wazuh v3.9.3 releases: Host and endpoint security
Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities:
- Log management and analysis: Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage.
- File integrity monitoring: Wazuh monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on.
- Intrusion and anomaly detection: Agents scan the system looking for malware, rootkits or suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses.
- Policy and compliance monitoring: Wazuh monitors configuration files to ensure they are compliant with your security policies, standards or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.
This diverse set of capabilities is provided by integrating OSSEC, OpenSCAP and Elastic Stack, making them work together as a unified solution, and simplifying their configuration and management.
It provides an updated log analysis ruleset and a RESTful API that allows you to monitor the status and configuration of all Wazuh agents.
It also includes a rich web application (fully integrated as a Kibana app), for mining log analysis alerts and for monitoring and managing your Wazuh infrastructure.
- Windows Eventchannel log collector will no longer report bookmarked events by default (those that happened while the agent was stopped). (#3485)
- Remoted will discard agent-info data not in UTF-8 format. (#3581)
- Osquery integration did not follow the osquery results file (osqueryd.results.log) as of libc 2.28. (#3494)
- Windows Eventchannnel log collector did not update the bookmarks so it reported old events repeatedly. (#3485)
- The agent sent invalid info data in the heartbeat message if it failed to get the host IP address. (#3555)
- Modulesd produced a memory leak when being queried for its running configuration. (#3564)
- Analysisd and Logtest crashed when trying rules having
- Vulnerability Detector failed to parse the Canonical’s OVAL feed due to a syntax change. (#3563)
- AWS Macie events produced erros in Elasticsearch. (#3608)
- Rules with
<list lookup="address_match_key" />produced a false match if the CDB list file is missing. (#3609)
- Remote configuration was missing the
<ignore>stanzas for Syscheck and Rootcheck when defined as sregex. (#3617)
Portions Copyright (C) 2017 Wazuh, Inc.
Based on work Copyright (C) 2003 – 2013 Trend Micro, Inc.