Security Operations Center Tools (Wazuh)


Wazuh is a security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. The solution is composed of a single universal agent and three central components: the Wazuh server, the Wazuh indexer, and the Wazuh dashboard.

Installing Wazuh

curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh && sudo bash ./wazuh-install.sh -a -i

Once the assistant finishes the installation, the output shows the access credentials and a message that confirms that the installation was successful.

INFO: --- Summary ---
INFO: You can access the web interface https://<wazuh-dashboard-ip>
    User: admin
    Password: <ADMIN_PASSWORD>
INFO: Installation finished.

Accessing the Wazuh Dashboard

visiting the url : https://<machine-IP>

Enter the above generated credentials

Adding Hosts(Agents) to the Wazuh

Adding Windows Agent

https://documentation.wazuh.com/current/installation-guide/wazuh-agent/wazuh-agent-package-windows.html

After installing the following software go the default installation directory and run the win32.ui file in the administrator mode to make connection with the wazuh server

We will receive the following dashboard, and then we can directly make connection with the wazuh server using the managing sever IP and the authentication key which is generated unique by the user.

Obtaining the Authentication key

on the wazuh server, enter the installation directory & run the script of managing the agents onto it:

After obtaining the agent authentication token paste it into the wazuh agent and then start the wazuh agent service and in the short time the agent will be listed as the active agent into the dashboard.


File Integrity Monitoring using Wazuh

Wazuh has a built-in capability for file integrity monitoring. The Wazuh FIM module monitors files and directories and triggers an alert when a user or process creates, modifies, and deletes monitored files.

Making changes to the agent configuration file navigate to the following directory :

Under the File integrity monitoring, append the following line to start the FIM service

Active Response:


Virustotal Integration for Extensive Detection & Response

Step-1 Creating the remove-threat.py file

Save this code as the following name and then open the PowerShell window into the particular directory and use following command to make the executable file :

Move the executable file remove-threat.exe to the C:\Program Files (x86)\ossec-agent\active-response\bin directory & Restart the agent service.

Step-2 Server Configuration

Add the following rules to the Wazuh server /var/ossec/etc/rules/local_rules.xml file to alert about the active response results.

Restart the service using:

Step-3 Emulation

This is the simulation code to test the antivirus using the virus total integration


Last updated