Hi Jose,
You can update the rule like this:
<group name="disk_space_utilization,">
<rule id="100015" level="7">
<decoded_as>disk-usage</decoded_as>
<field name="filesystem">^/dev/</field>
<field name="usage">^9\d|^8\d|^79\d|^78\d|^77\d|^76\d|^75\d</field>
<description>Usage $(usage)% of $(filesystem) partition exceeded 75%.</description>
</rule>
</group>
Check this document to learn more about regex:
Regular Expression Syntax
To define a range [5-9]
You need to use PCRE regex
<field name="usage" type="pcre2"> </field>
Check this document to learn more
Perl-compatible Regular Expressions
Jose Cintron 11:25 AM
(Hello Nazmur
Thanks for the information and the pointers to the documentation (I'm sure they'll come handy in the future). One more question, when you said 'You will find the manager server logs using the agent.id 000.', what is this in relation to?)
—---------------
If you go to Threat hunting or Discover. And if you filter with agent ID 000, you will be able to see all alerts from the Wazuh manager.
Check the screenshot for reference.

If you want to enable vulnerability detection on the Wazuh manager host, modify the internal_options.conf file at /var/ossec/etc/internal_options.conf. Set the parameter vulnerability-detection.disable_scan_manager from 1 to 0. This change allows the Vulnerability Detection module to include the Wazuh manager host in its scans. After updating the configuration, restart the Wazuh manager to ensure the changes take effect.
Ref: Enable vulnerability detection on the Wazuh manager.
While replying to any post in google group. Please use reply all; otherwise, the reply will not be visible in the post.
Let me know if you need any further information.