Hi Shiyas,
First, install and configure Suricta on the Wazuh manager’s server to detect network intrusions
https://docs.suricata.io/en/latest/install.html
https://docs.suricata.io/en/latest/
You can forward the logs from Suricata to the Wazuh manager. The EVE output from the Suricta facility outputs alerts, anomalies, metadata, file info and protocol specific records through JSON if you want to forward the eve.json log to the Wazuh manager the configuration will look something like this
<ossec_config>
<localfile>
<log_format>json</log_format>
<location>/var/log/suricata/eve.json</location>
</localfile>
</ossec_config>
Read this document to learn more about <localfile> configuration.
https://documentation.wazuh.com/current/user-manual/capabilities/log-data-collection/monitoring-log-files.html
Next, you might need to write decoders and rules to trigger alerts from these logs. Check this document for writing decoders and rules
https://documentation.wazuh.com/current/user-manual/ruleset/index.html
You can also check these documents on Suricta for monitoring endpoint network-based attacks
https://documentation.wazuh.com/current/proof-of-concept-guide/integrate-network-ids-suricata.html
https://wazuh.com/blog/responding-to-network-attacks-with-suricata-and-wazuh-xdr/
I hope you find this information useful.
--
You received this message because you are subscribed to a topic in the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/wazuh/RL7eTyE0xU8/unsubscribe.
To unsubscribe from this group and all its topics, send an email to wazuh+un...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/8c4991b9-8d58-4652-8491-1f594b9d63cen%40googlegroups.com.
Hi shiyas,
Sorry for the late response.
Please configure your Suricata configuration following this document:
https://documentation.wazuh.com/current/proof-of-concept-guide/integrate-network-ids-suricata.html
Modify Suricata settings in the /etc/suricata/suricata.yaml file and set the following variables:
HOME_NET: "<UBUNTU_IP>"
EXTERNAL_NET: "any"
default-rule-path: /etc/suricata/rules
rule-files:
- "*.rules"
# Global stats configuration
stats:
enabled: yes
# Linux high speed capture support
af-packet:
- interface: enp0s3
- interface represents the network interface you want to monitor. Replace the value with the interface name of the Ubuntu endpoint.
And restart the service.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/21b60765-0838-42db-86f2-46168e2dbf90n%40googlegroups.com.
We do not have any reference document for the Suricata configuration for Windows.
Based on the Suricata document you can install and configure it on a Windows machine as well.
https://suricata.io/download/
https://suricata.io/documentation/