All-in-One Single-Node Automation Setup for Wazuh 4.9

All-in-One Single-Node Automation Setup for Wazuh 4.9

>
November 3rd 2025 / External Media
By Vikas Chauhan / Medium

Implementing a security monitoring system can often be complicated and a huge time investment. With Wazuh, you get an open-source integration of host-based intrusion detection, log analysis, and vulnerability management all in a single…

November 3rd 2025 / External Media

All-in-One Single-Node Automation Setup for Wazuh 4.9

By Vikas Chauhan / Medium

Implementing a security monitoring system can often be complicated and a huge time investment. With Wazuh, you get an open-source integration of host-based intrusion detection, log analysis, and vulnerability management all in a single…

Read more

>
Suricata-Wazuh 4.9 Test Case: Monitoring Attacks with DVWA and tmNIDS

Suricata-Wazuh 4.9 Test Case: Monitoring Attacks with DVWA and tmNIDS

>
November 3rd 2025 / External Media
By Iwhai Hanafi / Medium

In this post, I’ll continue our exploration of integrating Suricata with Wazuh 4.9 by applying the setup to a practical security use case. We’ll use DVWA (Damn Vulnerable Web Application) as our attack target and tmNIDS as a testing and monitoring…

November 3rd 2025 / External Media

Suricata-Wazuh 4.9 Test Case: Monitoring Attacks with DVWA and tmNIDS

By Iwhai Hanafi / Medium

In this post, I’ll continue our exploration of integrating Suricata with Wazuh 4.9 by applying the setup to a practical security use case. We’ll use DVWA (Damn Vulnerable Web Application) as our attack target and tmNIDS as a testing and monitoring…

Read more

>
Wazuh × Tines SOAR Integration: Lab Setup Phase 1

Wazuh × Tines SOAR Integration: Lab Setup Phase 1

>
October 30th 2025 / Ambassadors
By Hanif Kurniawan / Medium

This lab documents a simple integration between Wazuh (SIEM) and Tines (SOAR)

October 30th 2025 / Ambassadors

Wazuh × Tines SOAR Integration: Lab Setup Phase 1

By Hanif Kurniawan / Medium

This lab documents a simple integration between Wazuh (SIEM) and Tines (SOAR)

Read more

>
Zero Trust with Wazuh: Continuous Verification for Identities and Access

Zero Trust with Wazuh: Continuous Verification for Identities and Access

>
October 30th 2025 / Ambassadors
By Ismael Barrantes / Medium

Wazuh helps operationalize Zero Trust by serving as the visibility and control layer. It aggregates telemetry from endpoints, cloud workloads, and network devices, providing a unified view of user and system behavior.

October 30th 2025 / Ambassadors

Zero Trust with Wazuh: Continuous Verification for Identities and Access

By Ismael Barrantes / Medium

Wazuh helps operationalize Zero Trust by serving as the visibility and control layer. It aggregates telemetry from endpoints, cloud workloads, and network devices, providing a unified view of user and system behavior.

Read more

>
WAZUH UPGRADE (MULTINODE DEPLOYMENT) — COMPREHENSIVE GUIDE

WAZUH UPGRADE (MULTINODE DEPLOYMENT) — COMPREHENSIVE GUIDE

>
October 27th 2025 / Ambassadors
By Michal Bednarczyk / Medium

In this guide, I will show you step by step how to upgrade Wazuh to a higher version in a multinode deployment architecture. In this example, I have two Wazuh instances — Master and Worker.

October 27th 2025 / Ambassadors

WAZUH UPGRADE (MULTINODE DEPLOYMENT) — COMPREHENSIVE GUIDE

By Michal Bednarczyk / Medium

In this guide, I will show you step by step how to upgrade Wazuh to a higher version in a multinode deployment architecture. In this example, I have two Wazuh instances — Master and Worker.

Read more

>
Deploying a Wazuh Lab in a Virtual Environment — Step-by-Step Guide

Deploying a Wazuh Lab in a Virtual Environment — Step-by-Step Guide

>
October 25th 2025 / Ambassadors
By Mohammed Abbood / Medium

This tutorial walks you through setting up a complete Wazuh lab using virtual machines.

October 25th 2025 / Ambassadors

Deploying a Wazuh Lab in a Virtual Environment — Step-by-Step Guide

By Mohammed Abbood / Medium

This tutorial walks you through setting up a complete Wazuh lab using virtual machines.

Read more

>
A Practical Guide to Fine-Tuning Wazuh’s Vulnerability Detection Module

A Practical Guide to Fine-Tuning Wazuh’s Vulnerability Detection Module

>
October 22nd 2025 / Ambassadors
By Wilklins Nyatteng / Medium

This guide offers a step-by-step, technically grounded approach to fine-tuning the module for accuracy, performance, and operational efficiency, based on the latest Wazuh 4.13.x documentation and changelogs.

October 22nd 2025 / Ambassadors

A Practical Guide to Fine-Tuning Wazuh’s Vulnerability Detection Module

By Wilklins Nyatteng / Medium

This guide offers a step-by-step, technically grounded approach to fine-tuning the module for accuracy, performance, and operational efficiency, based on the latest Wazuh 4.13.x documentation and changelogs.

Read more

>