Overview
Effective threat analysis is crucial for maintaining security posture. This guide covers practical workflows for detecting, investigating, and responding to security threats using Wazuh Dashboard.Understanding Security Events
Event Structure
Wazuh security events contain rich contextual information:- Rule Information: Rule ID, level, description, and groups
- Agent Details: Agent ID, name, IP address, and OS
- Event Data: Source data including logs, alerts, and system information
- MITRE ATT&CK: Mapped tactics and techniques (when applicable)
- Compliance Mapping: Regulatory framework references
- GeoIP Data: Geographic location information for network events
Event Severity Levels
| Level | Severity | Use Case |
|---|---|---|
| 0-3 | Informational | Normal system activity |
| 4-7 | Low to Medium | Suspicious activity requiring review |
| 8-11 | High | Security incidents requiring action |
| 12-15 | Critical | Severe threats requiring immediate response |
Threat Hunting Dashboard
Accessing Threat Hunting
Navigate to Threat Hunting in the main menu to access comprehensive threat detection capabilities.Key Dashboard Sections
Alerts Overview
Alerts Overview
High-level metrics showing:
- Total alerts over time period
- Alert distribution by severity level
- Top alerting agents
- Most triggered rules
- Alert trends and patterns
Top Security Events
Top Security Events
Visualizations highlighting:
- Most common attack types
- Authentication failures
- Network anomalies
- File integrity violations
- Malicious IP addresses
Events Timeline
Events Timeline
Time-series visualization showing:
- Alert volume over time
- Event clustering
- Anomaly detection
- Correlation patterns
Detailed Events Table
Detailed Events Table
Comprehensive event listing with:
- Full event details
- Sortable columns
- Search and filter capabilities
- Drill-down options
- Export functionality
Incident Investigation Workflow
Identify the Alert
Start with a high-severity alert or unusual pattern:
- Open Threat Hunting dashboard
- Filter by severity level >= 8
- Review recent high-severity events
- Identify alerts requiring investigation
Gather Initial Context
Click on the alert to view details:
- When: Exact timestamp of the event
- Where: Affected agent and system
- What: Rule description and categorization
- Why: Rule logic that triggered the alert
- Agent ID and name
- Source IP addresses
- User accounts involved
- Files or processes affected
Analyze the Pattern
Look for indicators of compromise:
- Volume: Unusual number of similar events
- Timing: Events clustered in short time periods
- Sequence: Ordered progression of attack stages
- Scope: Multiple agents or systems affected
- Geography: Connections from unusual locations
Correlate with Other Data
Check related modules:
- File Integrity Monitoring: Any file changes on the affected system?
- Vulnerability Detection: Are there known vulnerabilities on the agent?
- MITRE ATT&CK: What tactics and techniques are involved?
- System Inventory: What applications are running?
Common Threat Scenarios
Brute Force Attack Detection
Scenario Overview
Scenario Overview
An attacker is attempting to guess passwords through repeated authentication attempts.Indicators:
- Multiple authentication failures from same source
- Short time interval between attempts
- Targeting multiple user accounts
Investigation Steps
Investigation Steps
-
Identify the pattern:
-
Find the source:
- Check
data.srcipfield for attacking IP - Review geographic origin in GeoIP visualization
- Check
-
Assess the scope:
- Count unique targeted usernames
- Calculate attempts per minute
- Check if any attempts succeeded
-
Take action:
- Block source IP at firewall
- Enable account lockout policies
- Force password reset for targeted accounts
- Enable MFA for affected services
Malware Detection Response
Scenario Overview
Scenario Overview
Malware or potentially unwanted software detected on an endpoint.Indicators:
- Malware detection alerts (rule.groups:“malware”)
- Suspicious process execution
- Unauthorized file modifications
- Unusual network connections
Investigation Steps
Investigation Steps
- Isolate the affected system:
- Identify the agent in alert details
- Consider network isolation
- Review detection details:
- Malware name and family
- File path and hash
- Detection method
- Check for lateral movement:
- Search for same file hash on other agents
- Review network connections from affected host
- Check for similar processes across infrastructure
- Assess file integrity:
- Navigate to File Integrity Monitoring
- Filter by affected agent
- Look for unauthorized changes
- Remediate:
- Remove malicious files
- Scan system with anti-malware tools
- Review and close attack vector
- Update security controls
Privilege Escalation Detection
Scenario Overview
Scenario Overview
User or process attempting to gain elevated privileges.Indicators:
- Sudo usage alerts
- Unauthorized privilege changes
- Exploitation attempts
- Unusual administrative actions
Investigation Steps
Investigation Steps
-
Identify the escalation attempt:
-
Review user context:
- Who initiated the action (data.dstuser)
- What command was executed
- From which system (agent)
- Success or failure status
-
Check authorization:
- Is this user authorized for sudo?
- Is the action within normal responsibilities?
- Was it expected or scheduled?
-
Look for persistence mechanisms:
- Check for new cron jobs
- Review startup scripts
- Examine user account changes
- Search for SSH key additions
-
Respond accordingly:
- If unauthorized: disable account, force password reset
- Review and update sudo policies
- Enable additional logging
- Investigate potential account compromise
MITRE ATT&CK Integration
Understanding MITRE Mapping
Wazuh maps detected events to the MITRE ATT&CK framework, providing standardized threat intelligence.Accessing MITRE Dashboard
- Navigate to MITRE ATT&CK in the main menu
- View the attack matrix with highlighted tactics and techniques
- Click on tactics to see detected techniques
- Click on techniques for detailed events
MITRE-Based Investigation
Start with Tactics
Review which tactics are active in your environment:
- Initial Access: How attackers got in
- Execution: Code execution methods
- Persistence: How attackers maintain access
- Privilege Escalation: Elevation attempts
- Defense Evasion: Anti-detection techniques
- Credential Access: Password and credential theft
- Discovery: Network and system reconnaissance
- Lateral Movement: Spreading through network
- Collection: Data gathering
- Exfiltration: Data theft
- Impact: Destructive actions
Drill into Techniques
Click a tactic to see specific techniques detected:
- Number of events per technique
- Affected agents
- Recent occurrences
- Technique descriptions and mitigations
Analyze Event Chains
Look for technique sequences that indicate attack progression:Example: Ransomware attack chain
- Initial Access (T1566 - Phishing)
- Execution (T1204 - User Execution)
- Defense Evasion (T1562 - Impair Defenses)
- Impact (T1486 - Data Encrypted for Impact)
Advanced Search Techniques
Query Language Examples
Find failed SSH logins:Using Wildcards and Regex
Wildcard search:Visualization Best Practices
Creating Custom Visualizations
While Wazuh provides pre-built dashboards, you can create custom views:Top Attacking IPs
Top Attacking IPs
Create a data table showing:
- Source IP addresses
- Count of events
- Geographic location
- Latest activity
Alert Volume Heatmap
Alert Volume Heatmap
Visualize alert patterns:
- By hour of day
- By day of week
- Identify attack windows
- Plan monitoring coverage
Agent Security Score
Agent Security Score
Create metrics comparing:
- Alert count per agent
- Severity distribution
- Vulnerability count
- Compliance score
Response and Remediation
Active Response Actions
Wazuh can execute automated responses:- Firewall blocks: Automatically block attacking IPs
- Process termination: Kill malicious processes
- Account lockout: Disable compromised accounts
- File quarantine: Isolate suspicious files
Creating Response Playbooks
Document standard response procedures:- Alert Triage Criteria: What requires immediate attention?
- Escalation Paths: Who to notify and when?
- Investigation Steps: Standard investigation workflow
- Remediation Actions: Approved response actions
- Documentation Requirements: What to record
Threat Intelligence Integration
Using External Threat Feeds
Enhance detection with threat intelligence:- IP Reputation: Known malicious IP addresses
- File Hashes: Malware signatures
- Domain Reputation: Suspicious domains
- CVE Feeds: Vulnerability intelligence
Correlation with External Events
Consider external context:- Recent vulnerability disclosures
- Active malware campaigns
- Sector-specific threats
- Geopolitical events
Reporting and Metrics
Key Security Metrics
Track these indicators:Mean Time to Detect (MTTD)
How quickly are threats identified after occurrence?
Mean Time to Respond (MTTR)
How fast are incidents contained and remediated?
Alert Volume Trends
Is your security posture improving over time?
False Positive Rate
Are rules properly tuned to reduce noise?
Exporting Investigation Data
Export events for further analysis:- Apply filters to show relevant events
- Click Export button
- Choose format:
- CSV: For spreadsheet analysis
- JSON: For programmatic processing
- Include in incident reports
Tips and Best Practices
Start Broad, Then Narrow
Start Broad, Then Narrow
Begin investigations with wide time ranges and loose filters. Progressively narrow scope as you understand the incident.
Use Saved Searches
Use Saved Searches
Save commonly used queries:
- Daily security review searches
- Compliance audit queries
- Critical alert filters
- Investigation templates
Monitor Alert Trends
Monitor Alert Trends
Regular trend analysis helps identify:
- Emerging threats
- Rule tuning opportunities
- Infrastructure changes
- Attack pattern evolution
Correlate Across Modules
Correlate Across Modules
Don’t investigate in isolation:
- Check FIM for file changes
- Review vulnerabilities for exposure
- Examine system inventory
- Consider compliance impacts
Document Everything
Document Everything
Maintain investigation notes:
- Timeline of discovery
- Evidence collected
- Actions taken
- Lessons learned
Next Steps
- Learn about Compliance Monitoring for regulatory requirements
- Review Agent Deployment to expand coverage
- Explore Getting Started for dashboard basics