Hello Jeff,
thank you for your answer.
At this moment, suricata is running as IDS.
In my case, Wazuh is working as HIDS (at host level): it blocks attacks and it provides some interesting statistics using ELK stack.
Suricata is working as NIDS (at network level): it analyses network traffic and send the information to Wazuh.
So, I can see all the information from a single and centralyzed point of view (wazuh dashboards).
Maybe I’m wrong, I’m a newbie and I’m starting using these tools together to evaluate them.
Now, I can see Suricata logs/events in Wazuh dashboards, but I didn’t receive any alert mail since the suricata alert are equal to 3 (and Wazuh is sending mail only when Wazuh alert level is >= 10).
So, as suggested by Jose, I created this local rule:
Anyway, in order ot test it, I needs to “cause” a Sucirata alert.serverity>=10 event and see what happens.
But I dont know how to do it. Moreover, I0m not so sure that Suricata alert level can reach 10 or 15 level.
Please, sorry for the confusion that my question/needs are creating.
Thanks,
Mauro