Integrating Wazuh CTI with the Vulnerability Management Process

Integrating Wazuh CTI with the Vulnerability Management Process

>
August 25th 2025 / Ambassadors
By Enzo Manzanares / Medium

The article explains how Wazuh CTI integrates into the vulnerability management process by detecting and correlating CVEs with endpoint data.
It helps prioritize threats based on severity, exploitability, and patch status, offering clear remediation guidance.
Automation, dashboards, and reporting features streamline tracking and improve threat response efficiency.

August 25th 2025 / Ambassadors

Integrating Wazuh CTI with the Vulnerability Management Process

By Enzo Manzanares / Medium

The article explains how Wazuh CTI integrates into the vulnerability management process by detecting and correlating CVEs with endpoint data.
It helps prioritize threats based on severity, exploitability, and patch status, offering clear remediation guidance.
Automation, dashboards, and reporting features streamline tracking and improve threat response efficiency.

Read more

>
Collecting and Analyzing Windows Event Logs with Wazuh Agent Using Sysmon

Collecting and Analyzing Windows Event Logs with Wazuh Agent Using Sysmon

>
August 21st 2025 / Ambassadors
By Ahmed Abbes / Medium

To detect modern malware and trace sophisticated attacks, we need deeper insights, process creation, command-line activity, file changes, and network connections. That’s where Sysmon (System Monitor) comes in.

August 21st 2025 / Ambassadors

Collecting and Analyzing Windows Event Logs with Wazuh Agent Using Sysmon

By Ahmed Abbes / Medium

To detect modern malware and trace sophisticated attacks, we need deeper insights, process creation, command-line activity, file changes, and network connections. That’s where Sysmon (System Monitor) comes in.

Read more

>
10 Reasons Why African Businesses Should Adopt Wazuh Today

10 Reasons Why African Businesses Should Adopt Wazuh Today

>
August 21st 2025 / Ambassadors
By Emmanuel Bama / Idiaware

Here are 10 reasons why your business should consider Wazuh now not later.

August 21st 2025 / Ambassadors

10 Reasons Why African Businesses Should Adopt Wazuh Today

By Emmanuel Bama / Idiaware

Here are 10 reasons why your business should consider Wazuh now not later.

Read more

>
Wazuh Deployment on AWS Cloud Using Official Pre-Built AMI

Wazuh Deployment on AWS Cloud Using Official Pre-Built AMI

>
August 21st 2025 / Ambassadors
By Muneer Baig / Medium

In this lab, we will learn how to quickly deploy the Wazuh platform on AWS using the pre-configured Wazuh Amazon Machine Image (AMI). This method enables a simplified and rapid deployment for security analysts, DevSecOps teams, and learners.

August 21st 2025 / Ambassadors

Wazuh Deployment on AWS Cloud Using Official Pre-Built AMI

By Muneer Baig / Medium

In this lab, we will learn how to quickly deploy the Wazuh platform on AWS using the pre-configured Wazuh Amazon Machine Image (AMI). This method enables a simplified and rapid deployment for security analysts, DevSecOps teams, and learners.

Read more

>
WAZUH x MISP Integration

WAZUH x MISP Integration

>
August 20th 2025 / Ambassadors
By Arbnor Mustafa / Medium

This blog post discusses how to integrate Wazuh with the MISP API, making threat intelligence correlation much easier for SOC analysts. By automating this process, analysts will no longer have to manually cross-reference Wazuh alerts with MISP to identify potential Indicators of Compromise (IoCs).

August 20th 2025 / Ambassadors

WAZUH x MISP Integration

By Arbnor Mustafa / Medium

This blog post discusses how to integrate Wazuh with the MISP API, making threat intelligence correlation much easier for SOC analysts. By automating this process, analysts will no longer have to manually cross-reference Wazuh alerts with MISP to identify potential Indicators of Compromise (IoCs).

Read more

>
Detection-as-Code for Wazuh 4.x: Log replay for behavioral testing

Detection-as-Code for Wazuh 4.x: Log replay for behavioral testing

>
August 20th 2025 / Ambassadors
By Zafer Balkan / Zafer Balkan Blog

In this article, we will walk through the steps one by one to install and set up the development environment on WSL1 and then write our first tests. I will try to do a walkthrough, but I’ll add context whenever I can.

August 20th 2025 / Ambassadors

Detection-as-Code for Wazuh 4.x: Log replay for behavioral testing

By Zafer Balkan / Zafer Balkan Blog

In this article, we will walk through the steps one by one to install and set up the development environment on WSL1 and then write our first tests. I will try to do a walkthrough, but I’ll add context whenever I can.

Read more

>
Automating Wazuh Docker Password Changes

Automating Wazuh Docker Password Changes

>
August 19th 2025 / Ambassadors
By Marco Teixeira / Medium

The article presents a Bash script to automate Wazuh Docker password changes, replacing a manual, multi-step process.
It updates hashed passwords, modifies config files, restarts services, and verifies success automatically.
The solution supports both single-node and multi-node setups, improving efficiency and consistency.

August 19th 2025 / Ambassadors

Automating Wazuh Docker Password Changes

By Marco Teixeira / Medium

The article presents a Bash script to automate Wazuh Docker password changes, replacing a manual, multi-step process.
It updates hashed passwords, modifies config files, restarts services, and verifies success automatically.
The solution supports both single-node and multi-node setups, improving efficiency and consistency.

Read more

>
Understanding Wazuh’s Architecture (Single Node Deployment)

Understanding Wazuh’s Architecture (Single Node Deployment)

>
August 18th 2025 / Ambassadors
By Dzidula Gati / Medium

Understanding Wazuh’s architecture is key to using it efficiently, especially in an “All-in-One Deployment” where all components run on a single system.
The Wazuh Agent, installable on Windows, macOS, Linux, and FreeBSD, collects logs, deploys configurations, and performs active responses to threats.
This setup simplifies deployment while retaining the core functionalities of threat detection and response.

August 18th 2025 / Ambassadors

Understanding Wazuh’s Architecture (Single Node Deployment)

By Dzidula Gati / Medium

Understanding Wazuh’s architecture is key to using it efficiently, especially in an “All-in-One Deployment” where all components run on a single system.
The Wazuh Agent, installable on Windows, macOS, Linux, and FreeBSD, collects logs, deploys configurations, and performs active responses to threats.
This setup simplifies deployment while retaining the core functionalities of threat detection and response.

Read more

>
Enabling Wazuh Archives: A Step-by-Step Guide

Enabling Wazuh Archives: A Step-by-Step Guide

>
August 18th 2025 / Ambassadors
By Vladimir Jerbić / Medium

While most users rely on the wazuh-alerts-* index for security events, enabling the wazuh-archives-* index allows you to retain all raw events — critical for forensic analysis, auditing, and compliance.

August 18th 2025 / Ambassadors

Enabling Wazuh Archives: A Step-by-Step Guide

By Vladimir Jerbić / Medium

While most users rely on the wazuh-alerts-* index for security events, enabling the wazuh-archives-* index allows you to retain all raw events — critical for forensic analysis, auditing, and compliance.

Read more

>