You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Good morning, i have installed wazuh server v.4.13 and win11 clients v.4,13 with a domain controller. I would like to know if wazuh can somehow view or alert users' failed Windows attempts or intent of privilege excalation (best if in real time).
If yes, where can I see this information, thanks.
Oluwaseyi Soneye
unread,
May 7, 2026, 9:05:24 AM (3 days ago) May 7
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello, Yes, Wazuh can alert on both.
For failed logon attempts: Wazuh has a built-in rule ID 18106 that triggers on Windows Event ID 4625. As long as your Windows Audit Policy has Logon/Logoff auditing enabled, you'll see these alerts in real time under ☰ > Security Events (filter by rule.id:18106)
2. Add these to ossec.conf on each agent: <localfile> <location>Microsoft-Windows-Sysmon/Operational</location> <log_format>eventchannel</log_format> </localfile>
3. Also make sure your Windows Audit Policy covers Privilege Use and Account Management events (IDs 4673, 4674, 4720, 4732).
On the Wazuh dashboard, you can view alerts under Security events.