Hi Andrehens Chicfici,
You can check your agent’s queue_size, events_per_second (EPS), and increase the size following the limits shared in the document
queue_size can be any number between 1 and 100000
https://documentation.wazuh.com/current/user-manual/reference/ossec-conf/client-buffer.html
But increasing it too much can overwhelm the agent's performance, I will suggest you check on alerts that are continuously triggering and the alert description to find out the eventID and restrict the event from the agent’s ossec.conf. Further, investigate your event viewer why this event is triggering an unusual number of times and try to work on it, when the issue is resolved you can allow collecting logs of that eventID.
At first, you need to review the event logs, to detect anomalies or patterns in the generated events that are responsible for generating lots of logs. You can use this information to reduce false positives. This information can help you understand the root cause of the event and to take appropriate actions to mitigate it.
For example,
If you are receiving Audit Failure events (4673) log from a process called chrome.exe located as C:\Program Files\Google\Chrome\Application\chrome.exe, you can restrict the event from your agent’s ossec.conf.
Go to the ossec.conf of the agent
Run PowerShell as administrator
Open the configuration file with
notepad.exe 'C:\Program Files (x86)\ossec-agent\ossec.conf'
Check you have a configuration like this and add the EventID != 4673 with the configuration of <location>Security</location> inside <localfile> existing configuration.
<localfile>
<location>Security</location>
<log_format>eventchannel</log_format>
<query>Event/System[EventID != 5145 and EventID != 5156 and EventID != 5447 and EventID != 4656 and EventID != 4658 and EventID != 4663 and EventID != 4660 and EventID != 4670 and EventID != 4690 and EventID != 4703 and EventID != 4907 and EventID != 5152 and EventID != 5157 and EventID != 4673 ]
</query>
<localfile>
Save the config file.
Then restart the agent and check if the alert has stopped triggering.
Restart-Service -Name wazuh
Based on your alert you can change your event ID as mentioned above.
You can find the detailed explanation of how the agent's events are buffered in the following documentation: https://documentation.wazuh.com/current/user-manual/agents/antiflooding.html
If you do not see any repetitive alerts enable archive and check if you have any repetitive events on the archive log from that agent.
Ref:https://documentation.wazuh.com/current/user-manual/manager/event-logging.html#archiving-event-logs
Make sure to disable the archive after testing as it generates lots of logs and occupies disk space.
It seems successful network logon and logoff events are little more than “noise “on domain controllers and member servers because of the amount of information logged and tracked. Unfortunately, you can’t just disable successful network logon/logoff events without also losing other logon/logoff events for interactive, remote desktop, etc.
But I think we can use query to filter some of the unwanted successful logon events using query.
To filter Windows eventchannel events, XPATH format is used to make the queries following the event schema.
Example:
Assuming that you need to filter out the event with ID 4738 and has the TargetUserName as TEST also the event ID 4722. The configuration would be as follows:
<localfile>
<location>Security</location>
<log_format>eventchannel</log_format>
<query>
\<QueryList\>
\<Query Id="0" Path="Security"\>
\<Select Path="Security"\>*\</Select\>
\<Suppress Path="Security"\>*[System[(EventID=4722)]]\</Suppress\>
\<Suppress Path="Security"\>*[System[(EventID=4738)]] and *[EventData[Data[@Name='TargetUserName'] and (Data ='TEST')]]\</Suppress\>
\</Query\>
\</QueryList\>
</query>
</localfile>
Ref: https://documentation.wazuh.com/current/user-manual/reference/ossec-conf/localfile.html#query
https://learn.microsoft.com/en-us/windows/win32/wes/eventschema-schema?redirectedfrom=MSDN
Let us know if you need any further information.