This repository contains the Wazuh Kibana plugin, from which you can navigate through the Wazuh data using visualizations in a simple and understandable way. It also allows you to manage the configuration and capabilities of the Wazuh server.
Wazuh is a security detection, visibility, and compliance open source project. Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level.
You can learn more about it here wazuh.com
This plugin for Kibana allows you to visualize and analyze Wazuh alerts stored in Elasticsearch and provides the following capabilities:
- Search alerts classified by modules and filter them using the different views. You will be able to explore the alerts both at Wazuh cluster level, and in a particular agent. The modules, divided into the following use cases, are:
- Security Information Management
- Security events: Browse through your security alerts, identifying issues and threats in your environment.
- Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes.
- Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API.
- Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API.
- Auditing and Policy Monitoring
- Policy monitoring: Verify that your systems are configured according to your security policies baseline.
- Security configuration assessment: Scan your assets as part of a configuration assessment audit.
- System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files.
- OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks.
- CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks.
- Threat Detection and Response
- Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities.
- MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations.
- VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API.
- Osquery: Osquery can be used to expose an operating system as a high-performance relational database.
- Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events.
- Regulatory Compliance
- PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data.
- NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems.
- GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data.
- HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information.
- TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy.
- Security Information Management
- View and edit the Wazuh manager configuration.
- Manage your ruleset (rules, decoders and CDB lists).
- Manage your groups of agents.
- Check the status and logs of your Wazuh cluster.
- Manage your agents, as well as see their configuration and data inventory. You can also deploy new agents.
- Explore and interact with the Wazuh API through our Dev Tools.
Modules overview
Security events
Integrity monitoring
Vulnerability detection
Regulatory compliance
Agents overview
Agent summary
stable
corresponds to the latest Wazuh app stable version.master
branch contains the latest code, be aware of possible bugs on this branch.
- Wazuh HIDS 3.13.1
- Wazuh RESTful API 3.13.1
- Kibana 7.8.1
- Elasticsearch 7.8.1
Install the Wazuh app plugin for Kibana
cd /usr/share/kibana
sudo -u kibana bin/kibana-plugin install https://packages.wazuh.com/wazuhapp/wazuhapp-3.13.1_7.8.1.zip
Restart Kibana
- Systemd:
systemctl restart kibana
- SysV Init:
service kibana restart
Note: Since Wazuh 3.12.0 release (regardless of the Elastic Stack version) the location of the wazuh.yml has been moved from /usr/share/kibana/plugins/wazuh/wazuh.yml
to /usr/share/kibana/optimize/wazuh/config/wazuh.yml
.
Stop Kibana
- Systemd:
systemctl stop kibana
- SysV Init:
service kibana stop
Copy the wazuh.yml
to its new location. (Only needed for upgrades from 3.11.x)
mkdir -p /usr/share/kibana/optimize/wazuh/config
cp /usr/share/kibana/plugins/wazuh/wazuh.yml /usr/share/kibana/optimize/wazuh/config/wazuh.yml
Remove the Wazuh app using the kibana-plugin tool
cd /usr/share/kibana/
sudo -u kibana bin/kibana-plugin remove wazuh
Remove generated bundles
rm -rf /usr/share/kibana/optimize/bundles
Update file permissions. This will prevent errors when generating new bundles or updating the app:
chown -R kibana:kibana /usr/share/kibana/optimize
chown -R kibana:kibana /usr/share/kibana/plugins
Install the Wazuh app
cd /usr/share/kibana/
sudo -u kibana bin/kibana-plugin install https://packages.wazuh.com/wazuhapp/wazuhapp-3.13.1_7.8.1.zip
Update configuration file permissions.
sudo chown kibana:kibana /usr/share/kibana/optimize/wazuh/config/wazuh.yml
sudo chmod 600 /usr/share/kibana/optimize/wazuh/config/wazuh.yml
Restart Kibana
- Systemd:
systemctl restart kibana
- SysV Init:
service kibana restart
If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users mailing list, by sending an email to wazuh+subscribe@googlegroups.com, to ask questions and participate in discussions.
Copyright © 2020 Wazuh, Inc.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
Find more information about this on the LICENSE file.