téïcée

Wazuh – OpenSource security platform

Detection, prevention and response to cyber threats

SIEM and EDR

The functions

  1. Intrusion Detection (IDS/IPS)
  2. Correlation of Events
  3. Analysis of logs
  4. Vulnerability Management
  5. Compliance and reporting
  6. Extensibility and integrations
  7. Correlation and « Threat Intelligence »

Areas of application

  • Intrusion Detection
  • Checking the integrity of files
  • Vulnerability detection / configuration assessment
  • Regulatory Compliance
  • Reporting

Some examples of use cases

  • Checking the integrity of files
  • Verifying compliance of configuration files (tampering by a third-party program)
  • Checking the proper functioning of the antivirus on the workstations
  • Ransomware Detection
  • MAC address flapping detection on network equipment
  • DDOS attack detection
  • Alert for massive authentication error (Web, 802.1X …)

Principle of operation

  • A manager centralizing events
  • Agents on each workstation or server, registered with the manager
  • The manager defines the monitoring rules (e.g. number of failed login attempts)
  • Agents apply actions if a rule matches (e.g. block IP)
  • Agents report events to the manager
  • The manager can take additional actions (e.g. isolate the machine from the network)

Architecture

Architecture Wazuh

Components

Agent

Installed on the end devices, it sends information back to the server

Server

Analyzes and indexes alerts generated by the server

Interface

Allows visualization of data

Indexer

Stores and indexes server-generated alerts