wazuh-documentation
wazuh-ruleset
wazuh-documentation | wazuh-ruleset | |
---|---|---|
5 | 1 | |
164 | 319 | |
3.0% | - | |
9.9 | 4.7 | |
2 days ago | over 2 years ago | |
JavaScript | Python | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wazuh-documentation
- wazuh-archive* index not found in Stack Management / Index Patterns.
-
Custom dashboard with custom visualization to completely replace wazuh dashboard?
First of all, the Wazuh dashboard, created from Kibana, is an individual package, and as so, could be replaced by another package, and this could be not based on Kibana. Depending on the features you are missing in the default Wazuh dashboard, maybe it would be better to use a simpler solution. One options is to just create new visualizations from inside the installed dashboard. Another option would be creating a different package with the modifications you see fit. - For the first option, here you have a tutorial, as it has not yet been added to the documentation: https://github.com/wazuh/wazuh-documentation/issues/5511 - For the second option, all code to create the packages is located in https://github.com/wazuh/wazuh-packages. If none of this solutions is enough for your problem, the APIs you would need to control in your custom dashboards are the ones for the Wazuh server and the Wazuh indexer: - Wazuh API(accessed by port 55000): https://documentation.wazuh.com/current/user-manual/api/index.html#restful-api - Indexer API(accessed by port 9200): https://www.elastic.co/guide/en/elasticsearch/reference/current/rest-apis.html
-
About the log retention management
You can store both alerts and events ( archive logs ) in Wazuh Indexer. (https://github.com/wazuh/wazuh-documentation/issues/4433)
-
What's the default login ID / password for the (self-served) Wazuh dashboard?
Thank you u/granth515 for your feedback! We have created this issue to add this information.
-
Decoders for Watchguard firewalls
Yes, now you should create custom alerts for those events according to your needs. I should not recommend activating the logall option in a production environment. This will take up a lot of your disk space with duplicated events. However, if you want to see archives in Elasticsearch is necessary to follow these steps https://github.com/wazuh/wazuh-documentation/issues/4433.
wazuh-ruleset
-
Windows events alerts with Wazuh
In this repository https://github.com/wazuh/wazuh-ruleset you can find the decoders and rules that wazuh-manager has by default (all these files are being migrated to the repository wazuh/wazuh https://github.com/wazuh/wazuh).
What are some alternatives?
howtheysre - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
sigma - Main Sigma Rule Repository
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Fail2Ban - Daemon to ban hosts that cause multiple authentication errors
OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
openscap - NIST Certified SCAP 1.2 toolkit
wazuh-ansible - Wazuh - Ansible playbook
openwisp-monitoring - Network monitoring system written in Python and Django, designed to be extensible, programmable, scalable and easy to use by end users: once the system is configured, monitoring checks, alerts and metric collection happens automatically.
sysmon - Sysmon and wazuh integration with Sigma sysmon rules [updated]
loglizer - A machine learning toolkit for log-based anomaly detection [ISSRE'16]
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Check-WP-CVE-2020-35489 - The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489