Hi Mathias
The flow that Wazuh performs is:
Log Collection: The process begins with log collection. Wazuh agents are responsible for collecting logs from various sources, such as system logs, application logs, network logs, etc.
Normalization/Decoding: Once the logs are collected, they are normalized or decoded. This step involves parsing the raw log data into a structured format that Wazuh can understand and work with. Decoders are used here to convert logs from their original format into a common format for analysis.
Analysis and Parsing: After normalization, the logs are analyzed. Wazuh parses the normalized logs and extracts relevant information, such as timestamps, source IP addresses, usernames, etc. This parsed data is then indexed for easier search and retrieval.
Rule Matching: Wazuh applies rules to the parsed logs to detect security incidents or anomalies. These rules define conditions or patterns that, when matched, indicate potential security threats or policy violations. If a log matches a rule, an alert is generated.
Alerting: When an alert is generated, Wazuh can take various actions based on configured policies. This may include sending notifications, logging the alert to a centralized location, executing custom scripts, or taking other automated response actions.
Storage and Indexing: The parsed and analyzed logs, along with any generated alerts, are stored and indexed for later retrieval and analysis. This allows security analysts to search and query the logs efficiently.
You can find information in the following links:
Regards
Antonio