But I can't see the part how to connect to a remote Wazuh Server. In my case the Wazuh server is on a VM in cloud, the agents installed on the pc work very well, but with the configuration to monitoring the switch I have some problems.
Someone can help me?
Lamya Imam
unread,
Aug 27, 2024, 7:36:56 AM8/27/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Daniele Berardi,
First, configure your Switch to forward log to remote syslog server.
There are different ways of log collection methods in Wazuh for agentless network devices.
You can forward the logs to a Syslog server and use localfile to forward the logs in Wazuh or you can directly forward the logs to Wazuh via Syslog forwarding.
This would entail adding a block similar to the following to your ossec.conf file: <remote> <connection>syslog</connection> <port>514</port> <protocol>tcp</protocol> <allowed-ips>192.168.2.15/24</allowed-ips> <local_ip>192.168.2.10</local_ip> </remote>
The allowed-ips label is mandatory. The configuration will not take effect without it.
Next, check if relevant logs are forwarded to your Wazuh manager. For this, You can try the following steps:
Activate the 'logall' option within the manager's ossec.conf file, as outlined in our Documentation: Wazuh Documentation | logall
This option will allow you to see all the events being monitored by your manager in the /var/ossec/logs/archives/archives.log file. You will then be able to observe the incoming log generated by your endpoint. After setting this option, restart the manager and check the archives.log file.
Note: Don't forget to disable the logall parameter once you have finished troubleshooting. Leaving it enabled could lead to high disk space consumption.
Look for if there are any logs inside the archive log which is relevant. Use grep parameters related to the logs: cat /var/ossec/logs/archives/archives.log | grep Keywoard
Test those logs using log-test to find out if logs are decoded by decoders and rules.
Hope this helps! Let me know if you need further assistance on this!
Daniele Berardi
unread,
Aug 29, 2024, 3:25:22 AM8/29/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Good Morning Lamya, I follow the guide and the log is correctly received to syslog. I try to make a decoder for the logs, but it doesn't work.
I try with rules test and the log is decoded with symantec decoder. How can I do?
Thanks you to support!
Lamya Imam
unread,
Aug 29, 2024, 4:53:34 AM8/29/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Daniele Berardi,
At first, we need to make sure that the log from syslog server is forwarded to Wazuh.
Could you please share the log from archives.json file of your Wazuh manager? cat /var/ossec/logs/archives/archives.log | grep Keywoard
To enable archives.json log, set the <logall_json>yes</logall_json> to yes at /var/ossec/etc/ossec.conf file. You will then be able to observe the incoming log generated by your endpoint.
Note: Don't forget to disable the logall parameter once you have finished troubleshooting. Leaving it enabled could lead to high disk space consumption.
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello,
Filtering with DPW-SW1, I try with logger test from the switch, and this is the result from archive.log
2024 Aug 29 11:42:45 DPW-SW1->/var/log/syslog Aug 29 11:42:44 DPW-SW1 74acb943ac7a,US-24-G1-7.0.50+15613: user: test
Lamya Imam
unread,
Aug 29, 2024, 9:43:34 AM8/29/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hi
As Wazuh is receiving the log from the syslog server, The log that you have provided is a generic information level log where the rules are usually set to level 0. It is already detected by Wazuh but not shown in the dashboard due to its level being 0.[Screenshot provided for reference].
If you want to see the alerts for information level logs on your dashboard, you can create a custom rule based on the existing rules. For example: For the existing rule id 7300, which was detected from the log "
Aug 29 11:42:44 DPW-SW1 74acb943ac7a,US-24-G1-7.0.50+15613: user: test"
We can create the custom rule like this: <group name="symanteclog,"> <rule id="100010" level="10"> <if_sid>7300</if_sid> <hostname>Agent_name</hostname> <description>Custom Informational Symantec AV rules.</description> </rule> </group>
Creating custom rules will depend on the logs that you are receiving. Similarly you can create custom rules for alerts as shown above.
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Lamya, Thanks you for the answer.
It's all correct that you say, I didn't see the rule level set to 0. Trying the log that I sent to test with ruleset test, it's decoded with symantec, so that isn't a problem to appear on discovery, is it correct? Now, I modified this one on 10. I repeat the log test, but nowhere agentless.host:* events in Discover.
This filter is correct or am I wronging something?
Lamya Imam
unread,
Sep 2, 2024, 9:27:21 AM9/2/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello
Daniele Berardi,
No issues! It will appear on discovery once the log is forwarded to Wazuh. Running the log test will not make it happen, as it is only used for testing the decoders and rules.
I believe you can see the generated logs from archives.json log. Once the log is forwarded to Wazuh, the rule will trigger the alert and show it on the Dashboard.
Let me know if you need further assistance on this!