Wazuh 4.14 Capabilities - Security Modules Overview

Wazuh 4.14 Capabilities - Security Modules Overview

Wazuh 4.14 ships with a set of security modules, each addressing a distinct class of problems - from tracking filesystem changes to identifying vulnerabilities in installed software. The modules operate at both the agent and server level, complementing each other to deliver comprehensive infrastructure protection.

Security Modules

The platform includes 11 core modules that can be enabled and configured independently based on organizational requirements.

Threat Detection

File Integrity Monitoring (FIM)

The syscheck module tracks changes to files, directories, and Windows Registry entries. It detects unauthorized modifications to system binaries, configuration files, and sensitive data. Supports real-time monitoring, extended audit (whodata), and scheduled scanning modes.

Malware Detection

A multi-layered approach to malware identification: the rootcheck module for rootkit detection, YARA integration for signature-based file analysis, VirusTotal hash lookups, and log monitoring for ClamAV and Windows Defender alerts.

Security Configuration Assessment (SCA)

The SCA module evaluates endpoint configurations against CIS Benchmark policies. It uses YAML-based policy files with checks targeting files, processes, registry entries, and command output. Organizations can extend the built-in policies with custom rules.

Vulnerability Detection

The vulnerability-detector module correlates software inventory data collected by syscollector against vulnerability databases (NVD, Canonical, Red Hat, Debian, ALAS, Microsoft). It identifies known CVEs and prioritizes remediation by severity.

Monitoring and Data Collection

Log Data Collection

Centralized collection and normalization of logs from diverse sources: syslog, Windows Event Log, macOS Unified Logging System, and application logs. Decoders parse raw log entries into structured events for rule-based analysis.

Command Monitoring

Periodic execution of commands on endpoints with output analysis. This enables system state tracking through arbitrary command output (for example, netstat, ps, last).

System Inventory (Syscollector)

Collection of system resource data: installed packages, open ports, network interfaces, hardware specifications, and running processes. This data feeds the vulnerability detection module.

Response and Compliance

Active Response

Automated actions triggered by rule matches: IP blocking via iptables or Windows Firewall, process termination, and execution of custom scripts. Configurable by rule level, group, or identifier.

Regulatory Compliance

Mapping of detection rules to regulatory framework requirements: PCI DSS, GDPR, HIPAA, NIST 800-53, and TSC (SOC 2). The dashboard generates compliance reports automatically.

Cloud Security Monitoring

Integration with cloud providers: AWS (CloudTrail, VPC Flow Logs, GuardDuty), Azure (Activity Logs, Blob Storage), and Google Cloud (Pub/Sub). Enables security event analysis across cloud infrastructure.

Container Security

Monitoring of Docker containers and Kubernetes environments: Docker daemon events, image changes, container network activity, and Kubernetes audit log analysis.

Related Sections

Last updated on