Hi Md. Nazmur Sakib,
Thank you for the guidance. I have implemented the custom rule in my /var/ossec/etc/rules/local_rules.xml on the Wazuh Manager as you suggested. I used the following configuration:
root@wazuhprod:/home/w414p# cat /var/ossec/etc/rules/local_rules.xml
<!-- Local rules -->
W<!-- Modify it at your will. -->
<!-- Copyright (C) 2015, Wazuh Inc. -->
<!-- Numbering Scheme: -->
<!-- SSH Related: 100000 - 100099 -->
<!-- FTP Related: 100200 - 100299 -->
<!-- Web Related: 100100 - 100199 -->
<!-- Docker/Container: 100300 - 100399 -->
<!-- Rootcheck/System: 100500 - 100599 -->
<!-- Custom Dedup: 100600 - 100699 -->
<group name="local,syslog,sshd,web,attack,linux,docker,network,custom_dedup,rootcheck,tune_rule,">
<!--
Dec 10 01:02:02 host sshd[1234]: Failed none for root from 1.1.1.1 port 1066 ssh2
-->
<rule id="100001" level="5">
<if_sid>5716</if_sid>
<srcip>1.1.1.1</srcip>
<description>sshd: authentication failed from IP 1.1.1.1.</description>
<group>authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,</group>
</rule>
<rule id="100101" level="1">
<if_sid>31101</if_sid>
<srcip>10.200.0.1</srcip>
<description>Ignore web 404 from internal gateway</description>
</rule>
<!-- Mute promiscuous mode for Docker veth interfaces -->
<rule id="100301" level="0">
<if_sid>5104</if_sid>
<hostname>mailserver</hostname>
<match>device vethc4ea9f2 entered promiscuous mode</match>
<description>
Interface entered in promiscuous(sniffing) mode.
</description>
</rule>
<!-- Ignore LXC boot-id file in /dev -->
<rule id="100501" level="0">
<if_group>rootcheck</if_group>
<match>/dev/.lxc/proc/</match>
<description>Ignore false positive for /dev/.lxc/proc</description>
</rule>
</group>
I have restarted the Wazuh Manager, and I am currently monitoring the incoming alerts to confirm if this stops the daily reports. I will wait for the next scheduled scan to see if it works as expected.
In the meantime, could you please clarify if this Manager-side configuration is enough? Or should I also perform any specific configuration on the Wazuh Agent side (like adding an ignore path in ossec.conf) to prevent the agent from flagging these files in the first place?
I want to make sure I’m following the best practices for this. Thanks again for your help!