Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adapt documentation to the new side menu. #6690

Merged
Show file tree
Hide file tree
Changes from 10 commits
Commits
Show all changes
57 commits
Select commit Hold shift + click to select a range
f5c822d
Modules remove from wazuh app update and app/wazuh change to app/wz-home
JuanGarriuz Oct 26, 2023
7b65e80
Reviewed changes, remove extensions, logo.sidebar and disabled_roles
JuanGarriuz Oct 31, 2023
729f923
Reviewed changes, remove disabled_roles
JuanGarriuz Oct 31, 2023
3104105
Fix Amazon Web Services and remove enable-wazuh-docker-listener-dashb…
JuanGarriuz Nov 2, 2023
74691a5
Configuration assessment update
JuanGarriuz Nov 3, 2023
500d832
OpenScap and System Auditing remove
JuanGarriuz Nov 3, 2023
06d5018
Replace Securitu events modulo with Threat hunting
lucianogorza Nov 3, 2023
cc41028
Replace Securitu events modulo with Threat hunting
lucianogorza Nov 3, 2023
6016615
Replace Vulnerabilities with Vulnerability detection
lucianogorza Nov 3, 2023
d25cb66
Replace Docker listener with Docker
lucianogorza Nov 3, 2023
d603e98
fix: remove unwanted file
Desvelao Nov 6, 2023
82aac13
fix: restore the removed files
Desvelao Nov 6, 2023
e9405b2
Replace Threat hunting with Threat Hunting
lucianogorza Nov 6, 2023
e3b41d2
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 6, 2023
df0df9d
fix: replace Agents section by Endpoints Summary
Desvelao Nov 6, 2023
c1313e0
fix: restore changes related to SCA module
Desvelao Nov 6, 2023
a4c79f8
fix: rename SCA module to Configuration Assesment related to Wazuh da…
Desvelao Nov 6, 2023
b0c8055
Replace tab with module
lucianogorza Nov 6, 2023
e0bef68
Merge pull
lucianogorza Nov 6, 2023
0c6307a
Replace Docker listener with Docker
lucianogorza Nov 6, 2023
8275965
fix: replace references to old Agents section on Wazuh dashboard
Desvelao Nov 7, 2023
3c35b07
fix: replace references to Management section on Wazuh dashboard
Desvelao Nov 7, 2023
af03bce
fix: replace references to Management category of Wazuh dashboard
Desvelao Nov 7, 2023
eeeb637
Replace Vulnerabilities with Vulnerability Detection
lucianogorza Nov 7, 2023
06d63dc
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 7, 2023
fd37cc5
Replace Integrity monitoring with File Integrity Monitoring
lucianogorza Nov 7, 2023
cf0129c
fix: minor fixes
Desvelao Nov 7, 2023
42a3fb2
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 7, 2023
e6568a7
fix: renamed API Console to Dev Tools
Desvelao Nov 7, 2023
7f0c899
Replace Amazon AWS with Amazon Web Services
lucianogorza Nov 7, 2023
4e47a76
fix: remove reference to old Modules section on Wazuh dashboard
Desvelao Nov 7, 2023
b8de23e
Fixes
lucianogorza Nov 7, 2023
7c6c1e4
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 7, 2023
0e12414
Update Settings
lucianogorza Nov 7, 2023
1c3c5ff
Fix uppercase
lucianogorza Nov 7, 2023
2ebe0ac
fix: remove unused screenshots
Desvelao Nov 8, 2023
54f4ac0
fix: minor changes
Desvelao Nov 8, 2023
64b4c68
Resolve conflicts
JuanGarriuz Nov 8, 2023
4ff10eb
fix: references to Endpoints Summary on the Wazuh dashboard
Desvelao Nov 9, 2023
10df4b2
fix: replace references to old menu button and Management category of…
Desvelao Nov 9, 2023
98652fe
Apply suggestions from code review
Desvelao Nov 10, 2023
a696d15
Update source/proof-of-concept-guide/aws-infrastructure-monitoring.rst
Desvelao Nov 10, 2023
aa8ce4b
fix: request changes
Desvelao Nov 10, 2023
4de79e7
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 10, 2023
e5d26ec
fix: minor replacements
Desvelao Nov 10, 2023
405f545
Update overview images
lucianogorza Nov 10, 2023
12606ff
Fix modules overview references
lucianogorza Nov 10, 2023
acb829e
fix: screenshots related to Wazuh dashboard
Desvelao Nov 14, 2023
233c522
fix: missing changes related to Wazuh dashboard
Desvelao Nov 15, 2023
575ad24
fix: replaced reference to Agents page on Wazuh dashboard
Desvelao Nov 15, 2023
5d0bd43
Apply suggestions from code review
Desvelao Nov 15, 2023
71198d0
fix: minor fixes
Desvelao Nov 15, 2023
574fc1d
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 15, 2023
ef02e7c
fix: remove unused images and documentation related to enabling the m…
Desvelao Nov 15, 2023
c02d75a
Merge branch '4.8.0' of https://github.com/wazuh/wazuh-documentation …
Desvelao Nov 15, 2023
5b8e1c7
fix: reference to UI view in Wazuh dashboard
Desvelao Nov 15, 2023
670e849
Merge branch '4.8.0' into enhancement/wdp-5965-add-global-menu-remove…
Desvelao Nov 16, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -279,14 +279,4 @@ You can activate the corresponding Security Information Management module on the
:title: Amazon AWS events
:alt: Amazon AWS events
:align: center
:width: 80%

To activate the **Amazon AWS** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **Amazon AWS** module as shown in the image below.

.. thumbnail:: /images/aws/aws-module.png
:title: Amazon AWS module
:alt: Amazon AWS module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.
:width: 80%
27 changes: 0 additions & 27 deletions source/cloud-security/gcp/prerequisites/considerations.rst
Original file line number Diff line number Diff line change
Expand Up @@ -84,30 +84,3 @@ Below there is an example of a configuration that uses more than one bucket:

</gcp-bucket>


Enabling dashboard visualization
--------------------------------

You can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/gcp/gcp-dashboard.png
:title: GCP dashboard
:alt: GCP dashboard
:align: center
:width: 80%

.. thumbnail:: /images/gcp/gcp-events.png
:title: GCP events
:alt: GCP events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **GCP** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **GCP** module as shown in the image below.

.. thumbnail:: /images/gcp/gcp-module.png
:title: GCP module
:alt: GCP module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.
30 changes: 1 addition & 29 deletions source/cloud-security/github/monitoring-github-activity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -138,32 +138,4 @@ If Wazuh successfully connects to GitHub, the events raised above will trigger t
},
"location":"github"
}


Enabling dashboard visualization
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/github/github-dashboard.png
:title: GitHub dashboard
:alt: GitHub dashboard
:align: center
:width: 80%

.. thumbnail:: /images/github/github-events.png
:title: GitHub events
:alt: GitHub events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **GitHub** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **GitHub** module as shown in the image below.

.. thumbnail:: /images/github/github-module.png
:title: GitHub module
:alt: GitHub module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.


29 changes: 0 additions & 29 deletions source/cloud-security/office365/monitoring-office365-activity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -241,32 +241,3 @@ If Wazuh successfully connects to Office 365 API, the events raised above will t
},
"location":"office365"
}


Enabling dashboard visualization
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Once the configuration is complete, you can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/office365/office365-dashboard.png
:title: Office 365 dashboard
:alt: Office 365 dashboard
:align: center
:width: 80%

.. thumbnail:: /images/office365/office365-events.png
:title: Office 365 events
:alt: Office 365 events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **Office 365** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **Office 365** module as shown in the image below.

.. thumbnail:: /images/office365/office365-module.png
:title: Office 365 module
:alt: Office 365 module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.

2 changes: 1 addition & 1 deletion source/compliance/gdpr/gdpr-IV.rst
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Chapter IV, Article 24, Head 2

This article requires that adequate technical and organizational measures assist in complying with data security and protection policies. Therefore, the entity in charge of processing and storing data must comply with these policies.

Using the :doc:`Security Configuration Assessment (SCA) </getting-started/use-cases/configuration-assessment>` module, Wazuh performs configuration assessments to ensure that endpoints comply with security policies, standards, and hardening guides. Refer to the :doc:`SCA documentation </user-manual/capabilities/sec-config-assessment/index>` section for more details on configuring SCA checks.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nitpick: undone the change.

Using the :doc:`Configuration assessment </getting-started/use-cases/configuration-assessment>` application, Wazuh performs configuration assessments to ensure that endpoints comply with security policies, standards, and hardening guides. Refer to the :doc:`SCA documentation </user-manual/capabilities/sec-config-assessment/index>` section for more details on configuring SCA checks.

Use case: Ensure that the shadow group is empty
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Expand Down
2 changes: 1 addition & 1 deletion source/compliance/hipaa/configuration-assessment.rst
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Configuration assessment
========================

The Security Configuration Assessment (SCA) module performs scans to determine if monitored endpoints meet secure configuration and hardening policies. These scans assess the configuration of the endpoint using policy files that contain rules to be tested against the actual configuration of the endpoint.
The Configuration Assessment application performs scans to determine if monitored endpoints meet secure configuration and hardening policies. These scans assess the configuration of the endpoint using policy files that contain rules to be tested against the actual configuration of the endpoint.

The SCA module can help to implement the following HIPAA sections:

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/hipaa/visualization-and-dashboard.rst
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Visualization and dashboard
===========================

Wazuh offers a web dashboard for data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for security events, compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, and cloud infrastructure monitoring. It’s useful for performing forensic and historical alert analysis.
Wazuh offers a web dashboard for data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for threat hunting, compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, and cloud infrastructure monitoring. It’s useful for performing forensic and historical alert analysis.

The Wazuh dashboard assists in meeting the following HIPAA section:

Expand Down
6 changes: 3 additions & 3 deletions source/compliance/nist/configuration-assessment.rst
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@
.. meta::
:description: The SCA module performs scans to determine if monitored endpoints meet secure configuration and hardening policies. Learn more about it in this section.

Security configuration assessment
Configuration assessment
=================================

The Wazuh Security Configuration Assessment (SCA) module performs scans to determine if monitored endpoints meet secure configuration and hardening policies. These scans assess the endpoint configuration using policy files. These policy files contain rules that serve as a benchmark for the configurations that exist on the monitored endpoint.
The Wazuh Configuration Assessment application performs scans to determine if monitored endpoints meet secure configuration and hardening policies. These scans assess the endpoint configuration using policy files. These policy files contain rules that serve as a benchmark for the configurations that exist on the monitored endpoint.

The Wazuh :doc:`SCA </user-manual/capabilities/sec-config-assessment/how-it-works>` helps to comply with the following NIST 800-53 controls:

Expand All @@ -29,7 +29,7 @@ This use case shows how Wazuh helps meet the **CM-6 Configuration settings** req

# systemctl restart wazuh-agent

#. Select the **Security configuration assessment** module on your Wazuh dashboard. SCA scans are enabled by default so you don’t require further configuration actions.
#. Select the **Configuration assessment** module on your Wazuh dashboard. SCA scans are enabled by default so you don’t require further configuration actions.

.. thumbnail:: /images/compliance/nist/select-sca-module.png
:title: Select the SCA module
Expand Down
6 changes: 3 additions & 3 deletions source/compliance/nist/malware-detection.rst
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,11 @@ The Wazuh rootcheck module is enabled by default on the Wazuh agent configuratio

$ sudo systemctl restart wazuh-agent

#. Navigate to the **Security events** dashboard. Search for the event with rule ID ``510``.
#. Navigate to the **Threat Hunting** dashboard. Search for the event with rule ID ``510``.

.. thumbnail:: /images/compliance/nist/security-events-dashboard.png
:title: Security events dashboard
:alt: Security events dashboard
:title: Threat hunting dashboard
:alt: Threat hunting dashboard
:align: center
:width: 80%

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/nist/visualization-and-dashboard.rst
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Visualization and dashboard
Desvelao marked this conversation as resolved.
Show resolved Hide resolved
===========================

Wazuh offers a web dashboard for continuous data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for: security events, regulatory compliance, detected vulnerable applications, file integrity monitoring, configuration assessment results, and cloud infrastructure monitoring. It helps perform forensic and historical alert analyses.
Wazuh offers a web dashboard for continuous data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for: threat hunting, regulatory compliance, detected vulnerable applications, file integrity monitoring, configuration assessment results, and cloud infrastructure monitoring. It helps perform forensic and historical alert analyses.

The :doc:`Wazuh dashboard </getting-started/components/wazuh-dashboard>` assists in meeting the following NIST 800-53 controls:

Expand Down
8 changes: 4 additions & 4 deletions source/compliance/nist/vulnerability-detection.rst
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Use case: Detect vulnerabilities on a Windows endpoint

This use case shows how Wazuh helps meet the NIST **RA-5 Vulnerability monitoring and scanning** requirement using the Vulnerability detection module to identify system vulnerabilities.

In this use case, you configure the Wazuh Vulnerability detector module to perform a vulnerability scan on a monitored Windows 10 endpoint. The **Vulnerabilities** tab of the Wazuh dashboard shows the result of the scan.
In this use case, you configure the Wazuh Vulnerability detector module to perform a vulnerability scan on a monitored Windows 10 endpoint. The **Vulnerability detection** tab of the Wazuh dashboard shows the result of the scan.

Follow the steps below to activate the Wazuh Vulnerability Detector module:

Expand Down Expand Up @@ -96,11 +96,11 @@ Wazuh server

.. include:: /_templates/common/restart_manager.rst

#. Go to **Modules > Vulnerabilities** on the Wazuh dashboard. Select the Windows agent to find vulnerable applications and packages.
#. Go to **Vulnerability detection ** on the Wazuh dashboard. Select the Windows agent to find vulnerable applications and packages.

.. thumbnail:: /images/compliance/nist/modules-vulnerabilities.png
:title: Modules > Vulnerabilities
:alt: Modules > Vulnerabilities
:title: Modules > Vulnerability detection
:alt: Modules > Vulnerability detection
:align: center
:width: 80%

Expand Down
4 changes: 2 additions & 2 deletions source/compliance/pci-dss/configuration-assessment.rst
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
.. Copyright (C) 2015, Wazuh, Inc.

.. meta::
:description: You can use the Security configuration assessment module to create configuration policies on agents. Learn more about it in this section.
:description: You can use the Configuration assessment application to create configuration policies on agents. Learn more about it in this section.

.. _configuration_assessment:

Configuration assessment
========================

The Security configuration assessment module determines the state of hardening and configuration policies on agents. SCA performs scans to discover exposures or misconfigurations in monitored endpoints. Those scans assess the configuration of the hosts using policy files that contain rules to be tested against the actual configuration of the host.
The Configuration assessment application determines the state of hardening and configuration policies on agents. SCA performs scans to discover exposures or misconfigurations in monitored endpoints. Those scans assess the configuration of the hosts using policy files that contain rules to be tested against the actual configuration of the host.

The SCA module helps to meet the following PCI DSS requirements:

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/pci-dss/dashboard.rst
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
Visualization and dashboard
===========================

Wazuh provides a web dashboard for data visualization and analysis. The dashboard comes with out-of-the-box modules for security events, PCI DSS compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, cloud infrastructure monitoring events, and others. You can perform forensic and historical analysis of your alerts with the Wazuh dashboard.
Wazuh provides a web dashboard for data visualization and analysis. The dashboard comes with out-of-the-box modules for threat hunting, PCI DSS compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, cloud infrastructure monitoring events, and others. You can perform forensic and historical analysis of your alerts with the Wazuh dashboard.

Wazuh also provides a PCI DSS compliance dashboard under the regulatory compliance module.

Expand Down
4 changes: 2 additions & 2 deletions source/compliance/tsc/common-criteria/cc2.1.rst
Desvelao marked this conversation as resolved.
Show resolved Hide resolved
Original file line number Diff line number Diff line change
Expand Up @@ -24,9 +24,9 @@ Use case: Collecting and analyzing logs across multiple endpoints

Wazuh helps meet the COSO Principle 13 (CC2.1) requirement by providing capabilities that generate quality information for the proper functioning of internal control measures. An example is log data analysis. The Wazuh logcollector module retrieves and centralizes log data from different sources, such as operating systems, applications, network devices, and security appliances. Once the log data is collected, Wazuh applies various analysis techniques to extract valuable insights and detect potential security issues. This is done by matching the received data with the Wazuh out of the box decoders and rules.

This use case shows how log data analysis can be used to detect specific events across multiple endpoints. The process below shows how Wazuh groups *Security events* for an Ubuntu 22.04 agent.
This use case shows how log data analysis can be used to detect specific events across multiple endpoints. The process below shows how Wazuh groups *Threat Hunting* for an Ubuntu 22.04 agent.

#. Click on **Security events** from the Wazuh dashboard:
#. Click on **Threat Hunting** from the Wazuh dashboard:
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

.. thumbnail:: /images/compliance/tsc/common-criteria/wazuh-dashboard.png
:title: Wazuh dashboard
Expand Down
6 changes: 3 additions & 3 deletions source/compliance/tsc/common-criteria/cc5.1.rst
Original file line number Diff line number Diff line change
Expand Up @@ -14,14 +14,14 @@ This principle is a crucial part of the overall control metrics of an organizati

The use case below shows how Wazuh assists in meeting this requirement.

Use case: Security Configuration Assessment of a monitored endpoint
Use case: Configuration Assessment of a monitored endpoint
-------------------------------------------------------------------

Wazuh helps meet this aspect of the *COSO Principle 10 CC5.1 control activities* requirement by providing several modules. One of these modules is the Security Configuration Assessment (SCA) module. This module allows a user to scan system components and configurations to detect misconfigurations that could lead to security issues. The Wazuh SCA module is an example of a detective control for proactively identifying misconfiguration issues for timely remediation.
Wazuh helps meet this aspect of the *COSO Principle 10 CC5.1 control activities* requirement by providing several modules. One of these applications is the Configuration Assessment application. This application allows a user to scan system components and configurations to detect misconfigurations that could lead to security issues. The Wazuh Configuration assessment application is an example of a detective control for proactively identifying misconfiguration issues for timely remediation.

In this case, we use the SCA module to evaluate a monitored Windows 10 endpoint against the CIS Benchmark for Windows 10. By monitoring and detecting security configuration issues, you can quickly identify and remediate potential security risks, ensuring the security and compliance of your systems. You can track these events and actions on the Wazuh dashboard:

#. Navigate to the **Security Configuration Assessment** module from the Wazuh dashboard. Select the monitored Windows 10 endpoint.
#. Navigate to the **Configuration Assessment** application from the Wazuh dashboard. Select the monitored Windows 10 endpoint.

You can see the result of the assessment of the monitored endpoint.

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/tsc/common-criteria/cc8.1.rst
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ To carry out this use case, set up a Wazuh server and an Ubuntu 22.04 endpoint w

$ sudo apt upgrade

#. Select **Security events** from your Wazuh dashboard.
#. Select **Threat hunting** from your Wazuh dashboard.

#. Ensure the Ubuntu endpoint is selected.

Expand Down
2 changes: 1 addition & 1 deletion source/getting-started/components/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ The Wazuh solution is based on the Wazuh agent, which is deployed on the monitor

- The :doc:`Wazuh indexer <wazuh-indexer>` is a highly scalable, full-text search and analytics engine. This central component indexes and stores alerts generated by the Wazuh server.
- The :doc:`Wazuh server <wazuh-server>` analyzes data received from the agents. It processes it through decoders and rules, using threat intelligence to look for well-known indicators of compromise (IOCs). A single server can analyze data from hundreds or thousands of agents, and scale horizontally when set up as a cluster. This central component is also used to manage the agents, configuring and upgrading them remotely when necessary.
- The :doc:`Wazuh dashboard <wazuh-dashboard>` is the web user interface for data visualization and analysis. It includes out-of-the-box dashboards for security events, regulatory compliance (e.g., PCI DSS, GDPR, CIS, HIPAA, NIST 800-53), detected vulnerable applications, file integrity monitoring data, configuration assessment results, cloud infrastructure monitoring events, and others. It is also used to manage Wazuh configuration and to monitor its status.
- The :doc:`Wazuh dashboard <wazuh-dashboard>` is the web user interface for data visualization and analysis. It includes out-of-the-box dashboards for threat hunting, regulatory compliance (e.g., PCI DSS, GDPR, CIS, HIPAA, NIST 800-53), detected vulnerable applications, file integrity monitoring data, configuration assessment results, cloud infrastructure monitoring events, and others. It is also used to manage Wazuh configuration and to monitor its status.
- :doc:`Wazuh agents <wazuh-agent>` are installed on endpoints such as laptops, desktops, servers, cloud instances, or virtual machines. They provide threat prevention, detection, and response capabilities. They run on operating systems such as Linux, Windows, macOS, Solaris, AIX, and HP-UX.

In addition to agent-based monitoring capabilities, the Wazuh platform can monitor agent-less devices such as firewalls, switches, routers, or network IDS, among others. For example, a system log data can be collected via Syslog, and its configuration can be monitored through periodic probing of its data, via SSH or through an API.
Expand Down
Loading