For our current infrastructure we're pulling server logs via Beats, but we're looking to pull client logs as well. We're wondering if we should go with Wazuh or stick with beats.
When it comes down to it, w/Wazuh it seems the biggest benefit IMO is the HIDs rules.
Beats appears to parse much nicer (I'm sure with some work I could get Wazuh there as well).
I am using both on a test server currently and the biggest difference (outside of HIDS) is that Beats parse pretty clean, and the Wazuh logs appear to mostly come in unparsed blobs. Again, I'm sure with some work I could modify the current logstash confs to fix that.
If it makes any difference we're running Sysmon everywhere with the Ion threat intel configs.
Thoughts? Pros, Cons? What's everyone else doing?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
The beats event parsed and pulled out the data properly, Wazuhs logs definitely are improved from how they use to be, but still need quite a bit of work it seems. They left a lot of information unparsed.
Although I guess talking it out in this case, it's probably partially an issue with the sysmon parsing in logstash combined with how it's presented.

Where in beats it's
t image_path C:\Program Files (x86)\Nmap\nmap.exe
If this is something that SO is working on then maybe we'll either A. Hold out, or roll out Wazuh and work with what we have for now.
On topic of rolling out. Any clear indicator that gets logged when a host hasn't connected, failed to connect, or hasn't submitted logs in some period of time?
I know you can do a flatline in elastalert, but was hoping ossec does some kind of tracking.
For a reason I've yet to determine, the "n" was removed from nmap, haha. It's fine in beats.
data.EventChannel.EventData.Image C:\Program Files (x86)\Nmap\map.exe
"Image":"C:\\Program Files (x86)\\Nmap\\map.exe"
I appreciate the help so far. I did grep "map.exe" in that archives.json and the character is indeed missing there.
"Image":"C:\\Program Files (x86)\\Nmap\\map.exe"
I'd really prefer to use Wazuh, but items like this would really hurt detection efforts for any kind of alerting of even malicious processes.
I guess we can hold out a bit and see what comes of it all.