--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/911f9f01-c883-4bf6-82fb-6633825541ffn%40googlegroups.com.

is there a way to use this script on a windows machine that have access to wazuh plateform ?




Hi, for an upcoming security audit I need a vulnerability report and I was wondering if it would be possible to create a script (eg. In Python) that displays a table of vulnerability information:
agent_id
Package name
Date when the package was installed
Date when the vulnerability was published for the package
Date of the last vulnerability scan of the package
Date when the vulnerable package was detected as active
Date when the vulnerable package was detected as resolved
Current status of the package vulnerability (active/resolved)
Some testing was done with queries like the following, but I wasn't able to put all of this together into the report I need:
GET wazuh-alerts-4.x-*/_search
{
"size": 9000,
"query": {
"bool": {
"must": [
{
"match": {
"data.vulnerability.status": "Active"
}
},
{
"term": {
"agent.id": "001"
}
}
]
}
}
}
And
GET /syscollector/001/packages
These queries provide some information, but I'm not a developer and don't know how to use these data sources to create the report I need.
I use Wazuh 4.12 as single node on Ubuntu 24.
I appreciate any help as this is an important matter for our company