Hi dear Alexis!
I
will try to help you the best way possible, but I am not completly
sure about understanding your requirements. So, if I am not clear
enough with some of the reponses please let me know.
Firstly,
what kind of events you consider noisy or not relevant in case of
incident?
If you refer to a specific kind of event, it would be
easier filter them.
Relating to your questions :
1)
According to the type of log you want to filter we can look for
different ways to solve it. On the other side, Filebeat and Logstash
are good options as well, but we can look for another solution at a
lower level.
Related to filter events on the agent side,
there are different possibilities depending on the type of logs you
want to silence.
For example :
- For Wazuh modules the only way to silence their events is to disable specific modules such as Syscollector or SCA. Here you can find related documentation about them:
https://documentation.wazuh.com/3.x/user-manual/reference/ossec-conf/wodle-syscollector.html
https://documentation.wazuh.com/3.x/user-manual/reference/ossec-conf/sca.html
- When collecting
Windows logs from the EventChannel, you can use the `<query>`
option to filter noisy Windows events on the agent log
collector.
https://documentation.wazuh.com/3.x/user-manual/capabilities/log-data-collection/how-to-collect-wlogs.html#filtering-events-from-windows-event-channel-with-queries
- For other modules
like Syscheck, there exists an `ignore` option which allows to filter
events for specific files or
directories.
https://documentation.wazuh.com/3.x/user-manual/reference/ossec-conf/syscheck.html#ignore
2)
By design, level 0 is used to mute alerts, so rules with that level
won’t never be written to the alerts file.
For the other two
questions, every generated alert will be duplicated on the archives
files.
So, the more alerts your manager fires (changing level 0 to
1), the more duplicated events will appears if monitoring both files.
Our documentation already notices this:
“Alerts will be duplicated if you use both of these files. Also, note that both files receive fully decoded event data.” - - - https://documentation.wazuh.com/3.x/getting-started/architecture.html
It
would be very useful to have more detailed information about your
needs. It is very important for us to understand the
needed of collect all the generated events for security reasons and
to avoid noisy events at the same time.
I
hope I have been helpful.
We are at your disposal.
Best
regards,
Daniel
<rule id="5700" level="0" noalert="1">
<decoded_as>sshd</decoded_as>
<description>SSHD messages grouped.</description>
</rule>0095-sshd_rules.xml<rule id="5700" level="4" overwrite="yes">
<decoded_as>sshd</decoded_as>
<description>SSHD messages grouped.</description>
</rule>** Alert 1561380100.34052: - local,syslog,sshd,
2019 Jun 24 12:41:40 wazuhManager->/var/log/auth.log
Rule: 5700 (level 4) -> 'SSHD messages grouped.'
Jun 24 12:41:40 wazuhManager sshd[25809]: Disconnected from 10.0.2.2 port 36834Enter code here...{"timestamp":"2019-06-24T12:41:40.916+0000","rule":{"level":4,"description":"SSHD messages grouped.","id":"5700","firedtimes":1,"mail":false,"groups":["local","syslog","sshd"]},"agent":{"id":"000","name":"wazuhManager"},"manager":{"name":"wazuhManager"},"id":"1561380100.34052","full_log":"Jun 24 12:41:40 wazuhManager sshd[25809]: Disconnected from 10.0.2.2 port 36834","predecoder":{"program_name":"sshd","timestamp":"Jun 24 12:41:40","hostname":"wazuhManager"},"decoder":{"name":"sshd"},"location":"/var/log/auth.log"}