You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/getting-started/architecture.rst
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@
3
3
.. meta::
4
4
:description: Learn more about the architecture of Wazuh, our open source cybersecurity platform, in this section of our documentation.
5
5
6
-
Getting started with Wazuh - Architecture
7
-
=========================================
6
+
Architecture
7
+
============
8
8
9
9
The Wazuh architecture is composed of a multi-platform Wazuh :doc:`agent <components/wazuh-agent>` and three central components: the Wazuh :doc:`server <components/wazuh-server>`, Wazuh :doc:`indexer <components/wazuh-indexer>`, and Wazuh :doc:`dashboard <components/wazuh-dashboard>`. The agent is deployed on endpoints to collect and forward security data to the Wazuh server for analysis. The analyzed data is then forwarded to the Wazuh indexer for indexing and storage, and subsequently to the Wazuh dashboard for alerting and visualization.
10
10
@@ -29,10 +29,10 @@ The diagram below represents a Wazuh deployment architecture. It shows how the W
29
29
:width: 80%
30
30
31
31
Component communication
32
-
=======================
32
+
-----------------------
33
33
34
34
Wazuh agent - Wazuh server
35
-
--------------------------
35
+
^^^^^^^^^^^^^^^^^^^^^^^^^^
36
36
37
37
The :doc:`Wazuh agent <components/wazuh-agent>` continuously sends events to the :doc:`Wazuh server <components/wazuh-server>` for analysis and threat detection. To start shipping this data, the agent establishes a connection with the Wazuh server service for agent connection, which listens on TCP port 1514 by default (this is configurable). The Wazuh server then decodes and matches rules against the received events, utilizing the Wazuh Analysis engine.
38
38
@@ -43,12 +43,12 @@ The Wazuh messages protocol uses AES encryption by default, with 128 bits per bl
43
43
Read the `Benefits of using AES in the Wazuh communications <https://wazuh.com/blog/benefits-of-using-aes-in-our-communications>`_ document for more information.
44
44
45
45
Wazuh server - Wazuh indexer
46
-
-----------------------------
46
+
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
47
47
48
48
The Wazuh server uses Filebeat to send alert and event data to the Wazuh indexer, using TLS encryption. Filebeat reads the Wazuh server output data and sends it to the Wazuh indexer (by default listening on port 9200/TCP). Once the data is indexed by the Wazuh indexer, the Wazuh dashboard is used to query and visualize the security information.
49
49
50
50
Wazuh dashboard - Wazuh dashboard/Wazuh indexer
51
-
-----------------------------------------------
51
+
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
52
52
53
53
The Wazuh dashboard queries the Wazuh server API (by default listening on port 55000/TCP on the Wazuh server) to display configuration and status-related information of the :doc:`Wazuh server <components/wazuh-server>` and :doc:`agents <components/wazuh-agent>`. This communication is encrypted with TLS and authenticated with a username and password.
54
54
@@ -57,7 +57,7 @@ The Wazuh dashboard visualizes and queries the information indexed on the Wazuh
57
57
.. _default_ports:
58
58
59
59
Required ports
60
-
==============
60
+
--------------
61
61
62
62
Wazuh components communicate using several services. The list of default ports used by these services is shown below. Users can modify these port numbers when necessary.
63
63
@@ -86,7 +86,7 @@ Wazuh components communicate using several services. The list of default ports u
The Wazuh Cyber Threat Intelligence (CTI) service is a publicly accessible platform that collects, analyzes, and disseminates actionable information on emerging cyber threats and vulnerabilities. This service currently focuses on vulnerability intelligence, delivering timely updates on Common Vulnerabilities and Exposures (CVEs), severity scores, exploitability insights, and mitigation strategies. It aggregates and sanitizes data from trusted sources, including operating system vendors and major vulnerability databases, to ensure high-quality, relevant intelligence.
0 commit comments