๐ก️ Ultimate Guide to Installing & Configuring Wazuh SIEM in 2025
๐ก️ Ultimate Guide to Installing & Configuring Wazuh SIEM in 2025
๐จ “SIEM is not just a log collector — it’s your first line of threat visibility.”
Looking to set up a powerful open-source SIEM solution for your infrastructure? Wazuh offers real-time threat detection, log correlation, file integrity monitoring, vulnerability detection, and more — completely free!
This guide will walk you through a full Wazuh deployment on a single Ubuntu 22.04 server in under 30 minutes. ๐ช
๐งฐ Prerequisites
-
๐ฅ️ 1x Ubuntu 22.04 or Debian 11 server (4+ GB RAM)
-
๐ Internet access + sudo/root access
-
๐ Firewall ports: 1514/UDP, 1515/TCP, 55000/TCP open
๐ Step 1: Update the Server
Run this command to update your system packages:
sudo apt update && sudo apt upgrade -y
๐ Step 2: Install Wazuh All-in-One
Wazuh provides an easy deployment script that installs all components:
curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh
sudo bash ./wazuh-install.sh -a
-
๐ This process takes about 10–15 minutes
-
๐ฆ Installs: Wazuh Manager, Dashboard, Filebeat, and Indexer
✅ Components Deployed
| Component | Purpose |
|---|---|
| ๐ Wazuh Manager | Analyzes and correlates security data |
| ๐ Wazuh Indexer | Stores indexed data (OpenSearch backend) |
| ๐ Wazuh Dashboard | Web UI for searching, alerts, dashboards |
๐ Step 3: Access the Wazuh Dashboard
Open your browser and navigate to:
https://YOUR_SERVER_IP
Default credentials are:
-
Username:
admin -
Password:
admin
๐ก️ You will be prompted to change the password upon first login.
๐จ๐ป Step 4: Add a Wazuh Agent (Linux Example)
-
On the Wazuh dashboard, go to Agents → Add Agent.
-
Fill in the agent name, IP, and OS, then click Generate Install Command.
-
On the client machine, run the generated command, for example:
curl -sO https://packages.wazuh.com/4.7/wazuh-agent.sh
sudo bash ./wazuh-agent.sh -a MANAGER_IP -r default -n AGENT_NAME
Within 1-2 minutes, the agent status should turn Active in the dashboard.
๐ Step 5: Enable Threat Detection Modules
Navigate to Management → Rules and enable important modules such as:
-
๐จ CIS Benchmark Monitoring
-
๐งช File Integrity Monitoring (FIM)
-
๐ Auditd-based Threat Detection
-
๐ Rootkit & Malware Detection
After enabling, restart the Wazuh manager:
sudo systemctl restart wazuh-manager
๐ฆ Optional: Add Windows Agent
-
Download the Windows agent MSI installer from:
https://packages.wazuh.com/4.x/windows/wazuh-agent-4.7.msi -
Run the installer and provide your manager’s IP and the group (default).
-
Start the agent using:
wazuh-agent.exe start
Now your Windows machine will send logs to the Wazuh dashboard.
๐ Bonus: Monitor Logs in Real-Time
Explore the dashboard modules such as:
-
๐ Security Events
-
๐ File Integrity Monitoring (FIM)
-
๐ฌ Vulnerabilities
You can create custom alerts and fine-tune thresholds to reduce noise and get actionable alerts.
๐ ️ Troubleshooting Tips
-
๐ If you see SSL errors in the dashboard, verify certificate paths in
/etc/filebeat/filebeat.yml. -
๐ซ If agents fail to connect, check if port 1514/UDP is open between client and server.
-
๐ If logs aren’t showing, restart services:
sudo systemctl restart wazuh-indexer filebeat wazuh-manager
๐ฏ Summary
-
๐ Wazuh provides enterprise-grade security monitoring for free.
-
๐ Collect and analyze logs from Linux, Windows, and cloud environments.
-
๐ Build custom alerts, dashboards, and compliance reports with ease
๐ง Hashtags:
-
wazuh installation 2025
-
open source SIEM
-
install wazuh ubuntu
-
wazuh agent configuration
-
wazuh dashboard setup
-
wazuh best practices
-
wazuh real-time alerting
Comments
Post a Comment