Sibling decoders: flexible extraction of information
A key feature in Wazuh is its high capacity for expansion, which allows our users to adapt its behavior to an infinite set of needs. Our development team and the...
A key feature in Wazuh is its high capacity for expansion, which allows our users to adapt its behavior to an infinite set of needs. Our development team and the...
Wazuh helps you comply with the security standards in which logs are required to be maintained for several months so that they can be provided on the spot in case...
In this post you will find how to configure Elasticsearch to automatically back up your Wazuh indices in local or Cloud-based storage and restore them at any given time, both...
This post focuses on setting up Wazuh to collect events delivered by AWS CloudTrail which provides useful information about the AWS infrastructure, such as the instance configuration, unauthorized behavior, API...
Encryption is the conversion of data from a readable format into an encoded format that can only be read or processed after it’s been decrypted. The Advanced Encryption Standard (AES),...
Hi everyone, the team is pleased to announce the release of Wazuh 3.10.0. This new version comes with lots of additions and improvements. Here are some highlights of the new...
Hi everyone, The team is pleased to announce the release of Wazuh v3.11. This new version comes with lots of additions and improvements, so here are some of the release...
Wazuh provides an out-of-the-box set of rules used for threat detection and response. This ruleset is continuously updated thanks to the work of our contributors and developers. Moreover, users can...
...Oznet automates monitoring rules, allowing their analysts to focus on proactive cyberdefense measures. Juan Echeverría, CEO of Oznet, remarked, “Wazuh has the flexibility we need to apply all the knowledge...
After posting this article I wanted to improve the template for the PoC guide, when deploying this template it allows to choose…
There are many options to log all commands from a user or all users in Linux to Wazuh…
For IT professionals and anyone taking their first steps into cybersecurity a good place to start learning is with the open source product Wazuh…
Please make sure that all words are spelled correctly.