TeskaLabs LogMan.io is a SIEM (Security Information and Event Management) and advanced log management cyber security tool.
The NFR (Not-For-Resale) release of TeskaLabs LogMan.io is distributed as a virtual machine.
The NFR VM is intended for evaluation, demonstrations, proof-of-concept deployments, and training purposes.
The following guide covers how to start and operate the TeskaLabs LogMan.io NFR Virtual Machine.
The VM image is encrypted, after the download, you have to decrypt it using following command.
The password will be provided on request by support@teskalabs.com or your assigned TeskaLabs representative.
$ openssl enc -aes-256-cbc -d -pbkdf2 -in lmionfr2602-...enc -out lmionfr2602-....ova
Checksums:
$ shasum -a 256 lmionfr2602-virtualbox.ova
a5a0e2328ecbd10319beb4eb8481209b61ed49e1704ada7530260d0a0d1ffdb2 lmionfr2602-virtualbox.ova
$ shasum -a 256 lmionfr2602-vmware.ova
078683ab8559403ea6e26db6fbb21abf6c042f91c7decc0573d0f16f97e29f6b lmionfr2602-vmware.ova
Minimum specifications:
| Resource |
Requirement |
| CPU |
2 cores |
| RAM |
48 GB |
| Disk |
300 GB (thin provisioning) |
| OS |
Linux Ubuntu Server 22.04 LTS |
Tip
You may add more resources to improve performance, but do not allocate less than the values above.
Configure networking according to your needs. We recommend bridge mode so that the NFR VM is accessible from your local network and you can easily set up log shipping into TeskaLabs LogMan.io.
After booting, the detected primary IP address will be printed on the VM's terminal.
Note this IP address — you will need it in the next step (referred to as x.x.x.x).

Add the following line to your system hosts file, replacing x.x.x.x with the IP address from the previous step:
x.x.x.x lmionfr2602.logman.int
Hosts file location by OS:
- Windows —
C:\Windows\System32\drivers\etc\hosts
- Linux / macOS —
/etc/hosts
Open a web browser and navigate to: https://lmionfr2602.logman.int
You will see a privacy warning about the TLS certificate — this is expected, as the VM uses a self-signed certificate. Accept the warning and proceed to the web application.
Tip
We highly recommend using a recent version of Google Chrome.
The username is nfruser, password is NFRuser123:) and the default tenant is nfr.
We advise you to change the password of the nfruser as soon as possible.
There is an integrated log collector running within the NFR VM, connected to nfr tenant.
This integrated collector is listening on ports 514, 1514, 6514, both TCP and UDP for a syslog logs.
You can also ship logs over TLS to these ports, there is an autodetection and internal Certificate Authority running within the NFR VM.
For a comprehensive documentation of how to use TeskaLabs LogMan.io, continue to TeskaLabs LogMan.io Documentation
The user name is tladmin and the password is tladmin.
You can login from the VM console.
The SSH is enabled/disabled.
The network is configured using Netplan on the OS level.
The configuration is stored at /etc/netplan/ directory.
The DHCP client is enabled on the primary virtual network interface by default.
NFR VM is configured for a very short log retency.
It can be prolonged in the product settings.
Version of the TeskaLabs LogMan.io NFR VM: 26.02