

Hello Mohamed,
To investigate the attack, start by checking the number of events in the Event Viewer and compare them with the alerts in the Dashboard, specifically looking for Event ID 4769.
Alerts triggered with Rule ID 60131 are associated with Event ID 4769:
If the number of alerts in the Dashboard does not match the number of events in the Event Viewer, you should also check the archive logs.
To access all logs, enable archive logging in the Wazuh configuration file by following these steps:
Open the Wazuh configuration file located at /var/ossec/ossec.conf.
Set <logall_json> to yes as shown below:
<ossec_config>
<global>
...
<logall_json>yes</logall_json>
...
</global>
</ossec_config>
Restart the Wazuh manager with the following command:
systemctl restart wazuh-manager
Once archive logging is enabled, you can find the logs in the archive log file. Use the following command to filter the logs for specific text:
Based on these logs, you may need to create custom rules. For more information on creating custom rules, please refer to the Wazuh documentation.
Let me know if you need further assistance.
Regards,Hello Mohamed,
It appears that rule 60103 is missing from your Wazuh rule files. Please confirm if you've made any changes to the default rule files, particularly in the 0580-win-security_rules.xml file.
You can review the original rule file here: 0580-win-security_rules.xml on GitHub.
The following warnings indicate that the rule is missing:
Based on these warnings, it seems the rule is missing.
Let me know the update on this.
Regards,
Hasitha Upekshitha







