Agent Registration
Enrols new agents and distributes authentication keys.
authd · TCP 1515
A walk-through of the Wazuh stack — agents, server, indexer, dashboard — and where it sits
inside a Blue-Team Operations stack. Built for integration partners.
Den Angreifern einen Schritt voraus.
A free, open-source unified XDR + SIEM platform. Wazuh consolidates host-based intrusion detection, log management, file integrity monitoring, vulnerability detection, configuration assessment and active response — into a single agent and central analytics plane. No per-EPS or per-GB licensing.
Wazuh sits at the centre. Suricata feeds it network events; TheHive orchestrates incidents that come out of it; Cortex analyses observables; MISP shares IOCs back upstream. Hover a node to trace its connections.
A packet of telemetry travels from endpoint to operator screen in five hops. Click any step to focus the flow.
Enrols new agents and distributes authentication keys.
authd · TCP 1515
Receives data and validates identity.
TCP 1514
Decoders + rules drive event identification and processing.
analysisd
Programmatic interface to the Wazuh control plane.
TCP 55000
Horizontal scaling in multi-node configurations.
TCP 1516
Forwards events to the Indexer and matches IOCs against intel feeds.
filebeat · IOC match
Linux · Windows · macOS · Solaris · AIX · HP-UX. Plus container and cloud collectors. Agentless monitoring is supported via Syslog, SSH or API integration for appliances and unsupported OS targets.
OS and application logs.
File integrity monitoring.
Rootkit & anomaly detection.
Configuration assessment.
Hardware / software inventory.
Automated countermeasures.
Container security.
AWS · Azure · GCP.
linux-prod, windows-dc, dmz. One agent can belong to many groups.Log analysis pipeline, decoders, rules, FIM, Active Response, Vulnerability Detection and SCA — the building blocks your team will work with day-to-day.
<decoder name="myapp">
<program_name>myapp</program_name>
<regex>User (\S+) logged in from (\S+)</regex>
<order>user, srcip</order>
</decoder>
<rule id="100001" level="5">
<decoded_as>myapp</decoded_as>
<description>User Login via myapp</description>
<group>authentication_success,</group>
</rule>
$ /var/ossec/bin/wazuh-logtest
> myapp: User admin logged in from 10.0.0.5
→ decoder: myapp | rule 100001 (level 5): User Login via myapp
wazuh-logtest validates without restart<syscheck>
<frequency>600</frequency>
<directories realtime="yes">/etc,/usr/bin</directories>
<directories>/var/www/html</directories>
</syscheck>
/var/www/html/backdoor.phpfirewall-drop, host-deny, disable-account<active-response>
<command>firewall-drop</command>
<location>local</location>
<rules_id>5763</rules_id> <!-- SSH brute force -->
<timeout>600</timeout> <!-- 10-min block -->
</active-response>
openssl 1.1.1k installed on web-prod-04openssl 1.1.1w or laterBuilt on CIS Benchmarks plus your own policies (YAML).
Agent runs the checks locally and reports pass/fail to the server.
Pre-built checks for Linux, Windows and macOS.
PCI DSS · HIPAA · NIST 800-53 · GDPR.
All components on one server. Lab and small environments.
Components on dedicated servers. Flexibility and scale.
Container-based deployment. Cattle, not pets.
Managed service. No infrastructure of your own.
Partner-grade installs need more, but this is the fastest path to a working environment.
$ sudo apt update && sudo apt upgrade -y
$ curl -sO https://packages.wazuh.com/4.12/wazuh-install.sh
$ sudo bash ./wazuh-install.sh -a
Identical structure on Manager + Agent.
https://<IP>:443admin + generated passwordwazuh-install-files.tar in your vaulttimedatectl set-timezone)$ curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH \
| gpg --import
$ apt install wazuh-agent
Use deployment variables to auto-enrol.
Independent, owner-led Swiss cybersecurity practice based in Buchs SG. Open-source first. Hands-on Blue Team and Red Team work — no vendor lock-in, no management overhead. Wir verkaufen keine Hardware und keine Software — die Ergebnisse sind absolut neutral.