{"id":2248,"date":"2024-07-05T17:42:14","date_gmt":"2024-07-05T15:42:14","guid":{"rendered":"https:\/\/www.teicee.com\/?post_type=solution&#038;p=2248"},"modified":"2026-04-29T17:14:19","modified_gmt":"2026-04-29T15:14:19","slug":"wazuh-plateforme-opensource-de-securite","status":"publish","type":"solution","link":"https:\/\/www.teicee.com\/en\/solution\/wazuh-plateforme-opensource-de-securite\/","title":{"rendered":"Wazuh \u2013 OpenSource security platform"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Detection, prevention and response to cyber threats<\/h2>\n\n\n\n<p class=\"has-large-font-size\">SIEM and EDR<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The functions<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><!-- <div class=\"col-12 col-lg-6 img-carre\"> -->\n<div class=\"img-carre\">\n    <div class=\"element-svg cercle\">\n        <svg id=\"uuid-1e458e34-9818-49d8-a91d-fc9aaed89cde\" data-name=\"Calque 1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 205.488 205.473\">\n          <path id=\"uuid-ae0319f0-bcee-4843-b7a5-1f780fa0ce92\" data-name=\"Intersection 6\" d=\"M95.584,204.059l108.49-108.49-108.49,108.49Zm107.871-87.871l-87.252,87.253,87.252-87.253Zm-125.146,85.144l123.037-123.037-123.037,123.037Zm-15-5L196.348,63.294,63.309,196.333h0Zm132.3-52.301l-51.564,51.564,51.564-51.564ZM50.087,189.553L189.567,50.074,50.088,189.553h0Zm-11.691-8.308L181.258,38.383,38.396,181.245Zm-10.278-9.722L171.537,28.106,28.119,171.523Zm-8.882-11.119L160.418,19.223,19.238,160.404h0Zm-7.408-12.59L147.829,11.814,11.829,147.814Zm-5.753-14.247L133.589,6.054,6.076,133.567Zm-3.719-16.28L117.309,2.336,2.356,117.287Zm-.922-19.079L98.229,1.414,1.429,98.214l.006-.006Zm3.977-23.977L74.252,5.39,5.412,74.231Z\" style=\"fill: #fff; isolation: isolate; opacity: .296; stroke: #b5dc17; stroke-width: 4px;\"\/>\n        <\/svg>\n    <\/div>\n    <figure class=\"img-shadow\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"218\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh-300x218.png\" class=\"attachment-medium size-medium\" alt=\"plateforme OpenSource de s\u00e9curit\u00e9\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh-300x218.png 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh-1024x743.png 1024w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh-768x557.png 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh-1536x1114.png 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/interface-wazuh.png 1718w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    <\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-md-block\"><\/div>\n\n\n\n<ol style=\"font-size:clamp(16.834px, 1.052rem + ((1vw - 3.2px) * 1.042), 26px);\" class=\"wp-block-list\">\n<li>Intrusion Detection (IDS\/IPS)<\/li>\n\n\n\n<li>Correlation of Events<\/li>\n\n\n\n<li>Analysis of logs<\/li>\n\n\n\n<li>Vulnerability Management<\/li>\n\n\n\n<li>Compliance and reporting<\/li>\n\n\n\n<li>Extensibility and integrations<\/li>\n\n\n\n<li>Correlation and <em>\u00ab\u00a0Threat Intelligence\u00a0\u00bb<\/em><\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Areas of application<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intrusion Detection<\/li>\n\n\n\n<li>Checking the integrity of files<\/li>\n\n\n\n<li>Vulnerability detection \/ configuration assessment<\/li>\n\n\n\n<li>Regulatory Compliance<\/li>\n\n\n\n<li>Reporting<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Some examples of use cases<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Checking the integrity of files<\/li>\n\n\n\n<li>Verifying compliance of configuration files (tampering by a third-party program)<\/li>\n\n\n\n<li>Checking the proper functioning of the antivirus on the workstations<\/li>\n\n\n\n<li>Ransomware Detection<\/li>\n\n\n\n<li>MAC address flapping detection on network equipment<\/li>\n\n\n\n<li>DDOS attack detection<\/li>\n\n\n\n<li>Alert for massive authentication error (Web, 802.1X \u2026)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Principle of operation<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A manager centralizing events<\/li>\n\n\n\n<li>Agents on each workstation or server, registered with the manager<\/li>\n\n\n\n<li>The manager defines the monitoring rules (<em>e.g. number of failed login attempts<\/em>)<\/li>\n\n\n\n<li>Agents apply actions if a rule matches (<em>e.g. block IP<\/em>)<\/li>\n\n\n\n<li>Agents report events to the manager<\/li>\n\n\n\n<li>The manager can take additional actions (<em>e.g. isolate the machine from the network<\/em>)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Architecture<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1714\" height=\"732\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png\" alt=\"Architecture Wazuh plateforme OpenSource de s\u00e9curit\u00e9\" class=\"wp-image-2254\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png 1714w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2-300x128.png 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2-1024x437.png 1024w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2-768x328.png 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2-1536x656.png 1536w\" sizes=\"auto, (max-width: 1714px) 100vw, 1714px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Components<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n  <div class=\"theme-systemes\">\n    <div class=\"icone\">\n     <i class=\"fa-classic fa-solid fa-terminal\" aria-hidden=\"true\"><\/i>      \n \t<\/div>\n    <h4>\n    \tAgent \n    <\/h4>\n  <\/div>\n  <p>\n  \tInstalled on the end devices, it sends information back to the server \n  <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n  <div class=\"theme-systemes\">\n    <div class=\"icone\">\n     <i class=\"fa-classic fa-solid fa-server\" aria-hidden=\"true\"><\/i>      \n \t<\/div>\n    <h4>\n    \tServer \n    <\/h4>\n  <\/div>\n  <p>\n  \tAnalyzes and indexes alerts generated by the server \n  <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n  <div class=\"theme-systemes\">\n    <div class=\"icone\">\n     <i class=\"fa-classic fa-solid fa-display\" aria-hidden=\"true\"><\/i>      \n \t<\/div>\n    <h4>\n    \tInterface \n    <\/h4>\n  <\/div>\n  <p>\n  \tAllows visualization of data \n  <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n  <div class=\"theme-systemes\">\n    <div class=\"icone\">\n     <i class=\"fa-classic fa-solid fa-cubes-stacked\" aria-hidden=\"true\"><\/i>      \n \t<\/div>\n    <h4>\n    \tIndexer \n    <\/h4>\n  <\/div>\n  <p>\n  \tStores and indexes server-generated alerts \n  <\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques SIEM et EDR Les fonctions Domaines d&rsquo;application Quelques exemples de cas d\u2019usage Principe de fonctionnement Architecture Composants<\/p>","protected":false},"featured_media":0,"menu_order":0,"template":"","categories":[13,33],"tags":[27,6],"class_list":["post-2248","solution","type-solution","status-publish","hentry","category-solutions_open","category-systemes-et-reseaux","tag-open-source","tag-systemes-securite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e<\/title>\n<meta name=\"description\" content=\"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d&#039;EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.teicee.com\/en\/solution\/wazuh-plateforme-opensource-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d&#039;EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.teicee.com\/en\/solution\/wazuh-plateforme-opensource-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/teicee\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T15:14:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/\",\"name\":\"Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/archi-wazuh-2.png\",\"datePublished\":\"2024-07-05T15:42:14+00:00\",\"dateModified\":\"2026-04-29T15:14:19+00:00\",\"description\":\"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d'EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/archi-wazuh-2.png\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/archi-wazuh-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/wazuh-plateforme-opensource-de-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.teicee.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.teicee.com\\\/solution\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Wazuh &#8211; plateforme OpenSource de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"description\":\"La raison de votre confiance\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.teicee.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"width\":2560,\"height\":1163,\"caption\":\"t\u00e9\u00efc\u00e9e\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/teicee\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/t-c-e\\\/\",\"https:\\\/\\\/www.instagram.com\\\/teicee_fr\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e","description":"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d'EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.teicee.com\/en\/solution\/wazuh-plateforme-opensource-de-securite\/","og_locale":"en_GB","og_type":"article","og_title":"Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e","og_description":"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d'EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.","og_url":"https:\/\/www.teicee.com\/en\/solution\/wazuh-plateforme-opensource-de-securite\/","og_site_name":"t\u00e9\u00efc\u00e9e","article_publisher":"https:\/\/www.facebook.com\/teicee","article_modified_time":"2026-04-29T15:14:19+00:00","og_image":[{"url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/","url":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/","name":"Wazuh - plateforme OpenSource de s\u00e9curit\u00e9 - t\u00e9\u00efc\u00e9e","isPartOf":{"@id":"https:\/\/www.teicee.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png","datePublished":"2024-07-05T15:42:14+00:00","dateModified":"2026-04-29T15:14:19+00:00","description":"Plateforme Open Source de cybers\u00e9curit\u00e9 proposant les fonctions d'EDR et de SIEM. D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques.","breadcrumb":{"@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/#primaryimage","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2024\/07\/archi-wazuh-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.teicee.com\/solution\/wazuh-plateforme-opensource-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.teicee.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.teicee.com\/solution\/"},{"@type":"ListItem","position":3,"name":"Wazuh &#8211; plateforme OpenSource de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.teicee.com\/#website","url":"https:\/\/www.teicee.com\/","name":"t\u00e9\u00efc\u00e9e","description":"La raison de votre confiance","publisher":{"@id":"https:\/\/www.teicee.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.teicee.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.teicee.com\/#organization","name":"t\u00e9\u00efc\u00e9e","url":"https:\/\/www.teicee.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","width":2560,"height":1163,"caption":"t\u00e9\u00efc\u00e9e"},"image":{"@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/teicee","https:\/\/www.linkedin.com\/company\/t-c-e\/","https:\/\/www.instagram.com\/teicee_fr\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Emmanuel Matter","author_link":"https:\/\/www.teicee.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"D\u00e9tection, pr\u00e9vention et r\u00e9ponse aux menaces cybern\u00e9tiques SIEM et EDR Les fonctions Domaines d&rsquo;application Quelques exemples de cas d\u2019usage Principe de fonctionnement Architecture Composants","_links":{"self":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/solution\/2248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/types\/solution"}],"wp:attachment":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/media?parent=2248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/categories?post=2248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/tags?post=2248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}