/etc/suricata/suricata.yaml- dns-log:
enabled: yes
filename: dns.log
append: yes/var/log/suricata/eve.json. You need to add this file to the ossec.conf file of the agent so Wazuh can monitor it<localfile>
<log_format>json</log_format>
<location>/var/log/suricata/eve.json</location>
</localfile>--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/b05e1139-946e-4a02-ac63-de3a4971dd5an%40googlegroups.com.
1. Sysmon is downloaded from the Microsoft Sysinternals page and is installed with the configuration file sysmonconfig.xml.
2. The following command is used to install Sysmon with the downloaded configuration file via command prompt (run as administrator):
3. Configure the agent to collect Sysmon events by adding the following settings to the agent configuration file in "C:\Program Files (x86)\ossec-agent\ossec.conf":
4. Apply the changes by restarting the agent using this PowerShell command:
<rule id="100010" level="5"> <if_sid>61600</if_sid> <field name="win.system.eventID">^22$</field> <description>Sysmon - Event 22: DNS Query</description></rule>To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/eb1e00cc-ab7a-4109-84ec-90f65cb40ccfn%40googlegroups.com.