Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

πŸ“ Case Study: Wazuh Endpoint Detection & Monitoring

πŸ”Ή Overview

This case study focuses on Wazuh, an endpoint detection and response platform that also acts as a SIEM.
I deployed a Wazuh management server, connected multiple agents, and investigated collected logs and security events to understand how Wazuh centralizes monitoring and detection.

Skills demonstrated:


πŸ” Key Activities & Highlights

1. Introduction

The first task was to familiarize myself with Wazuh terminology and history. I read the introductory notes and understood its architecture.

Findings:


2. Deploy Wazuh Server

For this step, I connected to the TryHackMe network using my OpenVPN profile and accessed the Wazuh server via the provided IP.
Once connected, I logged into the Wazuh GUI with the credentials provided in the task. This step was crucial because without a functioning management server, none of the agents or security events could be monitored.

Observation:


3. Wazuh Agents

I clicked the Wazuh icon β†’ β€œAgents” to view all connected agents. Wazuh lists each agent and shows its current connection status.

Findings:

Reflection:


4. Wazuh Vulnerability Assessment & Security Events

Next, I analyzed the agent named AGENT-001. I navigated to Security events and adjusted the time filter to β€œYears ago” to ensure I captured all historical alerts.

Findings:

Reflection:


5. Collecting Windows Logs with Wazuh

Wazuh collects system logs from endpoints to detect suspicious activity. I verified which tools Wazuh uses for Windows:

Findings:

Reflection:


6. Collecting Linux Logs with Wazuh

I explored how Linux endpoints are monitored. The readings emphasized monitoring command execution and system activity.

Findings:

Reflection:


7. Wazuh API

I explored the Wazuh API to interact programmatically with the server. The API allows retrieving information, performing actions, and integrating Wazuh into scripts or external systems.

Findings:

Reflection:


8. Generating Reports with Wazuh

I generated a security events report for analysis:

Steps:

  1. Navigate: Wazuh logo β†’ Modules β†’ Security Event β†’ Generate report
  2. Download report: Wazuh logo β†’ Management β†’ Reporting β†’ Actions β†’ Download

Findings:

Reflection:


βœ… Conclusion

Takeaways:


πŸ”— Navigation