
.png?part=0.3&view=1)
Hi Muhammad,
I think the best approach is to use Wazuh agent grouping and configure the agent.conf file to disable the modules you don't need. After deployment, you can also remove the default localfile configurations from those agents.
Another option would be to overwrite the default rules to include a CDB list, but if your goal is to suppress everything for that specific agent, you'd end up overriding a lot of default rules. That can get difficult to maintain pretty quickly.
Overwrite existing rules
For example, you can use the <hostname> tag to add agent names, or else you can create a CDB list and add the list into hostname tag.
<list field="hostname">etc/lists/list-user</list>
For example:
Then you need to add the CDB list to the Wazuh manager ossec.conf file inside the ruleset tag.
Create a group (example: maintenance) and assign the agents to it. Wazuh supports grouping agents specifically so you can apply group-wide config.
Wazuh agent grouping
In the group’s centralized config (agent.conf), disable or reduce the modules that produce most alerts (Syscheck, SCA, rootcheck, etc.). Centralized config exists exactly for this use case and scales well.
However, for localfile log collections, you need to remove them from the agent side ossec.conf file.
This way, the “default rules” won’t fire because the default log paths and modules are disabled for those agents. That’s the only truly global, low-effort suppression method.
Let me know the update on this.
--
You received this message because you are subscribed to the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/81eec10b-1a76-4fd5-8063-53e07c613824n%40googlegroups.com.
I tried so much but failed, So guide me to suppress all default alerts for specific agents during maintenance or other, without disabling or removing the agents. The agents must remain active and continue sending logs, but I want to stop all default rule alerts and related email notifications only for selected agents.
I have already tried both approaches:
CDB list with custom rules
Agent group with custom rule overrides
While custom rules are loading correctly but default alerts are still being triggered. Overriding individual rule IDs is not scalable due to the large number of parent and child rules involved.
Is there an officially supported and recommended way to implement maintenance mode for specific agents? If there are any best practices or practical guidance for this scenario, please advise.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/81157c67-4f6b-41db-a187-cf589682320cn%40googlegroups.com.
Maintenance and configured the agent.conf to disable modules (Syscheck, Rootcheck, SCA, Syscollector, Vulnerability Detector) and ignore Windows event channels (Security, System, Application).Could you please advise on the official recommended approach or any practical guidance to ensure complete suppression of default rules during maintenance?
To view this discussion visit https://groups.google.com/d/msgid/wazuh/b3e9e245-a163-4ae9-88be-5613f5dcfc04n%40googlegroups.com.
You can exclude all Windows logs. If the agent is a Windows machine, you can comment out the parent Windows rule reference with the decoder so it won't match Windows logs. (This setting is for globally applying for all agents.)
Edit the rule file:
nano /var/ossec/ruleset/rules/0575-win-base_rules.xmlThen modify rule 60000 like this:
Restart the Wazuh manager to apply the changes:
systemctl restart wazuh-managerSince all Security, Application, and System rules are based on parent rule ID 60000, breaking the condition of this parent rule will ignore all Windows logs. This is probably the cleanest way to exclude Windows logs at the rule level.
Just keep in mind that this exclusion will affect all Windows agents, not just one. Make sure to note the original configuration so you can roll it back if needed.
I also tried adding a configuration in agent.conf to collect Security event channel logs with a dummy query to avoid logs:
However, this didn't work as expected - it showed duplicate log collection warnings and still read the eventchannel logs from the agent's ossec.conf file.
