Hi Nassim!
Let us get this clear, in order to do it I will ask you some questions:
archives.json file as well? In case it is not being filled, please try enabling the logall_json option on your manager’s ossec.conf file.archives.json, could you please share one of the JSON events, logged to such a file, that you would expect to see in the alerts?I will be waiting for your reply,
Koremblum Mariano
Good evening all.
I also thinkins how to send kaspersky logs to wazuh server.
What steps should i take?
Regards,
Ruslan O. Nesterov


Hi again Nassim!
So, we have to consider that the alerts are just regular logs with an alert level equal to or higher than the log_alert_level value set in the manager’s ossec.conf file, which by default is 3. So, if you haven’t modified such a value, it is okay not to see the events on the dashboard, as from what I can see, the alerts have a level 2, you can find this value in rule->level.
Are you sure that you want to visualize these alerts on the dashboard? You may achieve it by creating a custom rule that inherits from rule 1002, which is the one that is being matched. I would strongly recommend you reading the following links to have a better understanding of the rules/decoders creation:
Note: to test the rules/decoders with wazuh-logtest, you should use the full_log string that is located on every log entry of the archives.json file.
Please, let us know if you still need further guidance with this.
Best Regards,
Mariano Koremblum
Hi Nassim,
Unfortunately, there is no specific place to search for users’ custom rules and decoders, at least that I know. Your best chance is to google what you are looking for and most of the results will, probably, be on one of our official community channels.
In any case, if you need help with creating your rules or decoders, you can always open a new thread to ask for our assistance.
Best Regards,
Mariano Koremblum