doing the indicated steps, this rule appears to me:
{"timestamp":"2025-01-15T13:16:01.963+0000","rule":{"level":4,"description":"Fortigate: SSL VPN user failed login attempt.","id":"81614","firedtimes":3,"mail":false,"groups":["fortigate","syslog","authentication_failed","invalid_login"],"gdpr":["IV_32.2","IV_35.7.d"],"gpg13":["7.1"],"hipaa":["164.312.b"],"nist_800_53":["AC.7","AU.14"],"pci_dss":["10.2.4","10.2.5"],"tsc":["CC6.1","CC6.8","CC7.2","CC7.3"]},"agent":{"id":"000","name":"wazuhsiem"},"manager":{"name":"wazuhsiem"},"id":"1736946961.202043626","full_log":"date=2025-01-15 time=14:16:01 devname=\"NAME\" devid=\"ID\" eventtime=1736946961953605170 tz=\"+0100\" logid=\"0101039426\" type=\"event\" subtype=\"vpn\" level=\"alert\" vd=\"root\" logdesc=\"SSL VPN login fail\" action=\"ssl-login-fail\" tunneltype=\"ssl-web\" tunnelid=0 remip=IP user=\"XXXX\" group=\"N/A\" dst_host=\"N/A\" reason=\"sslvpn_login_permission_denied\" msg=\"SSL user failed to logged in\"","decoder":{"name":"fortigate-firewall-v6"},"data":{"action":"ssl-login-fail","dstuser":"XXXX","eventtime":"1736946961953605170","ip":"IP","level":"alert","logdesc":"SSL VPN login fail","logid":"0101039426","msg":"SSL user failed to logged in","reason":"sslvpn_login_permission_denied","subtype":"vpn","time":"14:16:01","type":"event","vd":"root"},"location":"IP"}
This is the information I'm looking for, but it doesn't appear on the web. However, here you can see how the information arrives and Wazuh processes it correctly (because it can be seen that it has passed through the decoder and rule).