Skip to content

Commit b958b66

Browse files
committed
Merge branch '4.13' into change/idr371-host-malware-samples
2 parents 61d1ebf + f4c212a commit b958b66

13 files changed

+78
-174
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ All notable changes to this project will be documented in this file.
1414
- **Post-release**: Added indexer connector configuration steps to vulnerability detection documentation and removed troubleshooting section. ([#8942](https://github.com/wazuh/wazuh-documentation/pull/8942))
1515
- **Post-release**: Updated the *Navigating the Wazuh dashboard* section. ([#8950](https://github.com/wazuh/wazuh-documentation/pull/8950))
1616
- **Post-release**: Updated the System inventory documentation. ([#8955](https://github.com/wazuh/wazuh-documentation/pull/8955))
17+
- **Post-release**: Updated the *Getting started* guide. ([#8962](https://github.com/wazuh/wazuh-documentation/pull/8962)) ([#8963](https://github.com/wazuh/wazuh-documentation/pull/8963)) ([#8964](https://github.com/wazuh/wazuh-documentation/pull/8964)) ([#8965](https://github.com/wazuh/wazuh-documentation/pull/8965))
1718
- **Post-release**: Updated the URLs of malware samples. ([#8961](https://github.com/wazuh/wazuh-documentation/pull/8961))
1819

1920
### Fixed

source/getting-started/components/wazuh-agent.rst

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,51 +6,51 @@
66
Wazuh agent
77
===========
88

9-
The Wazuh agent runs on Linux, Windows, macOS, Solaris, AIX, and other operating systems. It can be deployed to laptops, desktops, servers, cloud instances, containers, or virtual machines. The agent helps to protect your system by providing threat prevention, detection, and response capabilities. It is also used to collect different types of system and application data that it forwards to the :doc:`Wazuh server <wazuh-server>` through an encrypted and authenticated channel.
9+
The Wazuh agent runs on Linux, Windows, macOS, Solaris, AIX, and other operating systems. It can be deployed to laptops, desktops, servers, cloud instances, containers, or virtual machines. The Wazuh agent helps to protect your system by providing threat prevention, detection, and response capabilities. It is also used to collect different types of system and application data that it forwards to the :doc:`Wazuh server <wazuh-server>` through an encrypted and authenticated channel.
1010

1111
Agent architecture
1212
------------------
1313

14-
The Wazuh agent has a modular architecture. Each component is in charge of its own tasks, including monitoring the file system, reading log messages, collecting inventory data, scanning the system configuration, and looking for malware. Users can manage agent modules via configuration settings, adapting the solution to their particular use cases.
14+
The Wazuh agent has a modular architecture. Each module is in charge of its own tasks, including monitoring the file system, reading log files, collecting inventory data, scanning the system configuration, and looking for malware. Users can manage agent modules through configuration settings, adapting the solution to their specific use cases.
1515

16-
The diagram below represents the agent architecture and components:
16+
The diagram below shows the agent architecture and modules.
1717

18-
.. thumbnail:: /images/getting-started/agent-architecture.png
18+
.. thumbnail:: /images/getting-started/agent-architecture.png
1919
:title: Agent architecture
2020
:alt: Agent architecture
2121
:align: center
22-
:width: 80%
22+
:width: 80%
2323

24-
.. _agents_modules:
24+
.. _agents_modules:
2525

26-
Agent modules
27-
-------------
26+
Wazuh agent modules
27+
-------------------
2828

29-
All agent modules are configurable and perform different security tasks. This modular architecture allows you to enable or disable each component according to your security needs. Below you can learn about the different purposes of all the agent modules.
29+
All agent modules are configurable and perform different security tasks. This modular architecture allows you to configure each module according to your security needs. The following list summarizes the purposes of the Wazuh agent modules.
3030

31-
- **Log collector:** This agent component can read flat log files and Windows events, collecting operating system and application log messages. It supports XPath filters for Windows events and recognizes multi-line formats like Linux Audit logs. It can also enrich JSON events with additional metadata.
31+
- **Log collector:** Reads flat log files and Windows events, collecting operating system and application log messages. It supports XPath filters for Windows events and recognizes multi-line formats like Linux Audit logs. It can also enrich JSON events with additional metadata.
3232

33-
- **Command execution:** Agents run authorized commands periodically, collecting their output and reporting it back to the Wazuh server for further analysis. You can use this module for different purposes, such as monitoring hard disk space left or getting a list of the last logged-in users.
33+
- **Command execution:** Runs authorized commands periodically, collecting their output and reporting it back to the Wazuh server for further analysis. You can use this module for different purposes, such as monitoring available disk space or getting a list of recently logged-in users.
3434

35-
- **File integrity monitoring (FIM):** This module monitors the file system, reporting when files are created, deleted, or modified. It keeps track of changes in file attributes, permissions, ownership, and content. When an event occurs, it captures who, what, and when details in real time. Additionally, the FIM module builds and maintains a database with the state of the monitored files, allowing queries to be run remotely.
35+
- **File integrity monitoring (FIM):** Monitors the file system, reporting when files are created, deleted, or modified. It keeps track of changes in file attributes, permissions, ownership, and content. When an event occurs, it captures who, what, and when details in real time.
3636

37-
- **Security configuration assessment (SCA):** This component provides continuous configuration assessment, utilizing out-of-the-box checks based on the Center of Internet Security (CIS) benchmarks. Users can also create their own SCA checks to monitor and enforce their security policies.
37+
- **Security configuration assessment (SCA):** Provides continuous configuration assessment, utilizing out-of-the-box checks based on the Center of Internet Security (CIS) benchmarks. Users can also create their own SCA checks to monitor and enforce their security policies.
3838

39-
- **System inventory:** This agent module periodically runs scans, collecting inventory data such as operating system version, network interfaces, running processes, installed applications, and a list of open ports. Scan results are stored in local SQLite databases that can be queried remotely.
39+
- **System inventory:** Periodically runs scans to collect inventory data such as operating system version, network interfaces, running processes, installed applications, and a list of open ports. Scan results are stored in local SQLite databases that can be queried remotely.
4040

41-
- **Malware detection:** Using a non-signature-based approach, this component is capable of detecting anomalies and the possible presence of rootkits. Also, it looks for hidden processes, hidden files, and hidden ports while monitoring system calls.
41+
- **Malware detection:** Uses a non-signature-based approach to detect anomalies and the possible presence of rootkits. It also looks for hidden processes, hidden files, and hidden ports while monitoring system calls.
4242

43-
- **Active Response:** This module runs automatic actions when threats are detected, triggering responses to block a network connection, stop a running process, or delete a malicious file. Users can also create custom responses when necessary and customize, for example, responses for running a binary in a sandbox, capturing network traffic, and scanning a file with an antivirus.
43+
- **Active Response:** Runs automatic actions when threats are detected, triggering responses to block a network connection, stop a running process, or delete a malicious file. Users can also create custom responses when required, for example, responses for running a binary in a sandbox, capturing network traffic, and scanning a file with an antivirus.
4444

45-
- **Container security monitoring:** This agent module is integrated with the Docker Engine API to monitor changes in a containerized environment. For example, it detects changes to container images, network configuration, or data volumes. Besides, it alerts about containers running in privileged mode and about users executing commands in a running container.
45+
- **Container security monitoring:** Integrates with the Docker Engine API to monitor changes in a containerized environment. For example, it detects changes to container images, network configuration, or data volumes. It alerts about containers running in privileged mode and about users executing commands in a running container.
4646

47-
- **Cloud security monitoring:** This component monitors cloud providers such as Amazon Web Services, Microsoft Azure, or Google GCP. It natively communicates with their APIs. It is capable of detecting changes to the cloud infrastructure (e.g., a new user is created, a security group is modified, a cloud instance is stopped, etc.) and collecting cloud services log data (e.g., AWS Cloudtrail, AWS Macie, AWS GuardDuty, Azure Active Directory, etc.)
47+
- **Cloud security monitoring:** Monitors cloud providers such as Amazon Web Services, Microsoft Azure, or Google GCP, communicating natively with their APIs. It detects changes to the cloud infrastructure, for example, when a new user is created, a security group is modified, or a cloud instance is stopped. Additionally, it collects cloud services log data such as AWS CloudTrail, GCP Pub/Sub, and Azure Active Directory.
4848

4949
Communication with Wazuh server
5050
-------------------------------
5151

52-
The Wazuh agent communicates with the :doc:`Wazuh server <wazuh-server>` to ship collected data and security-related events. Besides, the agent sends operational data, reporting its configuration and status. Once connected, the agent can be upgraded, monitored, and configured remotely from the Wazuh server.
52+
The Wazuh agent communicates with the :doc:`Wazuh server <wazuh-server>` to ship collected data and security-related events. The Wazuh agent also sends operational data, reporting its configuration and status. Once connected, the agent can be upgraded, monitored, and configured remotely from the Wazuh server.
5353

54-
The communication of the agent with the server takes place through a secure channel (TCP or UDP), providing data encryption and compression in real time. Additionally, it includes flow control mechanisms to avoid flooding, queueing events when necessary, and protecting the network bandwidth.
54+
The communication between the Wazuh agent and the Wazuh server takes place through a secure channel (TCP or UDP), providing data encryption and compression in real time. Additionally, it includes flow control mechanisms to avoid flooding, queueing events when necessary, and protecting the network bandwidth.
5555

56-
You need to enroll the agent before connecting it to the server for the first time. This process provides the agent with a unique key used for authentication and data encryption.
56+
You need to enroll the Wazuh agent before connecting it to the Wazuh server for the first time. This process provides the agent with a unique key used for authentication and data encryption.
Lines changed: 25 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,51 +1,28 @@
11
.. Copyright (C) 2015, Wazuh, Inc.
22
33
.. meta::
4-
:description: Wazuh dashboard is a flexible and intuitive web interface for mining, analyzing, and visualizing data.
4+
:description: Wazuh dashboard is a flexible and intuitive web interface for visualizing, analyzing, and managing security data.
55

66
Wazuh dashboard
77
===============
88

9-
The Wazuh dashboard is a flexible and intuitive web user interface for mining, analyzing, and visualizing security events and alerts data. It is also used for the management and monitoring of the Wazuh platform. Additionally, it provides features for role-based access control (RBAC) and single sign-on (SSO).
9+
The Wazuh dashboard is a flexible and intuitive web interface for visualizing, analyzing, and managing security data. It enables users to investigate events and alerts, oversee the Wazuh platform, and enforce role-based access control (RBAC) and single sign-on (SSO) policies.
1010

1111
Data visualization and analysis
1212
-------------------------------
1313

14-
The web interface helps users navigate through the different types of data collected by the Wazuh agent, as well as the security alerts generated by the Wazuh server. Users can also generate reports and create custom visualizations and dashboards.
14+
The Wazuh dashboard lets users navigate security data collected from Wazuh agent and agentless devices, and alerts generated by the Wazuh server. It includes dashboards for threat hunting, malware detection, file integrity monitoring, system inventory, and regulatory compliance (for example, PCI DSS, GDPR, HIPAA, and NIST 800-53). You can generate reports and create custom visualizations and dashboards.
1515

16-
As an example, Wazuh provides out-of-the-box dashboards for regulatory compliance such as PCI DSS, GDPR, HIPAA, and NIST 800-53. It also provides an interface to navigate through the MITRE ATT&CK framework and related alerts.
17-
18-
.. hlist::
19-
:columns: 2
20-
21-
- .. thumbnail:: /images/getting-started/endpoint-security-modules.png
22-
:align: center
23-
:width: 100%
24-
:title: Endpoint security
25-
:alt: Endpoint security
26-
27-
- .. thumbnail:: /images/getting-started/security-operations-modules.png
28-
:align: center
29-
:width: 100%
30-
:title: Security operations
31-
:alt: Security operations
32-
33-
- .. thumbnail:: /images/getting-started/threat-intelligence-modules.png
34-
:align: center
35-
:width: 100%
36-
:title: Threat intelligence
37-
:alt: Threat intelligence
38-
39-
- .. thumbnail:: /images/getting-started/cloud-security-modules.png
40-
:align: center
41-
:width: 100%
42-
:title: Cloud security
43-
:alt: Cloud security
16+
.. thumbnail:: /images/getting-started/data-visualization.png
17+
:align: center
18+
:width: 80%
19+
:title: Data visualization
20+
:alt: Data visualization
4421

4522
Agents monitoring and configuration
4623
-----------------------------------
4724

48-
The Wazuh dashboard allows users to manage agents configuration and to monitor their status. As an example, for each monitored endpoint, users can define what agent modules will be enabled, what log files will be read, what files will be monitored for integrity changes, or what configuration checks will be performed.
25+
The Wazuh dashboard allows users to manage agent configuration and monitor agent status. For each monitored endpoint, users can define which agent modules are enabled, which log files are read, which files are monitored for integrity changes, and which configuration checks are performed.
4926

5027
.. thumbnail:: /images/getting-started/agents-monitoring.png
5128
:align: center
@@ -56,7 +33,7 @@ The Wazuh dashboard allows users to manage agents configuration and to monitor t
5633
Platform management
5734
-------------------
5835

59-
The Wazuh dashboard provides a user interface dedicated to manage your Wazuh deployment. This includes monitoring the status, logs, and statistics of the different Wazuh components. It also includes configuring the Wazuh server, and creating custom rules and decoders for log analysis and threat detection.
36+
The Wazuh dashboard provides a user interface to manage a Wazuh deployment. This includes monitoring the status, logs, and statistics of Wazuh components, configuring the Wazuh server, and creating custom rules and decoders for log analysis and threat detection.
6037

6138
.. thumbnail:: /images/getting-started/platform-management.png
6239
:align: center
@@ -67,27 +44,28 @@ The Wazuh dashboard provides a user interface dedicated to manage your Wazuh dep
6744
Developer tools
6845
---------------
6946

70-
The Wazuh dashboard includes a Ruleset Test tool that can process log messages to check how it is decoded and if it matches a threat detection rule or not. This feature is especially useful when custom decoders and rules have been created and the user wants to test them.
47+
The Wazuh dashboard includes a ruleset test tool that processes log messages to show how they are decoded and whether they match a detection rule. This is useful when testing custom decoders and rules.
7148

7249
.. thumbnail:: /images/getting-started/ruleset-test.png
7350
:align: center
7451
:width: 80%
7552
:title: Ruleset test
7653
:alt: Ruleset test
7754

78-
The Wazuh dashboard also includes an API console for users to interact with the Wazuh API. This can be used to manage the Wazuh deployment (e.g., managing server or agent configurations, monitor status and log messages, adding or removing agents, etc.).
55+
The Wazuh dashboard also includes API consoles for interacting with the Wazuh server and the Wazuh indexer API. They are used to manage the Wazuh server capabilities or interact with Wazuh indexer indices.
56+
57+
Wazuh server API
7958

80-
.. hlist::
81-
:columns: 2
59+
.. thumbnail:: /images/getting-started/server-api-console.png
60+
:align: center
61+
:width: 100%
62+
:title: Wazuh server API console
63+
:alt: Wazuh server API console
8264

83-
- .. thumbnail:: /images/getting-started/api-console.png
84-
:align: center
85-
:width: 100%
86-
:title: Server management > Dev Tools
87-
:alt: Server management > Dev Tools
65+
Wazuh indexer API
8866

89-
- .. thumbnail:: /images/getting-started/creating-security-rules.png
90-
:align: center
91-
:width: 100%
92-
:title: Creating security rules
93-
:alt: Creating security rules
67+
.. thumbnail:: /images/getting-started/indexer-api-console.png
68+
:align: center
69+
:width: 100%
70+
:title: Wazuh indexer API console
71+
:alt: Wazuh indexer API console

0 commit comments

Comments
 (0)