Hi Veera. You can find out most of what you're looking for in the syscheck logs. You can acces them inside `/var/ossec/logs/ossec.log` . You should be able to grep for syscheck only messages: `cat /var/ossec/logs/ossec.log | grep syscheckd`.
At agent startup time, the logs will show you which files and directories are being scanned. You'll see messages like these ones: `2026/01/13 12:30:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/home/juan/fim_tests', with options 'size | permissions | owner | group | mtime | inode | device | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.
And: `2026/01/13 12:30:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/mtab'`
If the agent startup has happened days ago, these logs have probably been rotated and you'd not be able to see them in that file. You can restart the agent: `systemctl restart wazuh-agent` and you should see the syscheckd logs that show which files are being monitored. Or look for the rotated logs inside `/var/ossec/logs/`.
If you look for `wazuh-syscheckd: INFO: (6008): File integrity monitoring scan started.` messages. You should be able to see if there are any errors reported during the scan.
It's you're not sure if any of the NFS paths contain files that might have changed, you can force a change by creating a new file there and restarting the agent. As soon as it restarts, it will trigger a fim scan and you should be able to see the events reported in your dashboard.
If after doing that you don't see anything you might have some problem in your configuration or a permission issue where the Wazuh agent might not be able to access your NFS directories. But if that is the case you should see errors in `ossec.log` related to syscheckd. Also feel free to share the syscheckd portion of your `ossec.conf` to see if there are any invalid configurations in your settings or NFS paths.