Documentation
This quick start guide will help you get up and running with the Veltrix Security Automation Platform in the shortest time possible. Follow these steps to set up a basic instance and start exploring the platform's security configuration management and security orchestration capabilities.
This guide provides instructions for the simplest deployment option. For alternative deployment methods or advanced configurations, please see the Installation Options documentation.
Before installing the Veltrix Security Automation Platform, ensure you have the following prerequisites:
Follow these steps to install the Veltrix Security Automation Platform:
Open a terminal and run the following command to download the installation script:
curl -sSL https://install.veltrixsecops.com > install.sh
chmod +x install.sh
Execute the installation script with the following command:
sudo ./install.sh
The script will perform the following actions:
Once the installation is complete, verify that the services are running correctly:
sudo systemctl status veltrix
You should see output indicating that the service is active (running).
For a Docker-based installation, you can use our Docker Compose configuration:
curl -sSL https://install.veltrixsecops.com/docker-compose.yml > docker-compose.yml
docker-compose up -d
Open a web browser and navigate to the following URL:
https://your-server-ip
If you're accessing the platform on the same machine where it's installed, you can use:
https://localhost
When you access the platform for the first time, you'll be prompted to create an administrator account. Fill in the following information:
Create a strong password for the administrator account. The platform enforces security configuration management best practices including password complexity requirements.
After creating the administrator account, you'll be guided through a basic configuration wizard. Configure the following settings:
Once you've completed the initial configuration, you'll be redirected to the main dashboard.
The Veltrix Security Automation Platform is designed to integrate with your existing security tools. Let's connect your first tool to implement security orchestration and security configuration management:
Fig 1: Security Orchestration Integration Dashboard with Connected Tools
From the main dashboard, click on Settings in the left navigation menu, then select Integrations.
Browse the available integrations or use the search function to find a specific tool. For this example, we'll connect to Splunk, a common SIEM solution:
https://splunk.example.com:8089
)For optimal security, create dedicated API accounts for the Veltrix platform in each of your security tools. This enables proper access control and audit trails.
After connecting the tool, you'll be prompted to configure default settings for this integration:
These settings can be adjusted later as needed.
Now let's create a simple security orchestration workflow to automate a common security task:
From the main dashboard, click on Automation in the left navigation menu, then select Workflows.
Click the Create Workflow button in the top-right corner of the page.
For this example, we'll create a simple workflow that automatically enriches security alerts:
Now let's test the workflow to ensure it works correctly:
Once you're satisfied with the testing results, activate the workflow:
The workflow is now active and will automatically run whenever the specified trigger event occurs.
Now that you have successfully installed the Veltrix Security Automation Platform, connected your first tool, and created your first workflow, here are some recommended next steps:
Learn how to customize and use the security operations dashboard.
Integrate additional security tools to expand your automation capabilities.
Configure security compliance automation for your regulatory frameworks.
Set up version control for security configurations and approval workflows.
If you need additional assistance, there are several resources available:
Was this documentation helpful? Let us know how we can improve it.