Hi Andre,
The firsts rules that are shown in the blog are meant to create an event for every command that is run by sudo.
Due to this you may get a lot of events that might not be useful to you, however, you may also create new rules to specify the commands that you wish to see in the dashboard.
With the following title in the blog: “Tracking and monitoring root-specific command execution: Once we define our rule to detect execution of commands as root, we can create additional rules that detect the use of certain malicious commands, based on this one.”
In there, you will find the steps in order to create the lists, the rule and how it works.
The rules that are specified in the blog have different levels of priority, if you only wish to see specific commands, you may silence the others rules by setting the level to 0:
<!-- System call rules -->
<rule id="80792" level="0">
<if_sid>80700</if_sid>
<list field="audit.key" lookup="match_key_value" check_value="command">etc/lists/audit-keys</list>
<description>Audit: Command: $(audit.exe)</description>
<group>audit_command,gdpr_IV_30.1.g,</group>
</rule>
<rule id="100002" level="0">
<if_sid>80792</if_sid>
<field name="audit.euid">0</field>
<description>Audit: Root command execution: $(audit.exe) with loginuid user $(audit.auid)</description>
<group>audit_command,</group>
</rule>
<rule id="100010" level="8">
<if_sid>100002</if_sid>
<list field="audit.command" lookup="match_key">etc/lists/kernel_control_commands</list>
<description>Audit: [Kernel modification] ($(audit.command)) Executed with loginuid user $(audit.auid): $(audit.execve.a0) $(audit.execve.a1) $(audit.execve.a2) </description>
<group>audit_command,</group>
</rule>
Let me know if this helps,
Regards,
Roman from Wazuh!.
What was confusing is no one was doing anything with root -- and I was getting thousands of alerts. By it was like 5 different /usr/bin programs over and over. Assuming I may just be able to set those to 0.