Overview
Wazuh agents are lightweight security monitoring components deployed on endpoints, servers, and cloud instances. This guide covers deployment strategies, configuration best practices, and ongoing management to maximize your security monitoring coverage.Understanding Wazuh Agents
What is a Wazuh Agent?
A Wazuh agent is a small program installed on monitored systems that:- Collects Security Data: Logs, file changes, system configurations
- Runs Active Response: Executes automated responses to threats
- Performs Integrity Monitoring: Tracks file and registry changes
- Detects Vulnerabilities: Scans for security weaknesses
- Assesses Configurations: Validates security settings against benchmarks
- Monitors System Inventory: Tracks installed software and hardware
Agent Architecture
- Agent: Collects data locally
- Manager: Processes and correlates events
- Indexer: Stores data for analysis
- Dashboard: Visualization and management interface
Supported Platforms
Wazuh agents support:Linux
- Ubuntu/Debian
- RHEL/CentOS/Rocky/Alma
- Amazon Linux
- SUSE/OpenSUSE
- Fedora
Windows
- Windows Server 2012-2025
- Windows 10/11
- Windows workstations
macOS
- macOS 10.15+
- Intel and Apple Silicon
Unix
- Solaris
- AIX
- HP-UX
Containers
- Docker containers
- Kubernetes pods
Cloud
- AWS instances
- Azure VMs
- Google Cloud VMs
Agent Deployment Wizard
Using the Dashboard Deployment Wizard
The easiest way to deploy agents is through the dashboard wizard.Access the Wizard
- Navigate to Agents in the main menu
- Click Deploy New Agent
- The deployment wizard opens
Select Operating System
- Linux (RPM-based)
- Linux (DEB-based)
- Windows
- macOS
Configure Server Address
- Manager Address: IP or FQDN of your Wazuh manager
- Manager Port: Default is 1514 (can be customized)
Assign Agent Name (Optional)
- If not specified, uses the hostname
- Use descriptive names:
web-prod-01,db-staging-02 - Consider naming conventions for your organization
Assign to Group (Optional)
- Groups enable shared configurations
- Examples:
webservers,databases,production - Can be changed after deployment
Copy Installation Command
Execute on Target System
- SSH/RDP to the target system
- Paste and execute the command
- Wait for installation to complete
Deployment at Scale
Automated Deployment Strategies
For large environments, automate agent deployment:Configuration Management Tools
Configuration Management Tools
Cloud Auto-Scaling Integration
Cloud Auto-Scaling Integration
Container Deployment
Container Deployment
Golden Image Integration
Golden Image Integration
- Install agent in image template
- Configure manager address
- Do NOT start the service (will auto-register on first boot)
- Deploy image across infrastructure
Batch Registration
Register multiple agents programmatically:Agent Configuration
Configuration File Location
- Linux:
/var/ossec/etc/ossec.conf - Windows:
C:\Program Files (x86)\ossec-agent\ossec.conf - macOS:
/Library/Ossec/etc/ossec.conf
Essential Configuration Sections
Manager Connection
Manager Connection
address: Manager IP or FQDNport: Communication port (default 1514)protocol: tcp or udp
Log Collection
Log Collection
File Integrity Monitoring
File Integrity Monitoring
check_all, check_sum, check_sha256, realtime, report_changesRootkit Detection
Rootkit Detection
Security Configuration Assessment
Security Configuration Assessment
Vulnerability Detection
Vulnerability Detection
Centralized Configuration Management
Manage configurations from the dashboard:Access Agent Configuration
- Navigate to Server Management > Settings
- Select Agent Configuration
- Choose a group or create new one
Edit Group Configuration
- Log collection rules
- File integrity monitoring paths
- Security configuration policies
- Active response rules
Assign Agents to Groups
- Go to Agents > Overview
- Select agents
- Click Manage Groups
- Assign to appropriate group
Agent Groups and Organization
Best Practices for Group Structure
By Function
webserversdatabasesapplication-serversfile-servers
By Environment
productionstagingdevelopmenttesting
By Location
us-easteu-westasia-pacific
By Compliance
pci-environmenthipaa-systemsgdpr-processing
Managing Groups
Create a New Group
Create a New Group
- Navigate to Server Management > Settings
- Go to Agent Configuration
- Click Add New Group
- Name the group descriptively
- Configure group-specific settings
Assign Agents to Groups
Assign Agents to Groups
- Agents > Overview
- Select agents (checkbox)
- Actions > Manage Groups
- Select target group
Multi-Group Assignment
Multi-Group Assignment
- Agent-specific configuration (highest)
- Group configuration (in order assigned)
- Default configuration (lowest)
Monitoring Agent Health
Agent Status Indicators
In the Agents > Overview dashboard:Active (Green)
Active (Green)
- Sending events regularly
- Responsive to manager requests
- All modules functioning
Disconnected (Red)
Disconnected (Red)
- System powered off
- Network connectivity issues
- Agent service stopped
- Firewall blocking communication
- Check if system is online
- Verify agent service is running
- Test network connectivity to manager
- Review firewall rules
- Check agent logs
Never Connected (Gray)
Never Connected (Gray)
- Agent not started after installation
- Incorrect manager address
- Network configuration issues
- Certificate/key problems
- Verify agent service is running
- Check manager address in ossec.conf
- Ensure port 1514 is reachable
- Review agent logs for errors
Pending (Orange)
Pending (Orange)
Agent Details View
Click on an agent to view:- General Information: OS, version, IP, registration date
- Configuration: Active modules and settings
- Events: Recent security events from this agent
- Inventory: Installed packages and hardware
- Vulnerabilities: Detected security issues
- SCA Results: Configuration compliance status
- File Integrity: Recent file changes
Agent Logs
Review agent logs for troubleshooting: Linux:Connected to the server: Successful connectionUnable to connect: Network or configuration issueInvalid server address: Check manager addressERROR: Requires investigation
Performance Optimization
Resource Usage Considerations
CPU Usage
CPU Usage
- Initial file integrity scan
- Vulnerability scan execution
- Processing large log volumes
- Adjust scan schedules to off-peak hours
- Limit monitored directories
- Increase scan intervals
Memory Usage
Memory Usage
- Number of monitored files
- Active modules enabled
- Log processing volume
- Disable unused modules
- Use log filters to reduce processing
Network Bandwidth
Network Bandwidth
- High log volume systems
- Frequent file changes
- Large file change reports
- Use event compression (enabled by default)
- Filter unnecessary logs
- Adjust file integrity reporting
Disk I/O
Disk I/O
- Log file reading
- File integrity scanning
- Local event queuing
- Exclude high-churn directories from FIM
- Use realtime monitoring selectively
- Adjust scan schedules
Configuration Tuning
Reduce File Integrity Scan Frequency:Troubleshooting Common Issues
Agent Won’t Connect
Review Firewall Rules
Agent Showing as Disconnected
Possible Causes:- Agent stopped: Restart the service
- Network issue: Check connectivity
- High load: Agent can’t process events fast enough
- Time sync: Ensure agent and manager clocks are synchronized
- Certificate issue: Regenerate agent keys if necessary
Events Not Appearing in Dashboard
Security Best Practices
Secure Agent-Manager Communication
Secure Agent-Manager Communication
- Use encrypted communication (default)
- Implement network segmentation
- Restrict manager access with firewalls
- Rotate agent keys periodically
- Use DNS names for flexibility
Principle of Least Privilege
Principle of Least Privilege
- Agent runs with minimal required privileges
- Use dedicated service account for agent
- Limit configuration file access
- Restrict active response capabilities
Regular Maintenance
Regular Maintenance
- Keep agents updated to latest version
- Review and update configurations
- Remove decommissioned agents
- Audit agent group memberships
- Monitor agent health regularly
Change Management
Change Management
- Test configuration changes in non-production
- Document agent deployment standards
- Version control group configurations
- Implement rollback procedures
Next Steps
Now that you understand agent deployment:- Use agents for Threat Analysis workflows
- Monitor Compliance across your infrastructure
- Review Getting Started for dashboard features