Hi,
> I don't have any data, about Security or System.
I understand that you mean that you don't see any alert on Wazuh WUI regarding Security or System sources, right? It could be for several reasons.
The log flow is:
- Agent collect events
- Manager receives events
- The rule engine decodes the event and checks if it matches with a rule
- In case a rule is matched and the level is higher or equal to 3, an alert is generated. So, you will see it in the alerts.json file and in Wazuh WUI.
You need to review each step:
- Review the ossec.log of your agent and check if there is an error.
- Force an event in your agent. Enable log_all in your manager: this file will log in /var/ossec/logs/archives/archives.json any event received in the manager.
- / 4. If you see the event in the archives.json file, but not in the /var/ossec/logs/alerts/alerts.json file means that any rule is matching that event. So, you will need to create your own rules.
> Other topic, because you don't want ingest these EventID?
It is the default configuration. Some event IDs could be potentially dangerous. For example, if you collect an event for "every new tcp connection", Wazuh is going to read that event and send it to the manager. That is a new connection, so a new event will be generated.
Let me know if you need more help.