Summary
Hands-on setup of a Wazuh SIEM with Linux and Windows endpoints, validating end-to-end visibility and detections.
- Installed and configured Wazuh server; enrolled Linux and Windows agents
- Verified telemetry (inventory, vulnerabilities, compliance) and ATT&CK mappings
- Generated activity (whoami, sudo, app installs) and observed captured events
- Used Threat Hunting to correlate host actions with detections
Wazuh
SIEM
Endpoint Telemetry
MITRE ATT&CK
Threat Hunting