diff --git a/CHANGELOG.md b/CHANGELOG.md index 6a1ac3a0b3..342736e2de 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,12 @@ All notable changes to the Wazuh app project will be documented in this file. +## Wazuh v4.4.5 - OpenSearch Dashboards 2.6.0 - Revision 01 + +### Added + +- Support for Wazuh 4.4.5 + ## Wazuh v4.4.4 - OpenSearch Dashboards 2.6.0 - Revision 01 ### Added diff --git a/README.md b/README.md index 48d2c17ee4..4b3a2fb729 100644 --- a/README.md +++ b/README.md @@ -16,31 +16,31 @@ You can learn more about it here [wazuh.com](https://wazuh.com/) This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh alerts stored in OpenSearch and provides the following capabilities: - Search alerts classified by modules and filter them using the different views. You will be able to explore the alerts both at Wazuh cluster level, and in a particular agent. The modules, divided into the following use cases, are: - - Security Information Management - - Security events: Browse through your security alerts, identifying issues and threats in your environment. - - Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes. - - Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API. - - Office 365: Security events related to your Office 365 services. - - GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API. - - Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API. - - Auditing and Policy Monitoring - - Policy monitoring: Verify that your systems are configured according to your security policies baseline. - - Security configuration assessment: Scan your assets as part of a configuration assessment audit. - - System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files. - - OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks. - - CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks. - - Threat Detection and Response - - Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities. - - MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations. - - VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API. - - Osquery: Osquery can be used to expose an operating system as a high-performance relational database. - - Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events. - - Regulatory Compliance - - PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data. - - NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems. - - GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data. - - HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information. - - TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy. + - Security Information Management + - Security events: Browse through your security alerts, identifying issues and threats in your environment. + - Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes. + - Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API. + - Office 365: Security events related to your Office 365 services. + - GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API. + - Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API. + - Auditing and Policy Monitoring + - Policy monitoring: Verify that your systems are configured according to your security policies baseline. + - Security configuration assessment: Scan your assets as part of a configuration assessment audit. + - System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files. + - OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks. + - CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks. + - Threat Detection and Response + - Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities. + - MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations. + - VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API. + - Osquery: Osquery can be used to expose an operating system as a high-performance relational database. + - Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events. + - Regulatory Compliance + - PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data. + - NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems. + - GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data. + - HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information. + - TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy. - View and edit the Wazuh manager configuration. - Manage your ruleset (rules, decoders and CDB lists). - Manage your groups of agents. @@ -89,9 +89,9 @@ This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh ## Requisites -- Wazuh HIDS 4.4.4 -- Wazuh dashboard 4.4.4 -- Wazuh indexer 4.4.4 +- Wazuh HIDS 4.4.5 +- Wazuh dashboard 4.4.5 +- Wazuh indexer 4.4.5 ## Contribute diff --git a/opensearch_dashboards.json b/opensearch_dashboards.json index 7044bfcaa5..ac5268673c 100644 --- a/opensearch_dashboards.json +++ b/opensearch_dashboards.json @@ -1,6 +1,6 @@ { "id": "wazuh", - "version": "4.4.4-01", + "version": "4.4.5-01", "opensearchDashboardsVersion": "opensearchDashboards", "configPath": [ "wazuh" diff --git a/package.json b/package.json index 7bfdc2a9b3..657c3e4b25 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "wazuh", - "version": "4.4.4", + "version": "4.4.5", "revision": "01", "stage": "stable", "commit": "0e7201ff8", diff --git a/scripts/tag.py b/scripts/tag.py index 0038bf0900..1bf6447edc 100644 --- a/scripts/tag.py +++ b/scripts/tag.py @@ -15,7 +15,7 @@ # ======================================================= # # Wazuh version: major.minor.patch -version = '4.4.4' +version = '4.4.5' # App's revision number (previous rev + 1) revision = '01' # One of 'pre-alpha', 'alpha', 'beta', 'release-candidate', 'stable'