Leveraging Wazuh for Compliance with Bank Indonesia and OJK Cybersecurity Regulation (Part 1)

Leveraging Wazuh for Compliance with Bank Indonesia and OJK Cybersecurity Regulation (Part 1)

>
July 16th 2025 / Ambassadors
By Ismail Hakim / Medium

The article explains how Wazuh, an open-source SIEM/XDR platform, helps financial institutions in Indonesia comply with Bank Indonesia and OJK cybersecurity regulations.
It details how Wazuh’s features—like log monitoring, threat detection, and compliance reports—align with regulatory requirements.
The guide is aimed at helping IT and InfoSec teams ensure cybersecurity compliance across financial services.

July 16th 2025 / Ambassadors

Leveraging Wazuh for Compliance with Bank Indonesia and OJK Cybersecurity Regulation (Part 1)

By Ismail Hakim / Medium

The article explains how Wazuh, an open-source SIEM/XDR platform, helps financial institutions in Indonesia comply with Bank Indonesia and OJK cybersecurity regulations.
It details how Wazuh’s features—like log monitoring, threat detection, and compliance reports—align with regulatory requirements.
The guide is aimed at helping IT and InfoSec teams ensure cybersecurity compliance across financial services.

Read more

>
How Wazuh Processes Logs: From Decoder to Rule Matching — Part 1

How Wazuh Processes Logs: From Decoder to Rule Matching — Part 1

>
July 8th 2025 / Ambassadors
By Arasy Dafa Sulistya Kurniawan / Medium

The article explains how Wazuh processes logs in three main stages: pre-decoding, decoding, and rule matching.
It details how logs are parsed and matched with decoders and rules to generate security alerts.
The post also introduces key Wazuh components involved in log analysis, setting up future deep dives.

July 8th 2025 / Ambassadors

How Wazuh Processes Logs: From Decoder to Rule Matching — Part 1

By Arasy Dafa Sulistya Kurniawan / Medium

The article explains how Wazuh processes logs in three main stages: pre-decoding, decoding, and rule matching.
It details how logs are parsed and matched with decoders and rules to generate security alerts.
The post also introduces key Wazuh components involved in log analysis, setting up future deep dives.

Read more

>
Deploying Wazuh on Docker: Simplifying Security Monitoring Configuration

Deploying Wazuh on Docker: Simplifying Security Monitoring Configuration

>
July 7th 2025 / Ambassadors
By Sheetal Agarwal / Medium

The article explains how to deploy Wazuh using Docker Compose for easier setup, scalability, and configuration.
It walks through steps like cloning the Wazuh repo, generating certificates, and running the containers securely.
Using Docker streamlines updates, ensures isolation, and simplifies security monitoring in various environments.

July 7th 2025 / Ambassadors

Deploying Wazuh on Docker: Simplifying Security Monitoring Configuration

By Sheetal Agarwal / Medium

The article explains how to deploy Wazuh using Docker Compose for easier setup, scalability, and configuration.
It walks through steps like cloning the Wazuh repo, generating certificates, and running the containers securely.
Using Docker streamlines updates, ensures isolation, and simplifies security monitoring in various environments.

Read more

>
Integrating Wazuh with Microsoft Entra ID: A Step‑by‑Step Guide

Integrating Wazuh with Microsoft Entra ID: A Step‑by‑Step Guide

>
June 30th 2025 / Ambassadors
By Ahmed Abdelrazek / Medium

ChatGPT Plus
The article provides a step-by-step guide to integrating Wazuh with Microsoft Entra ID using SAML for single sign-on.
It covers configuring the Entra ID application, setting SAML parameters, and mapping roles to Wazuh.
This integration enables secure, role-based access to the Wazuh Dashboard through Entra ID authentication.

June 30th 2025 / Ambassadors

Integrating Wazuh with Microsoft Entra ID: A Step‑by‑Step Guide

By Ahmed Abdelrazek / Medium

ChatGPT Plus
The article provides a step-by-step guide to integrating Wazuh with Microsoft Entra ID using SAML for single sign-on.
It covers configuring the Entra ID application, setting SAML parameters, and mapping roles to Wazuh.
This integration enables secure, role-based access to the Wazuh Dashboard through Entra ID authentication.

Read more

>
Breaking Free from Expensive SIEM — Say Hello to Wazuh

Breaking Free from Expensive SIEM — Say Hello to Wazuh

>
June 27th 2025 / Ambassadors
By Aditya Jaishi / Medium

The article introduces Wazuh as a cost-effective, open-source alternative to expensive SIEM solutions, removing log volume fees and vendor lock-in. It explains how to install the Wazuh stack, deploy agents, and enable key modules like detection, compliance, and analytics. It highlights Wazuh’s flexibility to create custom alert rules, dashboards, and active responses. The article concludes that Wazuh delivers enterprise-grade SIEM/XDR capabilities with no licensing costs, ideal for organizations seeking full control over their security.

June 27th 2025 / Ambassadors

Breaking Free from Expensive SIEM — Say Hello to Wazuh

By Aditya Jaishi / Medium

The article introduces Wazuh as a cost-effective, open-source alternative to expensive SIEM solutions, removing log volume fees and vendor lock-in. It explains how to install the Wazuh stack, deploy agents, and enable key modules like detection, compliance, and analytics. It highlights Wazuh’s flexibility to create custom alert rules, dashboards, and active responses. The article concludes that Wazuh delivers enterprise-grade SIEM/XDR capabilities with no licensing costs, ideal for organizations seeking full control over their security.

Read more

>
Mastering Endpoint Visibility: Remote Command Monitoring with Wazuh

Mastering Endpoint Visibility: Remote Command Monitoring with Wazuh

>
June 27th 2025 / Ambassadors
By Raj Vira / Medium

The article explores Wazuh’s Remote Command Monitoring feature for enhancing endpoint visibility. It explains how to schedule and run commands on agents securely, collecting output for analysis and alerting. Use cases include monitoring system services, disk usage, and custom scripts via ossec.conf or agent.conf.

June 27th 2025 / Ambassadors

Mastering Endpoint Visibility: Remote Command Monitoring with Wazuh

By Raj Vira / Medium

The article explores Wazuh’s Remote Command Monitoring feature for enhancing endpoint visibility. It explains how to schedule and run commands on agents securely, collecting output for analysis and alerting. Use cases include monitoring system services, disk usage, and custom scripts via ossec.conf or agent.conf.

Read more

>
Guide: Installing and Using Wazuh for Security Monitoring

Guide: Installing and Using Wazuh for Security Monitoring

>
June 20th 2025 / Ambassadors
By Ahmed Abdelrazek / Medium

This article provides a comprehensive walkthrough for deploying Wazuh 4.12.0 on Ubuntu 22.04. It covers installation of central components—Wazuh Indexer, Server, and Dashboard—using the Wazuh installation assistant and configuration file. The guide also includes deploying Wazuh agents on Windows systems and viewing alerts through the Wazuh Dashboard. Additionally, it discusses alternative installation methods such as using ready-to-use machines, containers, or offline installations for air-gapped environments. The article is aimed at security professionals seeking to implement a robust, open-source SIEM solution.

June 20th 2025 / Ambassadors

Guide: Installing and Using Wazuh for Security Monitoring

By Ahmed Abdelrazek / Medium

This article provides a comprehensive walkthrough for deploying Wazuh 4.12.0 on Ubuntu 22.04. It covers installation of central components—Wazuh Indexer, Server, and Dashboard—using the Wazuh installation assistant and configuration file. The guide also includes deploying Wazuh agents on Windows systems and viewing alerts through the Wazuh Dashboard. Additionally, it discusses alternative installation methods such as using ready-to-use machines, containers, or offline installations for air-gapped environments. The article is aimed at security professionals seeking to implement a robust, open-source SIEM solution.

Read more

>