Wazuh
The open source security platform
Recognizing threats and taking action
With Wazuh, we offer you an open source platform for security monitoring and threat detection. You can use it to monitor events in your IT infrastructure, detect security incidents and respond to threats. Wazuh allows you to collect log data, identify vulnerabilities and detect attacks in real time to better protect your systems
Wazuh features
Wazuh Consulting
We help you with the conception, installation and integration of Wazuh in your environment – for more power, know-how and peace of mind!
Power
We have been successfully supporting our customers in the operation of their IT infrastructures for many years. Whether it’s different industries, tools or operating systems – we’ve seen, operated and built it all. With extensive experience in best practices around Grafana, Prometheus, InfluxDB and other open source technologies, especially in the Linux environment, we are at your side with our know-how.
Know-how
We not only understand your IT systems and services, but also the big picture – the numerous aspects that make up the operation of complex IT infrastructures. In a world where IT is becoming increasingly complex and constantly changing, there is often a lack of time and personnel. This is exactly where we come in to provide you with optimum support.
Targeted reinforcement
As Linux generalists and open source experts, we are broadly positioned and deeply networked in the open source communities. With us by your side, you are never alone! Whether as an IT consultant, engineer, support or architect – we strengthen your team, relieve you and take over the work so that you can concentrate on the essentials.
Know-how
More know-how on the subject of Wazuh
Infrastructure as Code (IaC): Grundlagen, Geschichte und Praxis mit Ansible und GitLab
Introduction The way in which IT infrastructure is provided and operated has changed significantly in recent decades. In the early years of system administration, everyday…
Observability vs Monitoring
The term observability is on everyone’s lips and is often touted as a modern solution to dusty old, static monitoring. All manufacturers offer it, all…
Icinga Web Module for Performance Data Graphs
After we forked the Grafana module for Icinga Web last year, we thought about whether there are other ways to graphically display Icinga performance data…
The Icinga Web Grafana module has found a new home
We are happy to announce that the Icinga Web Grafana module has found a new home! Originally developed by Carsten (Mikesch-mp), this module is a…
Katello as a package mirror for Icinga
This article is about setting up Katello as a package mirror for Icinga. Specifically, Icinga for Windows, Debian / Ubuntu, Red Hat Enterprise Linux and…
NIS 2 – The current status in January 2025
Since its adoption, the EU Directive NIS 2 (Network and Information Security Directive 2) has been a central element of the European cyber security strategy.…
Show users in MySQL
In MySQL, user management plays a crucial role in making database access secure and efficient. But how do you display existing users? In this blog…
Icinga 2 Security Release – November 2024
Critical error in the Icinga 2 core Today, November 12, 2024, the Icinga team has released a security fix that is classified as CRITICAL. The…
Data collection with the Support Collector
Last updated: 22.11.2024 What is the Support Collector and how does it work? The Support Collector offers an easy way to automatically record all important…
Questions & Answers
The most frequently asked questions about Wazuh
Is Wazuh SIEM free of charge?
Yes, Wazuh is a free and open source security platform that can be used as a SIEM (Security Information and Event Management) and for threat detection. It offers comprehensive security monitoring, threat detection and compliance management without license fees. In addition, we offer commercial support options for companies that require professional support and extended services.
What is SIEM Wazuh?
Wazuh is an open source security platform that is used as a SIEM (Security Information and Event Management) to detect threats, monitor security events and fulfill compliance requirements. It collects and analyzes security data from endpoints, networks and applications in real time to identify and respond to security incidents. With functions such as intrusion detection, vulnerability management and log analysis, Wazuh offers comprehensive security solutions for modern IT infrastructures.
What is the Wazuh Agent?
The Wazuh Agent is a software component that is installed on endpoints such as servers, workstations or virtual machines to collect security-relevant data such as logs, system events and configuration changes. This information is sent to the Wazuh server, where it is analyzed and checked for potential threats. The agent thus enables detailed monitoring and threat detection on the monitored systems in real time.
What does the Wazuh agent do?
The Wazuh Agent collects security-relevant data such as system logs, file changes, processes and network activities from endpoints such as servers and workstations. This data is transmitted to the Wazuh server, where it is analyzed to identify threats, anomalies and vulnerabilities. The agent thus helps to ensure real-time security monitoring and compliance checks on the monitored systems.
How do I install the Wazuh Agent?
To install the Wazuh Agent, first download the installation script or package for your operating system from the official Wazuh website or use the package manager of the respective system (e.g. `apt` for Ubuntu). After installation, configure the agent file (`ossec.conf`) to connect to the Wazuh server by specifying the server IP and other relevant parameters. Finally, start the agent with the command `sudo systemctl start wazuh-agent` and register it with the Wazuh server to activate the data transfer.
Why do I need Wazuh?
Wazuh is needed to protect IT infrastructures through comprehensive security monitoring, threat detection and compliance management. It helps to detect and react to security-relevant events such as intrusion attempts, vulnerabilities or configuration deviations in real time. Wazuh also supports compliance with safety standards and legal requirements through automated reports and audits.