{"id":11937,"date":"2022-10-11T12:21:36","date_gmt":"2022-10-11T06:51:36","guid":{"rendered":"https:\/\/opstree.com\/blog\/\/?p=11937"},"modified":"2022-10-11T12:30:38","modified_gmt":"2022-10-11T07:00:38","slug":"wazuh-the-siem-platform","status":"publish","type":"post","link":"https:\/\/opstree.com\/blog\/2022\/10\/11\/wazuh-the-siem-platform\/","title":{"rendered":"Wazuh : The SIEM Platform"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>What is SIEM?<\/strong><\/h3>\n\n\n\n<p>SIEM (Security Information and Event Management) software centrally collects, stores, and analyzes logs from the perimeter to the end user. It helps in monitoring security threats in real-time for quick attack detection, containment, and response with holistic security reporting and compliance management.<\/p>\n\n\n\n<p><strong>SIEM<\/strong>, pronounced \u201csim,\u201d combines both security information management (SIM) and security event management (SEM) into one security management system<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>SIM<\/strong><\/td><td><strong>SEM<\/strong><\/td><\/tr><tr><td>Long Term Log management<\/td><td>Real-Time Monitoring<\/td><\/tr><tr><td>Event enrichment<\/td><td>Event Collection<\/td><\/tr><tr><td>Correlation<\/td><td>Event Aggregation<\/td><\/tr><tr><td>Parsing<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<!--more-->\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SIEM: Capabilities<\/strong><\/h3>\n\n\n\n<p><strong>Data Aggregation<\/strong>: collect data from multiple sources<\/p>\n\n\n\n<p><strong>Correlation<\/strong>: Will define which sequences of events could be indicative of anomalies<\/p>\n\n\n\n<p><strong>Alerting<\/strong>: Will trigger an alert in mail\/slack, etc. if any incident has been triggered<\/p>\n\n\n\n<p><strong>Dashboard<\/strong>: This will give a view of incidents, agents, and logs in graphical format.<\/p>\n\n\n\n<p><strong>Compliance<\/strong>: Verify regulatory compliance, auditors look at multiple aspects of a db. environments, including user management<\/p>\n\n\n\n<p><strong>Retention<\/strong>: To maintain your SIEM audit data for longer periods of time, you can configure a new Retention Bucket<\/p>\n\n\n\n<p><strong>Forensic Analysis<\/strong>: allows to collect and analyze log data in a central location from all devices\/appliances and hosts and getting notified about abnormal events immediately.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WAZUH<\/strong>:<\/h3>\n\n\n\n<p>Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It aims to protect workloads across on-premises, virtualized, containerized, and cloud-based environments.<\/p>\n\n\n\n<p>These include log data analysis, intrusion, and malware detection, file integrity monitoring, configuration assessment, vulnerability detection, and support for regulatory compliance.<\/p>\n\n\n\n<p>It can be used to collect, analyze and correlate security event data for threat detection and incident response. Wazuh has out-of-the-box integration with Mod Security which eliminates the need for creating custom integration.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Wazuh Components<\/strong>:<\/h3>\n\n\n\n<p>The Wazuh solution is based on the Wazuh agent, which is deployed on the monitored endpoints, and on three central components: the <strong><em>Wazuh server<\/em><\/strong>, the <strong><em>Wazuh indexer<\/em><\/strong>, and the <strong><em>Wazuh dashboard<\/em><\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2022\/09\/wazuh-components-1.png?w=1024\" alt=\"\" class=\"wp-image-11987\" width=\"520\" height=\"283\" \/><\/figure><\/div>\n\n\n<p>The <strong>Wazuh indexer<\/strong> is a highly scalable, full-text search and analytics engine. This central component indexes and stores alerts generated by the Wazuh server.<\/p>\n\n\n\n<p>The <strong>Wazuh server<\/strong> analyses data received from the agents. It processes it through decoders and rules, using threat intelligence to look for well-known <strong><em>indicators of compromise<\/em><\/strong> (IOCs). A single server can analyze data from hundreds or thousands of agents, and scale horizontally when set up as a cluster. This central component is also used to manage the agents, configuring and upgrading them remotely when necessary.<\/p>\n\n\n\n<p>The<strong> Wazuh dashboard<\/strong> is the web user interface for data visualization and analysis. This includes out-of-the-box dashboards for security events, regulatory compliance (e.g., PCI DSS, GDPR, CIS, HIPAA, NIST 800-53), file integrity monitoring data, detected vulnerable applications, configuration assessment results, cloud infrastructure monitoring events, and much more. It also helps in managing Wazuh configuration and monitoring its status.<\/p>\n\n\n\n<p>Wazuh agents are installed on <em>endpoints<\/em> such as laptops, desktops, servers, cloud instances, or virtual machines. They provide threat prevention, detection, and response capabilities. They run on operating systems such as Linux, Windows, macOS, Solaris, AIX, and HP-UX.<\/p>\n\n\n\n<p><strong>Wazuh Architecture:<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2022\/09\/wazuh-2.png?w=1024\" alt=\"\" class=\"wp-image-11967\" width=\"543\" height=\"300\" \/><\/figure><\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Wazuh Manager:<\/strong><\/h4>\n\n\n\n<p> Wazuh manager is the system that analyzes the data received from all registered agents and triggers alerts when an event coincides with a rule. For example, intrusion detected, file modified, configuration not in accordance with the policy, possible rootkit, among others.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>File beat: <\/strong><\/h4>\n\n\n\n<p>Filebeat can be used in conjunction with Wazuh Manager to send events and alerts to the Wazuh indexer. This role will install Filebeat, you can customize the installation with these variables:<\/p>\n\n\n\n<p>filebeat_output_indexer_hosts: This defines the indexer node(s) to be used (default: 127.0.0.1:9200).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Elastic Search:<\/strong><\/h4>\n\n\n\n<p>Elasticsearch is a distributed, free and open search and analytics engine for all types of data, including textual, numerical, geospatial, structured, and unstructured.<\/p>\n\n\n\n<p><strong>Elasticsearch indices<\/strong>:<br>The .kibana index<br>The wazuh-alerts- indices<br>The wazuh-monitoring- indices<br>The wazuh-statistics- indices<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Kibana<\/strong>:<\/h5>\n\n\n\n<p>Kibana is a flexible and intuitive web interface for mining and visualizing the events and archives stored in Elasticsearch. It also allows you to manage the configuration and capabilities of the Wazuh server.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Wazuh Agent<\/strong>:<\/h5>\n\n\n\n<p>The Wazuh agent is multi-platform and runs on the hosts that the user wants to monitor. It communicates with the Wazuh manager, sending data in near real-time through an encrypted and authenticated channel.<\/p>\n\n\n\n<p><strong>Wazuh Installation:<\/strong><\/p>\n\n\n\n<p><strong>Wazuh Server:<\/strong><\/p>\n\n\n\n<p><strong>NOTE<\/strong>: <\/p>\n\n\n\n<p><strong>Ansible Role: Wazuh-Manager<\/strong><br>Ansible role to configure wazuh manager standalone with slack integration<\/p>\n\n\n\n<p><strong>Some of the highlighting features are<\/strong>:-<br>Standalone setup of Wazuh-manager<br>Setup Slack for alert management<\/p>\n\n\n\n<p><strong>Supported OS<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Ubuntu 18<\/td><\/tr><tr><td>Ubuntu 20<\/td><\/tr><tr><td>Ubuntu 22<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Requirements<\/strong><br>No third-party requirement is needed in this role<\/p>\n\n\n\n<p><strong>Step 1:<\/strong> <\/p>\n\n\n\n<p>Navigate to  <a href=\"https:\/\/galaxy.ansible.com\/opstree_devops\/wazuh_manager\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/galaxy.ansible.com\/opstree_devops\/wazuh_manager<\/a><\/p>\n\n\n\n<p><strong>Installation<\/strong>: ansible-galaxy install opstree_devops.wazuh_manager<\/p>\n\n\n\n<p><strong>Step 2:<\/strong> <\/p>\n\n\n\n<p><strong>Usage<\/strong><br>The inventory for wazuh_manager role should look like this:-<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>[wazuh]<\/td><\/tr><tr><td>node-1 ansible_host=13.213.39.180<\/td><\/tr><tr><td><\/td><\/tr><tr><td>[wazuh:vars]<\/td><\/tr><tr><td>ansible_ssh_user=ubuntu<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step 3<\/strong>:<\/p>\n\n\n\n<p><strong>An example playbook should look like this<\/strong>:-<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>name: wazuh<\/td><\/tr><tr><td>hosts: all<\/td><\/tr><tr><td>become_user: root<\/td><\/tr><tr><td>roles:<\/td><\/tr><tr><td><\/td><\/tr><tr><td>{ role: opstree_devops.wazuh_manager }<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step 4:<\/strong><\/p>\n\n\n\n<p><strong>For running the ansible role, we will use ansible cli.<\/strong><\/p>\n\n\n\n<p>ansible-playbook -i tests\/inventory tests\/test.yml<\/p>\n\n\n\n<p><strong>Step 5:<\/strong><\/p>\n\n\n\n<p><strong>Required Ports<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Components<\/strong><\/td><td><strong>Ports<\/strong><\/td><td><strong>Protocol<\/strong><\/td><td><strong>Purpose<\/strong><\/td><\/tr><tr><td><strong>Wazuh server<\/strong><\/td><td>1514<\/td><td>TCP\/UDP<\/td><td>Agent connection service<\/td><\/tr><tr><td><\/td><td>1515<\/td><td>TCP<\/td><td>Agent enrollment service<\/td><\/tr><tr><td><\/td><td>1516<\/td><td>TCP<\/td><td>Wazuh cluster daemon<\/td><\/tr><tr><td><\/td><td>514<\/td><td>UDP(default)\/<br>TCP(optional)<\/td><td>Wazuh Syslog collector (disabled by default)<\/td><\/tr><tr><td><\/td><td>55000<\/td><td>TCP<\/td><td>Wazuh server RESTful API<\/td><\/tr><tr><td><strong>Wazuh indexer<\/strong><\/td><td>9200<\/td><td>TCP<\/td><td>Wazuh indexer RESTful API<\/td><\/tr><tr><td><\/td><td>9300-9400<\/td><td>TCP<\/td><td>Wazuh indexer cluster communication<\/td><\/tr><tr><td><strong>Wazuh dashboard<\/strong><\/td><td>443<\/td><td>TCP<\/td><td>Wazuh web user interface<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step 6:<\/strong><\/p>\n\n\n\n<p>Open the public ip in the browser<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2022\/09\/image-15.png?w=1024\" alt=\"\" class=\"wp-image-12007\" width=\"567\" height=\"289\" \/><\/figure><\/div>\n\n\n<p>Default <strong>username<\/strong>: admin , <strong>password<\/strong>: admin<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2022\/09\/image-16.png?w=1024\" alt=\"\" class=\"wp-image-12008\" width=\"559\" height=\"299\" \/><\/figure><\/div>\n\n\n<p><strong>Wazuh Agent:<\/strong><\/p>\n\n\n\n<p><strong>Note<\/strong>:<br>Ansible role to setup &amp; manage Wazuh-Agent<\/p>\n\n\n\n<p><strong>Some of the highlighting features added:-<\/strong><\/p>\n\n\n\n<p>Setup wazuh agent<br>Enabling File Integration Management(FIM) over server<br>Enabling user audit information gathering setup over node<br>Enabling system check over servers home directory.<br>Configure N number of application in wazuh agent for log aggregation<\/p>\n\n\n\n<p><br><strong>Supported OS<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Ubuntu 18<\/td><\/tr><tr><td>Ubuntu 20<\/td><\/tr><tr><td>Ubuntu 22<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><br><strong>Requirements<\/strong><br>UDP port should be open<\/p>\n\n\n\n<p><strong>Step 1:<\/strong><\/p>\n\n\n\n<p>Navigate to https:\/\/galaxy.ansible.com\/opstree_devops\/wazuh_agent<\/p>\n\n\n\n<p><strong>Installation<\/strong>: ansible-galaxy install opstree_devops.wazuh_agent<\/p>\n\n\n\n<p><strong>Step 2<\/strong>:<\/p>\n\n\n\n<p><strong>Usage<\/strong><br>The inventory for wazuh_manager role should look like this:-<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>[wazuh]<\/td><\/tr><tr><td>node-1 ansible_host=13.213.39.180<\/td><\/tr><tr><td><\/td><\/tr><tr><td>[wazuh:vars]<\/td><\/tr><tr><td>ansible_ssh_user=ubuntu<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step 3<\/strong>:<\/p>\n\n\n\n<p><strong>An example playbook should look like this:-<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>name: wazuh<\/td><\/tr><tr><td>hosts: all<\/td><\/tr><tr><td>become_user: root<\/td><\/tr><tr><td>roles:<\/td><\/tr><tr><td><\/td><\/tr><tr><td>{ role: wazuh_agent }<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step 4<\/strong>:<\/p>\n\n\n\n<p>and for running the ansible role, we will use ansible cli.<\/p>\n\n\n\n<p>ansible-playbook -i tests\/inventory tests\/test.yml<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"332px;\" src=\"https:\/\/lh5.googleusercontent.com\/WTuhfpT1h2Fy4g_H-scWWUoUsBfv6opzN4hbGG-TaA9ayNxobtPFFvN1L3LjLDOp8w-f7p7ZttY7eV_DqLA5dG2ktP2qp96X3SMZO_OuK0SLACPz0iglq9HUEwtmTB6zu1rkFE3in3TqHPS_EEXC3z19ngIBZRT0Qr3xWlpY7CssVcWcOe26II0jrl_MgWyiSjpf2A\"><\/p>\n\n\n\n<p><strong>Wazuh modules<\/strong>:<\/p>\n\n\n\n<p><strong>Log collector<\/strong>:<\/p>\n\n\n\n<p>Log data collection is the real-time process of making sense of the records generated by servers or devices. This component can receive logs through text files or Windows event logs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2022\/09\/image-17.png?w=1024\" alt=\"\" class=\"wp-image-12075\" width=\"564\" height=\"256\" \/><\/figure>\n\n\n\n<p>Here you can manually add the path of file that you want monitor.<\/p>\n\n\n\n<p><strong>File integrity monitoring (FIM)<\/strong>:<\/p>\n\n\n\n<p> Monitors the file system, reporting when files are created, deleted, or modified and keep track of the same<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img decoding=\"async\" width=\"727px;\" height=\"366px;\" src=\"https:\/\/lh6.googleusercontent.com\/1Hpz85w_fjZya3wckiU7NNKwGC4quliVigPo9m5RT5pM-plWlR3jP2RnelZeSsdkFRMiHxzNc7qEFOXALbT8bPRgj4nKE0bXsHLaI1Ri6096fjwLcRaT9qDu_CKsFgtGvnalutvDo-OVGuDP5jEL7hEStUIy0YL2JoQILJ4jZAwcR0jYmy684K5Xv5FCSAOnnBbObQ\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><img decoding=\"async\" width=\"722px;\" height=\"367px;\" src=\"https:\/\/lh5.googleusercontent.com\/UQK_-NK9S7I8ZlFHMGpkZCmSWhteDGk2Y6ZNkK7mbIow8FwY4Aio3iUSrK2RJ87YrlBmrtMgOvfpfAmtE7FRZv2f33CdqcKEr0GUS5l__ji1cnQtI2-aaRhdRBz-5mU5zOQHkDYgJta5NSgNJggKctdetou6jiDOQbktBjNomLrczXIgpU4NOLWu9FCEfKf_hImc9Q\"><\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"385px;\" src=\"https:\/\/lh4.googleusercontent.com\/f0Kxm6Q88Svoe7XZu_LkaeqApLn_P0vfOpcseelbKlnSxez4eprFpLKK4gSJnjE5LVcNJJSO7L8UIUL5iFhHPoP0YtZVlWyLwmZE46Vm3N3oejd-3UZOI7FAzTfm6aZ7ufumTR29jIfX8RIiU5ZR6UX4ivSSARG0MqQXYYKjrEuwWtcPKK8xzIyxFtJgSuiWdUGc6Q\"><\/p>\n\n\n\n<p><strong>Security configuration assessment<\/strong>: <\/p>\n\n\n\n<p>SCA Component provide detail of Regulatory Compliance on basis of Center of Internet Security (CIS) benchmarks. Wazuh has default Compliance like PCI DSS, NIST, GDPR, TSC, HIPAA<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"192px;\" src=\"https:\/\/lh4.googleusercontent.com\/2Hjv_mZX6dtTNSpkMp4JUoQ-IO_z-EFGNummEfRotWvuiPAfy3rTH_XAFSUuZPZd391ANMClcJ6YBta3bYtuOEwPJCEDOHEMaqGB9OfW_40Wj39mgJ0VIq26mrmKtsZrW2cSq9BA_hgWs2a3Ge3N2V787wjmfWagvkhhQIgJYqQ6Ucy5raeFOOTS1SOLICGvfXJmUw\"><\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"164px;\" src=\"https:\/\/lh5.googleusercontent.com\/SWvIvnYZREidymf8ibaJ5zD0NS98erMAz6p0Jw-mAzWTHDCsLW4H65_JH0uGIBQSwZUvrIMhHsNNMH0T2bpeTqVDL1GFo4zdtEjmaVjmOaBoIB0iDtqGBF3uRjrNPhPeqRAlkN1uZ0W2fuShpEc5OSpj3UqNr7EvEraahygJVJdT4Um72tdrpVuwiAW1hASyD7xQqA\"><\/p>\n\n\n\n<p><strong>System Auditing:<\/strong><\/p>\n\n\n\n<p>Monitors audit logs like write access, read access, execute access, attribute change, or system call rule, using Wazuh decoders and rules.<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"736px;\" height=\"336px;\" src=\"https:\/\/lh6.googleusercontent.com\/6Zm7Yrad1QP0FvtSGgdeUMVCrl1q-pZdKbD7iHqP0RiY9tVTdXfMxmKKdJ5dH9iIYo3-GnWGvtxAUTIex-aWf48h--m2Ps8MANQbbb5W0ac5lLaeGkR1F8ENrx69jbnSk2KiUTrvGznH_JJwZUVvIcDohAKecgDsWDSJh5AL4qwahdE5RJOy-XtGzRF8B2vog_t4Kw\"><\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"395px;\" src=\"https:\/\/lh4.googleusercontent.com\/JOOBOKTnJMCKQSqsuBnmZzeFqAnfgrJbKwdgSJ9tmvFB9Lv5vEMgB9wRF4iBTWW18PZGYIM64CI8cvduTKnD8IU3oeOyQFpVG3PRNMcbcyhq48g7eoFZYq2E_CJhWvq-C9JIL-GDble3Jm6UE0qAWdjT56qrfLhWui1FJsC_eOE-o6xLpttqle3SS3AlAojCCPzXtA\"><\/p>\n\n\n\n<p><strong>MITRE Attack: <\/strong><\/p>\n\n\n\n<p>MITRE ATTACK matrix stores all possible attacks that can be made and what to do to mitigate and detect them.<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"720px;\" height=\"326px;\" src=\"https:\/\/lh5.googleusercontent.com\/1H81w2pYd1-p2gVY8BL9xgJSgk3BdYnF4p28FMEeS9kRtHPrnsnoimw0t1CTq86QtcRPOUpSF_eGffvBY1ZHq4jSUXFqHHwJXfLlNktO9slQPduYRlaU7iaVWn9tx_YefpSYIYpCsPXrdPAvxjTQNsgNpyLeSc4J5MD1ikX3BYP0Z-rJ_-MQ6Vc5EY2FJqnFXnQ6qg\"><\/p>\n\n\n\n<p><strong>Docker Listener: <\/strong><\/p>\n\n\n\n<p>Protects container workloads at two different levels: infrastructure and container level.<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"330px;\" src=\"https:\/\/lh5.googleusercontent.com\/4dJK_LmGQ8HZCW8gLLJuVrLLOMGdueiw1_QO6oP11AOKn0jeD12fITnF88_wQ0X_jrkPTBOSV9eLLcs5MMBUlpPc92XdW8ylrIlpccU2kk-Xl0f9JDz7snVJKhGxqRhKvknulRTpxusEG9RYbJNJF2o7JS8RY3Bfn4G9sxI2-6FS_YoOzBeL1r3t05_m4KKEDLlIAQ\"><\/p>\n\n\n\n<p><strong>Osquery<\/strong>:<\/p>\n\n\n\n<p>Collects the information generated by Osquery to send it to the manager and detects the incidents<\/p>\n\n\n\n<p>system_info, high_load_average and low_free_memory queries will be executed every hour further osquery-monitoring,hardware-monitoring or ossec-rootkit<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"727px;\" height=\"324px;\" src=\"https:\/\/lh5.googleusercontent.com\/3dM5rt_SAh_0UCz8z43qGPn_1tjTWilUBXLuf-KSMok94JcvcBtA5qX8tc8eGI-iVeoUBFIObvtqK5UO0QR_WNSIqdmTOcqVC4G27J95C-VV8NR0ijgnWKhPUp4dwA3LfoCuaERtLOpQJiN1vmTO6-KDSuQgS7ErOmyiAKi6zyPxytPzgjtClgOBrXCVQkGnQsjd_g\"><\/p>\n\n\n\n<p><strong>Vulnerabilities<\/strong>:<\/p>\n\n\n\n<p>Detects vulnerabilities based on installed applications<\/p>\n\n\n\n<p>Follows CVE for Ubuntu Linux distributions, National Vulnerability Database. And many more.<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/I9w0z6FRN37el46idrnrkJm4Oq_6xA7nNgTd4NliFPG_F_NrX7sFpQDrLdWnS1yK_n146khxkhGlvVz5hlUq5walxq3xKf8605LZZXzQ__tqQa6r6t9NuIFsaN3MGIBkr-BdnmDe9eaSy4Ya883giYUdE7FGRWGkOMoxYZsMOnaOoMZqW8WJYO8sht_C-7N_o_Ew0g\" style=\"width:800px;\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Each PoC represents real-world scenarios that users can deploy using specific configurations. In addition, further information is provided to verify the feasibility of the product on how to generate and query the alerts, and the affected endpoints resulting from each PoC.<a href=\"https:\/\/documentation.wazuh.com\/current\/proof-of-concept-guide\/index.html#proof-of-concept-guide\" target=\"_blank\" rel=\"noopener\"><\/a><\/p>\n\n\n\n<p><strong>Blog Pundits: <a href=\"https:\/\/opstree.com\/blog\/\/author\/naveenverma023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Naveen Verma<\/a><\/strong> <strong>and <a href=\"https:\/\/opstree.com\/blog\/\/author\/sandeep7c51ad81ba\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sandeep Rawat<\/a><\/strong><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.opstree.com\/contact-us?utm_source=Wordpress&amp;utm_medium=Blog&amp;utm_campaign=Wazuh_%3A_The_SIEM_Platform\" target=\"_blank\" rel=\"noreferrer noopener\">OpsTree<\/a><\/strong> is an End-to-End DevOps Solution Provider.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.opstree.com\/contact-us?utm_source=Wordpress&amp;utm_medium=Blog&amp;utm_campaign=Wazuh_%3A_The_SIEM_Platform\" target=\"_blank\" rel=\"noreferrer noopener\">Contact Us<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>Connect with Us<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-social-links aligncenter is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-1 wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/opstree-solutions\" class=\"wp-block-social-link-anchor\" target=\"_blank\" rel=\"noopener\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a href=\"https:\/\/www.youtube.com\/channel\/UCeLma6SpNYH7jjYKSBNSexw\" class=\"wp-block-social-link-anchor\" target=\"_blank\" rel=\"noopener\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-github  wp-block-social-link\"><a href=\"https:\/\/github.com\/OpsTree\" class=\"wp-block-social-link-anchor\" target=\"_blank\" rel=\"noopener\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,2C6.477,2,2,6.477,2,12c0,4.419,2.865,8.166,6.839,9.489c0.5,0.09,0.682-0.218,0.682-0.484 c0-0.236-0.009-0.866-0.014-1.699c-2.782,0.602-3.369-1.34-3.369-1.34c-0.455-1.157-1.11-1.465-1.11-1.465 c-0.909-0.62,0.069-0.608,0.069-0.608c1.004,0.071,1.532,1.03,1.532,1.03c0.891,1.529,2.341,1.089,2.91,0.833 c0.091-0.647,0.349-1.086,0.635-1.337c-2.22-0.251-4.555-1.111-4.555-4.943c0-1.091,0.39-1.984,1.03-2.682 C6.546,8.54,6.202,7.524,6.746,6.148c0,0,0.84-0.269,2.75,1.025C10.295,6.95,11.15,6.84,12,6.836 c0.85,0.004,1.705,0.114,2.504,0.336c1.909-1.294,2.748-1.025,2.748-1.025c0.546,1.376,0.202,2.394,0.1,2.646 c0.64,0.699,1.026,1.591,1.026,2.682c0,3.841-2.337,4.687-4.565,4.935c0.359,0.307,0.679,0.917,0.679,1.852 c0,1.335-0.012,2.415-0.012,2.741c0,0.269,0.18,0.579,0.688,0.481C19.138,20.161,22,16.416,22,12C22,6.477,17.523,2,12,2z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">GitHub<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/opstree\" class=\"wp-block-social-link-anchor\" target=\"_blank\" rel=\"noopener\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-medium  wp-block-social-link\"><a href=\"https:\/\/medium.com\/buildpiper\" class=\"wp-block-social-link-anchor\" target=\"_blank\" rel=\"noopener\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M20.962,7.257l-5.457,8.867l-3.923-6.375l3.126-5.08c0.112-0.182,0.319-0.286,0.527-0.286c0.05,0,0.1,0.008,0.149,0.02 c0.039,0.01,0.078,0.023,0.114,0.041l5.43,2.715l0.006,0.003c0.004,0.002,0.007,0.006,0.011,0.008 C20.971,7.191,20.98,7.227,20.962,7.257z M9.86,8.592v5.783l5.14,2.57L9.86,8.592z M15.772,17.331l4.231,2.115 C20.554,19.721,21,19.529,21,19.016V8.835L15.772,17.331z M8.968,7.178L3.665,4.527C3.569,4.479,3.478,4.456,3.395,4.456 C3.163,4.456,3,4.636,3,4.938v11.45c0,0.306,0.224,0.669,0.498,0.806l4.671,2.335c0.12,0.06,0.234,0.088,0.337,0.088 c0.29,0,0.494-0.225,0.494-0.602V7.231C9,7.208,8.988,7.188,8.968,7.178z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Medium<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What is SIEM? SIEM (Security Information and Event Management) software centrally collects, stores, and analyzes logs from the perimeter to the end user. It helps in monitoring security threats in real-time for quick attack detection, containment, and response with holistic security reporting and compliance management. SIEM, pronounced \u201csim,\u201d combines both security information management (SIM) and &hellip; <a href=\"https:\/\/opstree.com\/blog\/2022\/10\/11\/wazuh-the-siem-platform\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Wazuh : The SIEM Platform&#8221;<\/span><\/a><\/p>\n","protected":false},"author":225279969,"featured_media":29900,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[28070474],"tags":[768739308,676319247,25,1070272,4996032,534104685],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/opstree.com\/blog\/wp-content\/uploads\/2025\/11\/DevSecOps-1.jpg","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfDBOm-36x","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/11937"}],"collection":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/users\/225279969"}],"replies":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/comments?post=11937"}],"version-history":[{"count":25,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/11937\/revisions"}],"predecessor-version":[{"id":12223,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/11937\/revisions\/12223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media\/29900"}],"wp:attachment":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media?parent=11937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/categories?post=11937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/tags?post=11937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}