Skip to content

Commit c7dd0dc

Browse files
committed
update header and levels
1 parent 72a8306 commit c7dd0dc

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

source/getting-started/architecture.rst

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
.. meta::
44
:description: Learn more about the architecture of Wazuh, our open source cybersecurity platform, in this section of our documentation.
55

6-
Getting started with Wazuh - Architecture
7-
=========================================
6+
Architecture
7+
============
88

99
The Wazuh architecture is composed of a multi-platform Wazuh :doc:`agent <components/wazuh-agent>` and three central components: the Wazuh :doc:`server <components/wazuh-server>`, Wazuh :doc:`indexer <components/wazuh-indexer>`, and Wazuh :doc:`dashboard <components/wazuh-dashboard>`. The agent is deployed on endpoints to collect and forward security data to the Wazuh server for analysis. The analyzed data is then forwarded to the Wazuh indexer for indexing and storage, and subsequently to the Wazuh dashboard for alerting and visualization.
1010

@@ -29,10 +29,10 @@ The diagram below represents a Wazuh deployment architecture. It shows how the W
2929
:width: 80%
3030

3131
Component communication
32-
=======================
32+
-----------------------
3333

3434
Wazuh agent - Wazuh server
35-
--------------------------
35+
^^^^^^^^^^^^^^^^^^^^^^^^^^
3636

3737
The :doc:`Wazuh agent <components/wazuh-agent>` continuously sends events to the :doc:`Wazuh server <components/wazuh-server>` for analysis and threat detection. To start shipping this data, the agent establishes a connection with the Wazuh server service for agent connection, which listens on TCP port 1514 by default (this is configurable). The Wazuh server then decodes and matches rules against the received events, utilizing the Wazuh Analysis engine.
3838

@@ -43,12 +43,12 @@ The Wazuh messages protocol uses AES encryption by default, with 128 bits per bl
4343
Read the `Benefits of using AES in the Wazuh communications <https://wazuh.com/blog/benefits-of-using-aes-in-our-communications>`_ document for more information.
4444

4545
Wazuh server - Wazuh indexer
46-
-----------------------------
46+
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
4747

4848
The Wazuh server uses Filebeat to send alert and event data to the Wazuh indexer, using TLS encryption. Filebeat reads the Wazuh server output data and sends it to the Wazuh indexer (by default listening on port 9200/TCP). Once the data is indexed by the Wazuh indexer, the Wazuh dashboard is used to query and visualize the security information.
4949

5050
Wazuh dashboard - Wazuh dashboard/Wazuh indexer
51-
-----------------------------------------------
51+
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
5252

5353
The Wazuh dashboard queries the Wazuh server API (by default listening on port 55000/TCP on the Wazuh server) to display configuration and status-related information of the :doc:`Wazuh server <components/wazuh-server>` and :doc:`agents <components/wazuh-agent>`. This communication is encrypted with TLS and authenticated with a username and password.
5454

@@ -57,7 +57,7 @@ The Wazuh dashboard visualizes and queries the information indexed on the Wazuh
5757
.. _default_ports:
5858

5959
Required ports
60-
==============
60+
--------------
6161

6262
Wazuh components communicate using several services. The list of default ports used by these services is shown below. Users can modify these port numbers when necessary.
6363

@@ -86,7 +86,7 @@ Wazuh components communicate using several services. The list of default ports u
8686
+-----------------+-----------+----------------+------------------------------------------------+
8787

8888
Wazuh CTI
89-
=========
89+
---------
9090

9191
The Wazuh Cyber Threat Intelligence (CTI) service is a publicly accessible platform that collects, analyzes, and disseminates actionable information on emerging cyber threats and vulnerabilities. This service currently focuses on vulnerability intelligence, delivering timely updates on Common Vulnerabilities and Exposures (CVEs), severity scores, exploitability insights, and mitigation strategies. It aggregates and sanitizes data from trusted sources, including operating system vendors and major vulnerability databases, to ensure high-quality, relevant intelligence.
9292

0 commit comments

Comments
 (0)