Hi Rahul,
In these cases, we should review the full data flow:
1. The agent collects the event
2. The manager receives the event
3. The event is matched with a rule and generate an alert
4. Filebeat read the alert and send it to Elastic
5. Elastic indexes the alert
6. Kibana shows the alert
Usually, the error is in point 1 or 3:
- Check if the agent has the proper configuration (by reviewing the ossec.log) and check if you have events in the Windows Event viewer for the McAfee and Symantec channels.
- At the manager side, you can enable
logall in order to see all the events that the manager receives (even if they don't trigger an alert). In this way, you will know if the agent is not collecting the events, or the manager is missing something in the ruleset (decoders/rules).
Please, let me know if you have questions.