In recent years increasing waves of attacks with ransomware have been reported targeting different business sectors. This particular type of malware is designed to deny access to a computer system [...]
Learn how to monitor root actions on Linux using Auditd and Wazuh.
The Security Configuration Assessment module (SCA) was added to the Wazuh platform in version 3.9.0. It provides out-of-the-box checks that are used for systems hardening. The module works on all [...]
Find out how Wazuh helps you comply with the widely used security standard NIST 800-53.
Kubernetes auditing offers insight into security-relevant events occurring in your system. Discover how you can audit Kubernetes with Wazuh.
Learn how to configure Wazuh to forward alerts via email. It is a useful way to get notifications about the most important events that occur in our monitored hosts.
Every Android device has its system logs just like any other operating system. This post will teach you how to send these logs to a Wazuh manager instance and how [...]
Running Wazuh with Docker allows for a fast and easy deploy. This post will show you how to set up an auto-scalable Wazuh cluster using Docker compose.
There are several layers of abstraction in the Wazuh software. We will focus on the Framework layer, we are going to see how we can use it for the development [...]
You can use Wazuh to detect intruders in your system, undesired software, or incorrect parameters on a process. Learn how to create custom rules based on the system information of [...]