Both Wazuh Vulnerability Detector and the new IT Hygiene Dashboard (System Inventory) in version 4.13.0 rely on the Indexer connector to forward inventory data to the Wazuh indexer. https://documentation.wazuh.com/current/user-manual/reference/ossec-conf/indexer.html
Since you mentioned that you have newly installed Wazuh, make sure that the agent is properly added. https://documentation.wazuh.com/current/installation-guide/wazuh-agent/index.html The agent’s syscollector module will collect system inventory data from that specific machine and send it to the Wazuh manager for both vulnerability detection and IT hygiene—provided the agent is installed on the endpoint.
Please ensure that the configuration is set up as shown below (add any missing entries if they are not present) in wazuh-manger
<vulnerability-detection>
<enabled>yes</enabled>
<index-status>yes</index-status>
<feed-update-interval>60m</feed-update-interval>
</vulnerability-detection>
<indexer>
<enabled>yes</enabled>
<hosts>
<host>
https://0.0.0.0:9200</host>
</hosts>
<ssl>
<certificate_authorities>
<ca>/etc/filebeat/certs/root-ca.pem</ca>
</certificate_authorities>
<certificate>/etc/filebeat/certs/filebeat.pem</certificate>
<key>/etc/filebeat/certs/filebeat-key.pem</key>
</ssl>
</indexer>
Replace 0.0.0.0 with the IP address or hostname of your Wazuh indexer node. You can find this value in the Filebeat configuration file at /etc/filebeat/filebeat.yml.
output.elasticsearch.hosts:
-
127.0.0.1:9200Ensure that the <certificate> and <key> names match the files located in /etc/filebeat/certs/. Check the cert's name using the command:
ll /etc/filebeat/certs
Save the Wazuh indexer username and password into the Wazuh manager keystore using the Wazuh-keystore tool:
/var/ossec/bin/wazuh-keystore -f indexer -k username -v <INDEXER_USERNAME>
/var/ossec/bin/wazuh-keystore -f indexer -k password -v <INDEXER_PASSWORD>