π‘️ Ultimate Guide to Installing & Configuring Wazuh SIEM in 2025
π‘️ Ultimate Guide to Installing & Configuring Wazuh SIEM in 2025
π¨ “SIEM is not just a log collector — it’s your first line of threat visibility.”
Looking to set up a powerful open-source SIEM solution for your infrastructure? Wazuh offers real-time threat detection, log correlation, file integrity monitoring, vulnerability detection, and more — completely free!
This guide will walk you through a full Wazuh deployment on a single Ubuntu 22.04 server in under 30 minutes. πͺ
π§° Prerequisites
-
π₯️ 1x Ubuntu 22.04 or Debian 11 server (4+ GB RAM)
-
π Internet access + sudo/root access
-
π Firewall ports: 1514/UDP, 1515/TCP, 55000/TCP open
π Step 1: Update the Server
Run this command to update your system packages:
sudo apt update && sudo apt upgrade -y
π Step 2: Install Wazuh All-in-One
Wazuh provides an easy deployment script that installs all components:
curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh
sudo bash ./wazuh-install.sh -a
-
π This process takes about 10–15 minutes
-
π¦ Installs: Wazuh Manager, Dashboard, Filebeat, and Indexer
✅ Components Deployed
Component | Purpose |
---|---|
π Wazuh Manager | Analyzes and correlates security data |
π Wazuh Indexer | Stores indexed data (OpenSearch backend) |
π Wazuh Dashboard | Web UI for searching, alerts, dashboards |
π Step 3: Access the Wazuh Dashboard
Open your browser and navigate to:
https://YOUR_SERVER_IP
Default credentials are:
-
Username:
admin
-
Password:
admin
π‘️ You will be prompted to change the password upon first login.
π¨π» Step 4: Add a Wazuh Agent (Linux Example)
-
On the Wazuh dashboard, go to Agents → Add Agent.
-
Fill in the agent name, IP, and OS, then click Generate Install Command.
-
On the client machine, run the generated command, for example:
curl -sO https://packages.wazuh.com/4.7/wazuh-agent.sh
sudo bash ./wazuh-agent.sh -a MANAGER_IP -r default -n AGENT_NAME
Within 1-2 minutes, the agent status should turn Active in the dashboard.
π Step 5: Enable Threat Detection Modules
Navigate to Management → Rules and enable important modules such as:
-
π¨ CIS Benchmark Monitoring
-
π§ͺ File Integrity Monitoring (FIM)
-
π Auditd-based Threat Detection
-
π Rootkit & Malware Detection
After enabling, restart the Wazuh manager:
sudo systemctl restart wazuh-manager
π¦ Optional: Add Windows Agent
-
Download the Windows agent MSI installer from:
https://packages.wazuh.com/4.x/windows/wazuh-agent-4.7.msi -
Run the installer and provide your manager’s IP and the group (default).
-
Start the agent using:
wazuh-agent.exe start
Now your Windows machine will send logs to the Wazuh dashboard.
π Bonus: Monitor Logs in Real-Time
Explore the dashboard modules such as:
-
π Security Events
-
π File Integrity Monitoring (FIM)
-
π¬ Vulnerabilities
You can create custom alerts and fine-tune thresholds to reduce noise and get actionable alerts.
π ️ Troubleshooting Tips
-
π If you see SSL errors in the dashboard, verify certificate paths in
/etc/filebeat/filebeat.yml
. -
π« If agents fail to connect, check if port 1514/UDP is open between client and server.
-
π If logs aren’t showing, restart services:
sudo systemctl restart wazuh-indexer filebeat wazuh-manager
π― Summary
-
π Wazuh provides enterprise-grade security monitoring for free.
-
π Collect and analyze logs from Linux, Windows, and cloud environments.
-
π Build custom alerts, dashboards, and compliance reports with ease
π§ Hashtags:
-
wazuh installation 2025
-
open source SIEM
-
install wazuh ubuntu
-
wazuh agent configuration
-
wazuh dashboard setup
-
wazuh best practices
-
wazuh real-time alerting
Comments
Post a Comment