Hey Juan,
Thanks for the heads up. I am quite aware of the deployment methods. Currently I am using the agentless monitoring method on my linux endpoint via SSH. It is successfully deployed and I received alerts from the agent id 000 in the wazuh dashboard which is I'm also aware. But the alerts that I am receiving are just successful boot alerts or opened sessions etc. But, when I try to do actions like "sudo", "touch", "rm", etc, I am not receiving any alerts. This could be that, I still haven't enabled or generate the log regarding those commands, direct my ossec.conf to actively monitor that log directory, or there could be no ruleset that match the actions that I mentioned. Is there a reference for me to tweak my wazuh so that I can configure it the way I wanted?
Regarding this message:
"In order to determine if it is receiving syslog messages you may temporarily enable
<logall_json> and monitor the
/var/ossec/logs/archives/archives.json file for messages from the monitored source."
- Is it recommended to enable <logall_json>? Is this file directory /var/ossec/logs/archives/archives.json is where the alerts is generated that will appear in the wazuh dashboard?
Regarding this message:
"Alternatively you may use tools like ss (formerly netstat) and tcpdump to determine if the port is open and if messages are coming through, for example ss -nap | grep ':514' will show if port 514 is actively listened to and tcpdump -i any port 514 -AA will show all syslog messages detected in transit on this port.
If you don't see the port open then you should verify the configuration and restart the Wazuh manager service. If you don't see any messages with tcpdump then you should verify the endpoint's syslog output configuration and if there's any network restriction."
- Yes, I have tried this method and currently wazuh remote is listening through this port, mine is 1514.
Thanks for the follow up.
Regards,
Ryan.