-
Notifications
You must be signed in to change notification settings - Fork 182
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge v4.4.5-2.6.0 into 4.4 (#5665) * Bump Wazuh and platform versions for v4.4.5 (#5639) * Update changelog * Update opensearch_dashboards.json * Update package.json * Update readme * Update tag script * Change tag.py version value * Empty tag suffix * Prepare tag.py for v4.4.5-rc1 (#5645) Add -rc1 tag suffix * Fix incompatible version of triple-beam subdependency (#5652) fix: add yarn.lock file and set version of triple-beam in yarn.lock * Update unit-test.yml (#5655) * Add support for Wazuh 4.4.5-rc2 (#5659) * Update revision of v4.4.5 in the Changelog * Bump v4.4.5-2.6.0-rc2 --------- Co-authored-by: Nicolas Agustin Guevara Pihen <[email protected]> Co-authored-by: Federico Rodriguez <[email protected]> Co-authored-by: Álex Ruiz <[email protected]> Co-authored-by: Antonio <[email protected]>
- Loading branch information
1 parent
1aee6e2
commit 7843d73
Showing
7 changed files
with
2,925 additions
and
37 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,31 +16,31 @@ You can learn more about it here [wazuh.com](https://wazuh.com/) | |
This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh alerts stored in OpenSearch and provides the following capabilities: | ||
|
||
- Search alerts classified by modules and filter them using the different views. You will be able to explore the alerts both at Wazuh cluster level, and in a particular agent. The modules, divided into the following use cases, are: | ||
- Security Information Management | ||
- Security events: Browse through your security alerts, identifying issues and threats in your environment. | ||
- Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes. | ||
- Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API. | ||
- Office 365: Security events related to your Office 365 services. | ||
- GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API. | ||
- Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API. | ||
- Auditing and Policy Monitoring | ||
- Policy monitoring: Verify that your systems are configured according to your security policies baseline. | ||
- Security configuration assessment: Scan your assets as part of a configuration assessment audit. | ||
- System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files. | ||
- OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks. | ||
- CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks. | ||
- Threat Detection and Response | ||
- Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities. | ||
- MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations. | ||
- VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API. | ||
- Osquery: Osquery can be used to expose an operating system as a high-performance relational database. | ||
- Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events. | ||
- Regulatory Compliance | ||
- PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data. | ||
- NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems. | ||
- GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data. | ||
- HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information. | ||
- TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy. | ||
- Security Information Management | ||
- Security events: Browse through your security alerts, identifying issues and threats in your environment. | ||
- Integrity monitoring: Alerts related to file changes, including permissions, content, ownership and attributes. | ||
- Amazon AWS: Security events related to your Amazon AWS services, collected directly via AWS API. | ||
- Office 365: Security events related to your Office 365 services. | ||
- GitHub: Security events related to your GitHub organizations, collected via GitHub audit logs API. | ||
- Google Cloud Platform: Security events related to your Google Cloud Platform services, collected directly via GCP API. | ||
- Auditing and Policy Monitoring | ||
- Policy monitoring: Verify that your systems are configured according to your security policies baseline. | ||
- Security configuration assessment: Scan your assets as part of a configuration assessment audit. | ||
- System auditing: Audit users behavior, monitoring command execution and alerting on access to critical files. | ||
- OpenSCAP: Configuration assessment and automation of compliance monitoring using SCAP checks. | ||
- CIS-CAT: Configuration assessment using Center of Internet Security scanner and SCAP checks. | ||
- Threat Detection and Response | ||
- Vulnerabilities: Discover what applications in your environment are affected by well-known vulnerabilities. | ||
- MITRE ATT&CK: Security events from the knowledge base of adversary tactics and techniques based on real-world observations. | ||
- VirusTotal: Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API. | ||
- Osquery: Osquery can be used to expose an operating system as a high-performance relational database. | ||
- Docker listener: Monitor and collect the activity from Docker containers such as creation, running, starting, stopping or pausing events. | ||
- Regulatory Compliance | ||
- PCI DSS: Global security standard for entities that process, store or transmit payment cardholder data. | ||
- NIST 800-53: National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) sets guidelines for federal information systems. | ||
- GDPR: General Data Protection Regulation (GDPR) sets guidelines for processing of personal data. | ||
- HIPAA: Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides data privacy and security provisions for safeguarding medical information. | ||
- TSC: Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy. | ||
- View and edit the Wazuh manager configuration. | ||
- Manage your ruleset (rules, decoders and CDB lists). | ||
- Manage your groups of agents. | ||
|
@@ -93,6 +93,7 @@ This plugin for OpenSearch Dashboards allows you to visualize and analyze Wazuh | |
- Wazuh dashboard 4.5.0 | ||
- Wazuh indexer 4.5.0 | ||
|
||
|
||
## Contribute | ||
|
||
If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users [mailing list](https://groups.google.com/d/forum/wazuh), by sending an email to [[email protected]](mailto:[email protected]), to ask questions and participate in discussions. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.