Wazuh monitors system and application configuration settings to ensure they are compliant with your security policies, standards, and/or hardening guides. The Wazuh agents perform periodic scans to detect misconfigurations or security gaps in endpoints that can be exploited by threat actors. Additionally, you can customize these configuration checks, thereby tailoring them to properly align with your organization's needs. Security alerts include recommendations for better configuration, references, and mapping with regulatory compliance.
![Configuration Assessment dashboard](https://wazuh.com/wp-content/themes/wazuh-v3/assets/images/platform/sca-dashboard.png?ver=1735664783069)