Skip to content

Commit

Permalink
Merge 4.4 into 4.5.0 (#5669)
Browse files Browse the repository at this point in the history
Merge v4.4.5-2.6.0 into 4.4 (#5665)

* Bump Wazuh and platform versions for v4.4.5 (#5639)

* Update changelog

* Update opensearch_dashboards.json

* Update package.json

* Update readme

* Update tag script

* Change tag.py version value

* Empty tag suffix

* Prepare tag.py for v4.4.5-rc1 (#5645)

Add -rc1 tag suffix

* Fix incompatible version of triple-beam subdependency (#5652)

fix: add yarn.lock file and set version of triple-beam in yarn.lock

* Update unit-test.yml (#5655)

* Add support for Wazuh 4.4.5-rc2 (#5659)

* Update revision of v4.4.5 in the Changelog

* Bump v4.4.5-2.6.0-rc2

---------

Co-authored-by: Nicolas Agustin Guevara Pihen <[email protected]>
Co-authored-by: Federico Rodriguez <[email protected]>
Co-authored-by: Álex Ruiz <[email protected]>
Co-authored-by: Antonio <[email protected]>
  • Loading branch information
5 people authored Jul 11, 2023
1 parent 1aee6e2 commit 7843d73
Show file tree
Hide file tree
Showing 7 changed files with 2,925 additions and 37 deletions.
5 changes: 0 additions & 5 deletions .github/workflows/unit-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,6 @@ on:
options:
- 'yarn test:jest'
pull_request:
branches:
- 'master'
- '[345].[0-9]+' # Minor branches
- '[345].[0-9]+.[0-9]+' # Patch branches
- '[345].[0-9]+.[0-9]+-7.[0-9]+' # Minor branches - Kibana

jobs:
# Run unit tests with Jest
Expand Down
4 changes: 1 addition & 3 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -72,8 +72,6 @@ typings/
target/
build/

yarn.lock

cypress/node_modules/
cypress/.idea/
cypress/cypress.env.json
Expand All @@ -84,4 +82,4 @@ cypress/cookies.json
public/assets/custom/*

# Mac files
.DS_Store
.DS_Store
6 changes: 6 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,12 @@ All notable changes to the Wazuh app project will be documented in this file.

- Support for Wazuh 4.5.0

## Wazuh v4.4.5 - OpenSearch Dashboards 2.6.0 - Revision 02

### Added

- Support for Wazuh 4.4.5

## Wazuh v4.4.4 - OpenSearch Dashboards 2.6.0 - Revision 01

### Added
Expand Down
51 changes: 26 additions & 25 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,31 +16,31 @@ You can learn more about it here [wazuh.com](https://wazuh.com/)
This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh alerts stored in OpenSearch and provides the following capabilities:

- Search alerts classified by modules and filter them using the different views. You will be able to explore the alerts both at Wazuh cluster level, and in a particular agent. The modules, divided into the following use cases, are:
- Security Information Management
- Security events: Browse through your security alerts, identifying issues and threats in your environment.
- Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes.
- Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API.
- Office 365: Security events related to your Office 365 services.
- GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API.
- Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API.
- Auditing and Policy Monitoring
- Policy monitoring: Verify that your systems are configured according to your security policies baseline.
- Security configuration assessment: Scan your assets as part of a configuration assessment audit.
- System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files.
- OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks.
- CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks.
- Threat Detection and Response
- Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities.
- MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations.
- VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API.
- Osquery: Osquery can be used to expose an operating system as a high-performance relational database.
- Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events.
- Regulatory Compliance
- PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data.
- NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems.
- GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data.
- HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information.
- TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy.
- Security Information Management
- Security events: Browse through your security alerts, identifying issues and threats in your environment.
- Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes.
- Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API.
- Office 365: Security events related to your Office 365 services.
- GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API.
- Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API.
- Auditing and Policy Monitoring
- Policy monitoring: Verify that your systems are configured according to your security policies baseline.
- Security configuration assessment: Scan your assets as part of a configuration assessment audit.
- System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files.
- OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks.
- CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks.
- Threat Detection and Response
- Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities.
- MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations.
- VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API.
- Osquery: Osquery can be used to expose an operating system as a high-performance relational database.
- Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events.
- Regulatory Compliance
- PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data.
- NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems.
- GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data.
- HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information.
- TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy.
- View and edit the Wazuh manager configuration.
- Manage your ruleset (rules, decoders and CDB lists).
- Manage your groups of agents.
Expand Down Expand Up @@ -93,6 +93,7 @@ This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh
- Wazuh dashboard 4.5.0
- Wazuh indexer 4.5.0


## Contribute

If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users [mailing list](https://groups.google.com/d/forum/wazuh), by sending an email to [[email protected]](mailto:[email protected]), to ask questions and participate in discussions.
Expand Down
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"version": "4.5.0",
"revision": "01",
"stage": "stable",
"commit": "0e7201ff8",
"commit": "c805cbcd0",
"pluginPlatform": {
"version": "2.6.0"
},
Expand Down
6 changes: 3 additions & 3 deletions scripts/tag.py
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,9 @@
# Wazuh version: major.minor.patch
version = '4.5.0'
# App's revision number (previous rev + 1)
revision = '01'
revision = '02'
# One of 'pre-alpha', 'alpha', 'beta', 'release-candidate', 'stable'
stage = 'alpha'
stage = 'stable'
# Tag suffix. Usually set to stage + stage iteration.
tag_suffix = '-alpha1'

Expand All @@ -30,7 +30,7 @@
TAGS_FILE = 'tags.log'
# Global variable. Will be set later
branch = None
minor = ".".join(version.split('.')[:2])
minor = version

# Supported versions of Kibana
kbn_versions = [
Expand Down
Loading

0 comments on commit 7843d73

Please sign in to comment.