
- Confirm system meets minimum RAM requirements (16GB)
- Close resource-intensive applications to free system memory
- Attempt system restart to clear transient resource constraints
For persistent initialization failures:
- Execute STOP AI-SOC to gracefully terminate all services
- Wait 30 seconds for complete service shutdown
- Execute START AI-SOC to reinitialize deployment
The AI-SOC platform consists of six primary microservice components operating in coordinated fashion:
OpenSearch-based database backend providing persistent storage for security events, logs, and analytical data. Implements distributed search and aggregation capabilities for historical threat analysis.
Central security information and event management engine. Performs real-time log collection, correlation, and security event processing. Integrates with network agents for distributed monitoring.
Machine learning-based intrusion detection system trained on CICIDS2017 dataset. Achieves 99.28% classification accuracy for network-based threats using ensemble classification methods.
Intelligent alert filtering and prioritization service. Reduces false positive rates through multi-factor severity assessment and contextual analysis.
Retrieval-Augmented Generation service providing contextual threat intelligence. Supplies natural language explanations for detected security events using vector-based knowledge retrieval.
Embedding storage for RAG service. Maintains vector representations of threat intelligence data for semantic similarity search and knowledge retrieval operations.
Following successful deployment, the platform provides access to individual service endpoints for advanced integration:
- Wazuh Web Interface: https://localhost:443 (SIEM dashboard and configuration)
- ML Inference API: http://localhost:8500 (threat classification endpoint)
- Alert Triage API: http://localhost:8100 (alert management interface)
- Maintain Docker Desktop in running state during AI-SOC operation
- Allow 2-3 minutes for complete service initialization before accessing endpoints
- Monitor system health via web dashboard at regular intervals
- Execute graceful shutdown via STOP AI-SOC when platform is not required (conserves system resources)
- Do not terminate Docker Desktop while AI-SOC services are running (may cause data corruption)
- Do not manually stop containers via Docker CLI (bypasses graceful shutdown procedures)
- Do not attempt deployment on systems with less than 16GB RAM (insufficient resources)
- Do not interrupt service initialization sequence (allow full startup cycle)
Upon successful deployment, verify the following conditions are met:
- Docker Desktop operational and running
- Python runtime environment installed with PATH configuration
- START-AI-SOC.bat executed successfully
- All services reporting healthy status in control interface
- Web dashboard accessible and displaying current system state
- No error messages in system log console
For diagnostic assistance, consult the integrated log console or refer to the Troubleshooting Guide section.
The platform ships with default authentication credentials defined in the .env configuration file. These credentials are suitable for development and testing environments.
For production deployment or external network exposure, the following security hardening procedures are mandatory:
- Modify all default passwords in
.envconfiguration file - Enable SSL/TLS certificate-based encryption for all service endpoints
- Implement network-level access controls via firewall configuration
- Follow comprehensive security hardening procedures documented in
/docs/security-hardening.md - Establish regular security update and patch management procedures
For isolated testing, laboratory research, or educational purposes, default security configuration is acceptable provided the platform is not exposed to untrusted networks.