This information contains the user who made the changes on the monitored files and also the program name or process used to carry them out.
-Auditing who-data in Linux: The who-data monitoring functionality uses the Linux Audit subsystem to get the information about who made the changes in a monitored directory. These changes produce audit events that are processed by syscheck and reported to the manager.
The main component responsible for this task is rootcheck, however, Syscheck also plays an important role.
You can find here more information about How it Works.
Security Configuration Assessment: There are multiple Wazuh integrations that perform configuration assessment scans (see Policy monitoring section) including CIS-CAT and more recently the Security Configuration Assessment (SCA). The SCA was created by the Wazuh development team to overcome limitations that were inherent to the other integrations, to name a few:
The CIS-CAT tool is proprietary software which requires an external license for its use.
The Rootcheck module depends on the Syscheck daemon and its policies feeds are often outdated.
The Security Configuration Assessment (SCA) module aims to provide the user with the best possible experience when performing scans about hardening and configuration policies. Some of its key features include:
The last state of each scanned check of every policy is stored in the manager and can be consulted by the SCA tab in the Wazuh App.
To avoid alert flooding and repeated alerts in each scan. Now, only state changes and new checks are alerted, being those states updated in the manager database.
You can find here more information about it:
Wazuh uses three components to perform this task: Rootcheck, OpenSCAP, and CIS-CAT.
Monitoring system calls: The Linux Audit system provides a way to track security-relevant information on your machine. Based on preconfigured rules, Audit proves detailed real-time logging about the events that are happening on your system. This information is crucial for mission-critical environments to determine the violator of the security policy and the actions they performed.
Audit uses a set of rules to define what is to be captured in the log files. There are three types of Audit rules that can be specified:
Control rules allow the Audit system’s behavior and some of its configuration to be modified.
File system rules, also known as file watches, allow the auditing of access to a particular file or a directory.
System call rules allow logging of system calls that specified programs makes.
Command monitoring: There are times when you may want to monitor things that are not in the logs. To address this, Wazuh incorporates the ability to monitor the output of specific commands and treat the output as though it were log file content.
Active responses execute a script in response to the triggering of specific alerts based on the alert level or rule group. Any number of scripts can be initiated in response to a trigger, however, these responses should be considered carefully. Poor implementation of rules and responses may increase the vulnerability of the system.
Agentless monitoring: Agentless monitoring allows you to monitor devices or systems with no agent via SSH, such as routers, firewalls, switches and linux/bsd systems. This allows users with software installation restrictions to meet security and compliance requirements.
Alerts will be triggered when the checksum on the output changes and will show either the checksum or the exact diff output of the change.
Anti-flooding mechanism: This mechanism is designed to prevent large bursts of events on an agent from negatively impacting the network or the manager. It uses a leaky bucket queue that collects all generated events and sends them to the manager at a rate below the specified events per second threshold. This helps to avoid the loss of events or unexpected behavior from the Wazuh components.
Additionally, agent modules can be configured to limit their event production rate, reducing the risk of saturating the leaky bucket’s buffer.
Agent labels: This feature allows the user to customize the alert information from agents to include specific information related to the agent generating the alert. This can prove useful when addressing or reviewing alerts. In addition, in large environments this capability can be used to identify groups of agents by any common characteristic like their time zone, for example.
System inventory: The Wazuh agents are able to collect interesting system information and store it into an SQLite database for each agent on the manager side. The Syscollectormodule is in charge of this task.
Vulnerability detection: Wazuh is able to detect vulnerabilities in the applications installed in agents using the Vulnerability Detector module. This software audit is performed through the integration of vulnerability feeds indexed by Canonical, Debian, Red Hat, and the National Vulnerability Database. Check here How it works.
Osquery can be used to expose an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data.
This module allows retrieving the agent information from an external database, like MySQL or any database engine, for registering it to the client.keys file.
To do this, it is necessary to create a binary or script in any language that can be integrated into your database engine and thus request the agents’ information. The wazuh-authd daemon must be running.
Below you can see the flow diagram:
Fluentd forwarder: This module allows Wazuh to forward messages to a Fluentd server. Fluentd it’s an open source data collector logger that comes along with great plugins to build your own logging layer.
This module allows the forwarding of the received messages from a dedicated UDP socket to a Fluentd server. The Fluentd server could be located on the same local machine or a remote machine.
Wazuh-Logtest: The Wazuh-Logtest whole solution was designed to replace ossec-logtest, now allowing to test and verify rules and decoders remotely, sharing the rules engine with wazuh-analysisd.
Regarding the deplyment, It can be deployed on-premises or in hybrid and Cloud. environments.
In addition, if you want is possible to integrate Bitdefender and Kaspersky with Wazuh.
Hope this was useful to you.
Don't hesitate to contact us if you have any other questions.
--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/0ab36488-02de-497e-882a-7e7024d503e6n%40googlegroups.com.