Hello Scott,
first of all, thank you very much for your interest in Wazuh.
As
you properly mentioned, Wazuh Manager has the capability to collect
Syslog events from remote devices (agentless servers, firewalls,
routers, switches, printers, etc.) and parse them by using the Decoders
and Rules, generating the corresponding alerts when needed. The detailed
information can be found
here.
You just need to edit the Manager's /var/ossec/etc/ossec.conf file to add the following section:
<remote>
<connection>syslog</connection>
<port>514</port>
<allowed-ips>192.168.2.0/24</allowed-ips>
<protocol>udp</protocol>
</remote>
You can add more than one IP addresses or networks whose syslog will be accepted by Wazuh, just adding consecutive <allowed-ips> lines like above.
Once
the Remote syslog collection is enabled and the remote devices are
forwarding their events to the Wazuh Manager IP, you can check the
incoming syslog by using, for example, the following command:
tcpdump -i any port 514 -AA
Also, as you enabled the <logall> option in the ossec.conf file, Wazuh Manager will store all of the received events at:
/var/ossec/logs/alerts/alerts.log
Then,
if the current Decoders and Rules are ready to analyze the incoming
events from your devices, an alert will be sent to Kibana at the end of
the chain. You can see the alerts in the Kibana GUI -> Discover tab
at the lateral menu.
To parse any log in Wazuh Manager, you can use the following tool:
/var/ossec/bin/ossec-logtest
Just
paste the full log and press Enter. You will see if a existing Decoder
extracts the fields contained in the log and if a Rule triggers the
corresponding alert.
Otherwise, if the default
Ruleset of Wazuh doesn't contemplate a specific syslog type, it is very
common to create custom Decoders and Rules:
custom rules and decoders
.
Regarding
the Windows event logs, our recommendation is to install the Wazuh
Agent software on the required server. It is quite easy to install and
manage, and the resources consumption is really low. The Agents will
send their events to the Wazuh Manager in which they are regiestered.
The Manager is plently ready to parse the main three Windows events
channels: System, Application and Security.
Every event received by Wazuh Manager will be stored at /var/ossec/logs/archives/archives.log and archives.json and the generated alerts will be stored at /var/ossec/logs/alerts/alerts.json and alerts.log files.
If your server doesn't have a big disk storage, it is not recommendable to leave <logall> enabled, as it can hugely grow depending on the events per second it receives.
I hope this helps. Don't hesitate to ask us for further information.
Kind regards,
Jose M.