You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
HI Team
we are the process of implementation in wazuh (threat hunting) and (threat intelligence)
could you please any one please share your information that would be great help for us
Thanks in advance
Pacome Kemkeu
unread,
Sep 25, 2023, 3:00:55 AM9/25/23
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Gowtham,
First, take a look at this documentation that provides a comprehensive overview of different Wazuh capabilities that can be implemented in the process of Threat hunting. Here you'll find guidance on:
Utilize the Wazuh MITRE ATT&CK module to map and understand cyber attack tactics, techniques, and procedures (TTPs) that occur in your environment.
In a second time concerning your request for Threat Intelligence, Wazuh offers integrations with various CTI platforms such as MISP, URLHaus, VirusTotal, AlienVault and more. You can find in our documentation and blogs various write-ups that will help you integrate these according to your own requirements. A few example are: