Security Operations Center Tools (Wazuh)
Wazuh is a security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. The solution is composed of a single universal agent and three central components: the Wazuh server, the Wazuh indexer, and the Wazuh dashboard.
Installing Wazuh
curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh && sudo bash ./wazuh-install.sh -a -iOnce the assistant finishes the installation, the output shows the access credentials and a message that confirms that the installation was successful.
INFO: --- Summary ---
INFO: You can access the web interface https://<wazuh-dashboard-ip>
User: admin
Password: <ADMIN_PASSWORD>
INFO: Installation finished.Accessing the Wazuh Dashboard
visiting the url : https://<machine-IP>
Enter the above generated credentialsAdding Hosts(Agents) to the Wazuh
Adding Windows Agent
https://documentation.wazuh.com/current/installation-guide/wazuh-agent/wazuh-agent-package-windows.htmlAfter installing the following software go the default installation directory and run the win32.ui file in the administrator mode to make connection with the wazuh server

We will receive the following dashboard, and then we can directly make connection with the wazuh server using the managing sever IP and the authentication key which is generated unique by the user.
Obtaining the Authentication key
on the wazuh server, enter the installation directory & run the script of managing the agents onto it:

After obtaining the agent authentication token paste it into the wazuh agent and then start the wazuh agent service and in the short time the agent will be listed as the active agent into the dashboard.
File Integrity Monitoring using Wazuh
Wazuh has a built-in capability for file integrity monitoring. The Wazuh FIM module monitors files and directories and triggers an alert when a user or process creates, modifies, and deletes monitored files.
Making changes to the agent configuration file navigate to the following directory :
Under the File integrity monitoring, append the following line to start the FIM service
Active Response:
Virustotal Integration for Extensive Detection & Response
Step-1 Creating the remove-threat.py file
Save this code as the following name and then open the PowerShell window into the particular directory and use following command to make the executable file :
Move the executable file remove-threat.exe to the C:\Program Files (x86)\ossec-agent\active-response\bin directory & Restart the agent service.
Step-2 Server Configuration
Add the following rules to the Wazuh server /var/ossec/etc/rules/local_rules.xml file to alert about the active response results.
Restart the service using:
Step-3 Emulation
This is the simulation code to test the antivirus using the virus total integration
Last updated