Hi Nepolean, thank you for using Wazuh!
Your request is possible, here are the steps to configure it:
1. You must configure the Wazuh manager to log all the events. In the case of having a cluster, this needs to be done in all the nodes. In the file /var/ossec/etc/ossec.conf, enable logall_json
<logall_json>yes</logall_json>.
Then restart the manager with systemctl restart wazuh-manager or service wazuh-manager restart.
2.
Configure Filebeat output to send all events to Elasticsearch:
The following configuration needs to be done on the Wazuh manager. In
the case of having a cluster of Wazuh managers, this configuration needs
to be done on all nodes.
Configure Wazuh Filebeat module to read both alerts and archives. In the /etc/filebeat/filebeat.yml file you need to add the archives:
filebeat.modules:
- module: wazuh
alerts:
enabled: true
archives:
enabled: true
Then restart Filebeat with systemctl restart filebeat or service filebeat restart. You can test the output with filebeat test output.
3. Create a new index pattern in Wazuh Dashboard:
- In the dashboard, open the left bar and navigate to Stack management.

- Inside that section, select Index patterns and click on Create index pattern

- For the Index pattern name, use wazuh-archives*, click in Next step and for the timestamp field choose timestamp (make sure to choose timestamp and not @timestamp)
- Click on Create Index Pattern
After that, the configuration is complete. You can see the data navigating to the
Discover section in the left panel and selecting the recently created index pattern

Regarding your second question, in both sections you will be able to see the same logs, but in Dashboard one you can see some dashboards and information about the rule that triggered the alert, meanwhile in Events you will be able to see the logs in a format similar to Discover, where you can easily filter by some field, or change the columns that you see.
I hope you find this information helpful!
Kind regards,