You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are currently evaluating Wazuh on our UAT infrastructure. While we are receiving all expected vulnerabilities from the Linux servers, we are encountering an issue with the Windows servers where no vulnerabilities are
<!-- Frequency that rootcheck is executed - every 12 hours -->
<frequency>43200</frequency>
<rootkit_files>etc/rootcheck/rootkit_files.txt</rootkit_files>
<rootkit_trojans>etc/rootcheck/rootkit_trojans.txt</rootkit_trojans>
<skip_nfs>yes</skip_nfs>
<ignore>/var/lib/containerd</ignore>
<ignore>/var/lib/docker/overlay2</ignore>
<!-- Frequency that syscheck is executed default every 12 hours -->
<frequency>43200</frequency>
<scan_on_start>yes</scan_on_start>
<!-- Generate alert when new file detected -->
<alert_new_files>yes</alert_new_files>
<!-- Don't ignore files that change more than 'frequency' times -->
<auto_ignore frequency="10" timeframe="3600">no</auto_ignore>
<!-- Directories to check (perform all possible verifications) -->
<directories>/etc,/usr/bin,/usr/sbin</directories>
<directories>/bin,/sbin,/boot</directories>
<!-- Files/directories to ignore -->
<ignore>/etc/mtab</ignore>
<ignore>/etc/hosts.deny</ignore>
<ignore>/etc/mail/statistics</ignore>
<ignore>/etc/random-seed</ignore>
<ignore>/etc/random.seed</ignore>
<ignore>/etc/adjtime</ignore>
<ignore>/etc/httpd/logs</ignore>
<ignore>/etc/utmpx</ignore>
<ignore>/etc/wtmpx</ignore>
<ignore>/etc/cups/certs</ignore>
<ignore>/etc/dumpdates</ignore>
<ignore>/etc/svc/volatile</ignore>
<!-- File types to ignore -->
<ignore type="sregex">.log$|.swp$</ignore>
<!-- Check the file, but never compute the diff -->
<nodiff>/etc/ssl/private.key</nodiff>
<skip_nfs>yes</skip_nfs>
<skip_dev>yes</skip_dev>
<skip_proc>yes</skip_proc>
<skip_sys>yes</skip_sys>
<!-- Nice value for Syscheck process -->
<process_priority>10</process_priority>
<!-- Maximum output throughput -->
<max_eps>50</max_eps>
<!-- Database synchronization settings -->
<synchronization>
<enabled>yes</enabled>
<interval>5m</interval>
<max_eps>10</max_eps>
</synchronization>
no
1515
no
yes
no
HIGH:!ADH:!EXP:!MD5:!RC4:!3DES:!CAMELLIA:@strength
no
etc/sslmanager.cert
etc/sslmanager.key
no
wazuh
ip-10-30-24-100.ap-south-1.compute.internal
master
47a5a6ef1e180f8e6af8d3a19d6ffbef
1516
0.0.0.0
wah.capriglobal.in
yes
no
<client_buffer>
no
<queue_size>5000</queue_size>
<events_per_second>500</events_per_second>
</client_buffer>
Application
eventchannel
Security
eventchannel
Event/System[EventID != 5145 and EventID != 5156 and EventID != 5447 and
EventID != 4656 and EventID != 4658 and EventID != 4663 and EventID != 4660 and
EventID != 4670 and EventID != 4690 and EventID != 4703 and EventID != 4907 and
EventID != 5152 and EventID != 5157]
System
eventchannel
active-response\active-responses.log
syslog
no
./shared/win_applications_rcl.txt
./shared/win_malware_rcl.txt
yes
yes
12h
yes
Hello Team,
We are currently evaluating Wazuh on our UAT infrastructure. While we are receiving all expected vulnerabilities from the Linux servers, we are encountering an issue with the Windows servers where no vulnerabilities are
agents 1.xlsx
detected, and it is showing zero vulnerabilities.
Vulnerabilities detected with other VA tool,
CVE-2016-2183, CVE-2017-5754, CVE-2019-11091, CVE-2018-12127, CVE-2019-11135, CVE-2018-3639, CVE-2022-21166,CVE-2022-21125, CVE-2022-0001, CVE-2018-12130, CVE-2018-12126, CVE-2022-21127, CVE-2017-5715, CVE-2022-21123
Please find the configuration details below for further investigation.
client.keys decoders internal_options.conf lists local_internal_options.conf localtime ossec.conf rootcheck rules shared sslmanager.cert sslmanager.key
[root@ip-10-30-24-100 etc]# vi ossec.conf
[root@ip-10-30-24-100 etc]# cat ossec.conf
<ossec_config>
3 12 plain secure 1514 tcp 131072 no yes yes yes yes yes yes yes<jsonout_output>yes</jsonout_output>
<alerts_log>yes</alerts_log>
no
<logall_json>no</logall_json>
<email_notification>no</email_notification>
<smtp_server>smtp.example.wazuh.com</smtp_server>
<email_from>wazuh@example.wazuh.com</email_from>
<email_to>recipient@example.wazuh.com</email_to>
<email_maxperhour>12</email_maxperhour>
<email_log_source>alerts.log</email_log_source>
<agents_disconnection_time>10m</agents_disconnection_time>
<agents_disconnection_alert_time>0</agents_disconnection_alert_time>
<update_check>yes</update_check>
<rule_test>
no 1515 no yes no HIGH:!ADH:!EXP:!MD5:!RC4:!3DES:!CAMELLIA:@strength no etc/sslmanager.cert etc/sslmanager.key no wazuh ip-10-30-24-100.ap-south-1.compute.internal master 47a5a6ef1e180f8e6af8d3a19d6ffbef 1516 0.0.0.0 wah.capriglobal.in yes noyes
1
<max_sessions>64</max_sessions>
<session_timeout>15m</session_timeout>
</rule_test>
</ossec_config>
<ossec_config>
syslog /var/ossec/logs/active-responses.log<log_format>journald</log_format>
journald
</ossec_config>
agent configuration file:-
<ossec_config>
Ipaddress 1514 tcp windows, windows2016, windows-server, windows-server-2016 aes 10 60 yes yes hostname default<client_buffer>
Application eventchannel Security eventchannel Event/System[EventID != 5145 and EventID != 5156 and EventID != 5447 and EventID != 4656 and EventID != 4658 and EventID != 4663 and EventID != 4660 and EventID != 4670 and EventID != 4690 and EventID != 4703 and EventID != 4907 and EventID != 5152 and EventID != 5157] System eventchannel active-response\active-responses.log syslog no ./shared/win_applications_rcl.txt ./shared/win_malware_rcl.txt yes yes 12h yesno
<queue_size>5000</queue_size>
<events_per_second>500</events_per_second>
</client_buffer>
</ossec_config>
The text was updated successfully, but these errors were encountered: