Hello Matt,
In the case you want to monitor logs from applications, you need to let the agents know about their location and format and the agents will report those logs in real-time with logcollector.
To monitor the Application Windows EventChannel, you need to check that the agents have this configuration (can use centralized configurations -agent.conf- or edit the file ossec.conf manually). By default, this is enabled.
<localfile>
<location>Application</location>
<log_format>eventchannel</log_format>
</localfile>
This way, we are telling Wazuh Windows agents to monitor all events from the Application channel. One way to check this is working is using ARCHIVES (disabled by default).
Edit the ossec.conf file in all Wazuh nodes (this configuration is not auto-synched) to enable the logall feature. We have 2 archives, the logall (which will use archives.log file) and the logall_json option that will use archives.json to show the logs with extra information, as decoders used, rules matched, etc. I would recommend logall_json since you'll get more information and not only the raw log so you'll be aware of the reaction of Wazuh when the logs arrived. You can enable both and compare them if you wish. Bear in mind, this will use much more disk space since you'll be storing all the events that are reaching the manager not only the alerts.
<logall>yes</logall>
<logall_json>yes</logall_json>
After these changes, you must restart the managers to apply the changes (every Wazuh node that was altered). You can do it with systemctl restart wazuh-manager / service wazuh-manager restart.
Now if we "tail" the archives to track specific data, such as "tail -f /var/ossec/logs/archives/archives.json | grep '"EventChannel"' | grep Application" we will see in "real-time" all data in that manager and also, how the manager reacted to the logs (screenshot attached).
You can see, a second after the event in the agent was generated, the data in the manager and you can see last 2 events generated an alert level 3 and a level 5, the agent's name, id, ip, the decoder used was "windows_evenchannel", etc. Not all the events will produce an alert, only those who were matched against a stock/custom rule.
Let me know if this helped,
John.-