Hi Mauro,
Thank you for participating in our community and feel free to ask as many questions as you'd like, we just want to make Wazuh as easy to use as possible and provide as much value as we can to its users.
Installing the agent from sources (or from a community compiled package) will give you the latest version of Wazuh, so it would not be an older agent.
Depending on your specific needs you may do this to benefit from various capabilities of the agent, including Log collection, File Integrity Monitoring and the encryption and compression of all the information being sent directly to the Wazuh manager for analysis.
If you're only interested in collecting log messages to be analyzed by the Wazuh manager, then the simplest option is to configure syslog output on pfSense and collect them with the Wazuh manager.
The log messages from pfSense will contain information on access attempts and the Wazuh manager will be able to analyze these with the same ruleset as if there was an agent installed on the device.
Configuring a blacklist can be done on the Wazuh manager by using the integrator daemon so that when an event matches the criteria of your interest you can configure it to interact with pfSense to add it into it's block list. This can also be achieved by creating an Active Response if there is an agent installed on the pfSense device.
Given that each environment is different and in consequence so are their use cases Wazuh is very flexible and the best practice will greatly depend on the need you are trying to fulfill.
Some users will only need Wazuh to gain visibility on the logs being produced by their assets while others will also want to take action and add more context to the information being observed.
I'll be happy to answer any questions you may have to achieve your goal.
Best Regards,
Juan Carlos Tello.