

--
You received this message because you are subscribed to a topic in the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/wazuh/hTpwLLkTz-0/unsubscribe.
To unsubscribe from this group and all its topics, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/7b9844e6-fce1-43ce-bfec-728f48ac6ae1n%40googlegroups.com.
Here, I am providing you the ndjson file for this dashboard, so that you can import and use it quickly in your Wazuh Dashboard. This custom dashboard will allow you to show Vulns for all the agents, but still based on the alerts as explained before. You can complement this with the two options shared below.
VD_Dashboard.ndjson (you can find it attached at the bottom)
To import it, you need to go to the top left menu ☰ > Stack Management > Saved Object, click on Import and select the ndjson file there:
Then, you will get a new custom dashboard Vulnerability detector main dashboard in your Dashboard section:
If you want this dashboard for vulnerability detection reporting, we have two available workarounds to index all the active vulnerability alerts there. Both can be set up with a cronjob or a wodle command. We recommend executing any one of these scripts once a week:
vd_update.pyGets the vulnerabilities from all agents through the API and sends it to the socket (analysisd).
It will upload all vulnerability alerts to Wazuh Indexer if you run it with -w yes option.
You will need to execute this script once (recommended in the master node).
It is not recommended to use it if you’re using reports filtered by labels.
Note:
Move the script to /var/ossec/integrations/:
Modify permissions.
You may have to define the following arguments while running the command if you have values other than the default ones.
The following configurations can be added to the Wazuh manager ossec file located in /var/ossec/etc/ossec.conf. You can also update it from the UI, by going to Wazuh -> Management -> Configuration and then clicking on Edit configuration at the top right corner. If you edit the file from the CLI, you need to restart the manager using your service manager (I.E. systemctl restart wazuh-manager) or using the Restart button if done from the UI (it will show after you save the changes).
This is a sample wodle for vd_update:
You also need to allow this wodle command to run through API by adding the following in file: /var/ossec/api/configuration/api.yaml
The wodle will run periodically on Every Monday at 01:00 am. You can update the schedule values according to your requirements. Also, to test immediately, you can set <run_on_start> as yes once, restart the wazuh-manager and revert it back to no once the test is completed.
vd_db_cleaner.pyCleans the agent database in the manager.
It will force agents to run a full_scan to trigger alerts, therefore it will use more resources. We recommend executing it once or twice a week.
You will need to execute this script in all the manager's nodes if you’re running a cluster.
Move the script to /var/ossec/integrations/:
Modify permissions.
This script can also be scheduled with a wodle as below:
Bear in mind, that both these workarounds will upload the recent vulnerability scan events to the Wazuh Indexer either by collecting through the API or by forcing full scans in the agents, but will not clear/remove the previous events from the indices. Therefore, in the custom dashboard, you need to set the time accordingly to review only the latest active vulnerabilities.
I hope this helps,
Ariel.