Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adapt documentation to the new side menu. #6690

Merged
Show file tree
Hide file tree
Changes from 45 commits
Commits
Show all changes
57 commits
Select commit Hold shift + click to select a range
f5c822d
Modules remove from wazuh app update and app/wazuh change to app/wz-home
JuanGarriuz Oct 26, 2023
7b65e80
Reviewed changes, remove extensions, logo.sidebar and disabled_roles
JuanGarriuz Oct 31, 2023
729f923
Reviewed changes, remove disabled_roles
JuanGarriuz Oct 31, 2023
3104105
Fix Amazon Web Services and remove enable-wazuh-docker-listener-dashb…
JuanGarriuz Nov 2, 2023
74691a5
Configuration assessment update
JuanGarriuz Nov 3, 2023
500d832
OpenScap and System Auditing remove
JuanGarriuz Nov 3, 2023
06d5018
Replace Securitu events modulo with Threat hunting
lucianogorza Nov 3, 2023
cc41028
Replace Securitu events modulo with Threat hunting
lucianogorza Nov 3, 2023
6016615
Replace Vulnerabilities with Vulnerability detection
lucianogorza Nov 3, 2023
d25cb66
Replace Docker listener with Docker
lucianogorza Nov 3, 2023
d603e98
fix: remove unwanted file
Desvelao Nov 6, 2023
82aac13
fix: restore the removed files
Desvelao Nov 6, 2023
e9405b2
Replace Threat hunting with Threat Hunting
lucianogorza Nov 6, 2023
e3b41d2
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 6, 2023
df0df9d
fix: replace Agents section by Endpoints Summary
Desvelao Nov 6, 2023
c1313e0
fix: restore changes related to SCA module
Desvelao Nov 6, 2023
a4c79f8
fix: rename SCA module to Configuration Assesment related to Wazuh da…
Desvelao Nov 6, 2023
b0c8055
Replace tab with module
lucianogorza Nov 6, 2023
e0bef68
Merge pull
lucianogorza Nov 6, 2023
0c6307a
Replace Docker listener with Docker
lucianogorza Nov 6, 2023
8275965
fix: replace references to old Agents section on Wazuh dashboard
Desvelao Nov 7, 2023
3c35b07
fix: replace references to Management section on Wazuh dashboard
Desvelao Nov 7, 2023
af03bce
fix: replace references to Management category of Wazuh dashboard
Desvelao Nov 7, 2023
eeeb637
Replace Vulnerabilities with Vulnerability Detection
lucianogorza Nov 7, 2023
06d63dc
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 7, 2023
fd37cc5
Replace Integrity monitoring with File Integrity Monitoring
lucianogorza Nov 7, 2023
cf0129c
fix: minor fixes
Desvelao Nov 7, 2023
42a3fb2
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 7, 2023
e6568a7
fix: renamed API Console to Dev Tools
Desvelao Nov 7, 2023
7f0c899
Replace Amazon AWS with Amazon Web Services
lucianogorza Nov 7, 2023
4e47a76
fix: remove reference to old Modules section on Wazuh dashboard
Desvelao Nov 7, 2023
b8de23e
Fixes
lucianogorza Nov 7, 2023
7c6c1e4
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
lucianogorza Nov 7, 2023
0e12414
Update Settings
lucianogorza Nov 7, 2023
1c3c5ff
Fix uppercase
lucianogorza Nov 7, 2023
2ebe0ac
fix: remove unused screenshots
Desvelao Nov 8, 2023
54f4ac0
fix: minor changes
Desvelao Nov 8, 2023
64b4c68
Resolve conflicts
JuanGarriuz Nov 8, 2023
4ff10eb
fix: references to Endpoints Summary on the Wazuh dashboard
Desvelao Nov 9, 2023
10df4b2
fix: replace references to old menu button and Management category of…
Desvelao Nov 9, 2023
98652fe
Apply suggestions from code review
Desvelao Nov 10, 2023
a696d15
Update source/proof-of-concept-guide/aws-infrastructure-monitoring.rst
Desvelao Nov 10, 2023
aa8ce4b
fix: request changes
Desvelao Nov 10, 2023
4de79e7
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 10, 2023
e5d26ec
fix: minor replacements
Desvelao Nov 10, 2023
405f545
Update overview images
lucianogorza Nov 10, 2023
12606ff
Fix modules overview references
lucianogorza Nov 10, 2023
acb829e
fix: screenshots related to Wazuh dashboard
Desvelao Nov 14, 2023
233c522
fix: missing changes related to Wazuh dashboard
Desvelao Nov 15, 2023
575ad24
fix: replaced reference to Agents page on Wazuh dashboard
Desvelao Nov 15, 2023
5d0bd43
Apply suggestions from code review
Desvelao Nov 15, 2023
71198d0
fix: minor fixes
Desvelao Nov 15, 2023
574fc1d
Merge branch 'enhancement/wdp-5965-add-global-menu-remove-extensions-…
Desvelao Nov 15, 2023
ef02e7c
fix: remove unused images and documentation related to enabling the m…
Desvelao Nov 15, 2023
c02d75a
Merge branch '4.8.0' of https://github.com/wazuh/wazuh-documentation …
Desvelao Nov 15, 2023
5b8e1c7
fix: reference to UI view in Wazuh dashboard
Desvelao Nov 15, 2023
670e849
Merge branch '4.8.0' into enhancement/wdp-5965-add-global-menu-remove…
Desvelao Nov 16, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion source/_themes/wazuh_doc_theme_v3/package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"name": "wazuh-documentation",
"version": "3.0.0",
"description": "Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.",
"description": "Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, file integrity monitoring, incident response and compliance.",
"main": "index.html",
"watch": {
"build": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -270,23 +270,13 @@ Enabling dashboard visualization
You can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

.. thumbnail:: /images/aws/aws-dashboard.png
:title: Amazon AWS dashboard
:alt: Amazon AWS dashboard
:title: Amazon Web Services dashboard
:alt: Amazon Web Services dashboard
:align: center
:width: 80%

.. thumbnail:: /images/aws/aws-events.png
:title: Amazon AWS events
:alt: Amazon AWS events
:title: Amazon Web Services events
:alt: Amazon Web Services events
:align: center
:width: 80%

To activate the **Amazon AWS** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **Amazon AWS** module as shown in the image below.

.. thumbnail:: /images/aws/aws-module.png
:title: Amazon AWS module
:alt: Amazon AWS module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.
:width: 80%
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ Policy configuration
Wazuh configuration
-------------------

#. Access the Wazuh configuration in **Wazuh** > **Management** > **Configuration** using the Wazuh UI or by manually editing the ``/var/ossec/etc/ossec.conf`` file in the host:
#. Access the Wazuh configuration in **Settings** using the Wazuh UI or by manually editing the ``/var/ossec/etc/ossec.conf`` file in the host:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we mean Server management > Settings?


.. thumbnail:: /images/cloud-security/aws/trusted-ui-1.png
:align: center
Expand Down Expand Up @@ -184,7 +184,7 @@ Wazuh configuration
.. include:: /_templates/common/restart_agent.rst


The :ref:`AWS S3 module <wodle_s3>` configuration can be reviewed from **Wazuh** > **Management** > **Configuration** > **Cloud security monitoring** once added in the :ref:`Local configuration <reference_ossec_conf>`.
The :ref:`AWS S3 module <wodle_s3>` configuration can be reviewed from **Settings** > **Cloud security monitoring** once added in the :ref:`Local configuration <reference_ossec_conf>`.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we mean Server management > Settings?


.. thumbnail:: /images/cloud-security/aws/trusted-ui-3.png
:align: center
Expand Down
2 changes: 1 addition & 1 deletion source/cloud-security/amazon/services/troubleshooting.rst
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ The below information is intended to assist in troubleshooting issues.
Checking if the module is running
---------------------------------

When the module runs it writes its output in the ``ossec.log`` file. This log file can be found in ``WAZUH_PATH/logs/ossec.log`` or under **Wazuh** > **Management** > **Logs** if using the Wazuh UI.
When the module runs it writes its output in the ``ossec.log`` file. This log file can be found in ``WAZUH_PATH/logs/ossec.log`` or under **App Logs** if using the Wazuh UI.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we mean Server management > Logs?


It is possible to check if the module is running without issues by looking in the ``ossec.log`` file. These are the messages that are displayed in the ``ossec.log``, depending on how the module has been configured:

Expand Down
27 changes: 0 additions & 27 deletions source/cloud-security/gcp/prerequisites/considerations.rst
Original file line number Diff line number Diff line change
Expand Up @@ -84,30 +84,3 @@ Below there is an example of a configuration that uses more than one bucket:

</gcp-bucket>


Enabling dashboard visualization
--------------------------------

You can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/gcp/gcp-dashboard.png
:title: GCP dashboard
:alt: GCP dashboard
:align: center
:width: 80%

.. thumbnail:: /images/gcp/gcp-events.png
:title: GCP events
:alt: GCP events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **GCP** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **GCP** module as shown in the image below.

.. thumbnail:: /images/gcp/gcp-module.png
:title: GCP module
:alt: GCP module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.
30 changes: 1 addition & 29 deletions source/cloud-security/github/monitoring-github-activity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -138,32 +138,4 @@ If Wazuh successfully connects to GitHub, the events raised above will trigger t
},
"location":"github"
}


Enabling dashboard visualization
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/github/github-dashboard.png
:title: GitHub dashboard
:alt: GitHub dashboard
:align: center
:width: 80%

.. thumbnail:: /images/github/github-events.png
:title: GitHub events
:alt: GitHub events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **GitHub** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **GitHub** module as shown in the image below.

.. thumbnail:: /images/github/github-module.png
:title: GitHub module
:alt: GitHub module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.


29 changes: 0 additions & 29 deletions source/cloud-security/office365/monitoring-office365-activity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -241,32 +241,3 @@ If Wazuh successfully connects to Office 365 API, the events raised above will t
},
"location":"office365"
}


Enabling dashboard visualization
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Once the configuration is complete, you can activate the corresponding Security Information Management module on the Wazuh Dashboard. This module provides additional details and insights about events, as shown in the screenshots below.

.. thumbnail:: /images/office365/office365-dashboard.png
:title: Office 365 dashboard
:alt: Office 365 dashboard
:align: center
:width: 80%

.. thumbnail:: /images/office365/office365-events.png
:title: Office 365 events
:alt: Office 365 events
:align: center
:width: 80%
Desvelao marked this conversation as resolved.
Show resolved Hide resolved

To activate the **Office 365** module, navigate to your Wazuh Dashboard and click on **Wazuh > Settings > Modules**. In the **Security Information Management** section, enable the **Office 365** module as shown in the image below.

.. thumbnail:: /images/office365/office365-module.png
:title: Office 365 module
:alt: Office 365 module
:align: center
:width: 80%

For further information, please refer to the `modules <https://documentation.wazuh.com/current/user-manual/wazuh-dashboard/settings.html#modules>`_ section.

2 changes: 1 addition & 1 deletion source/cloud-service/getting-started/register-agents.rst
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Follow these steps to register an agent:

#. Log into the Wazuh WUI.

#. Click **Wazuh** and then **Agents**.
#. Click **Endpoints Summary**.

#. Click **Deploy a new agent**.

Expand Down
14 changes: 7 additions & 7 deletions source/cloud-service/your-environment/manage-auth.rst
Desvelao marked this conversation as resolved.
Show resolved Hide resolved
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ Follow these steps to create an internal user and map it to its appropriate role

#. :ref:`Log into your WUI <cloud_wui_access>` as administrator.

#. Click the upper-left menu icon **☰** to open the options, select **Security**, and then **Internal users** to open the internal users' page.
#. Click the upper-left menu icon **☰** to open the options, go to **Indexer/dashboard management** > **Security**, and then **Internal users** to open the internal users' page.

#. Click **Create internal user**, complete the empty fields with the requested information, and click **Create** to complete the action.

Expand All @@ -44,7 +44,7 @@ Follow these steps to create an internal user and map it to its appropriate role

#. To map the user with Wazuh, follow these steps:

#. Go to the Wazuh WUI, click **Wazuh** to open the menu, select **Security**, and then **Roles mapping** to open the page.
#. Click the upper-left menu icon **** to open the options, go to **Server management** > **Security**, and then **Roles mapping** to open the page.
#. Click **Create Role mapping** and complete the empty fields with the following parameters:

- **Role mapping name**: Assign a name to the role mapping.
Expand All @@ -61,13 +61,13 @@ Follow these steps to create an internal user, create a new role mapping, and gi

#. :ref:`Log into your WUI <cloud_wui_access>` as administrator.

#. Click the upper-left menu icon **☰** to open the options, select **Security**, and then **Internal users** to open the internal users' page.
#. Click the upper-left menu icon **☰** to open the options, go to **Indexer/dashboard management** > **Security**, and then **Internal users** to open the internal users' page.

#. Click **Create internal user**, complete the empty fields with the requested information, and click **Create** to complete the action.

#. To map the user to the appropriate role, follow these steps:

#. Click the upper-left menu icon **☰** to open the options, select **Security**, and then **Roles** to open the roles page.
#. Click the upper-left menu icon **☰** to open the options, go to **Indexer/dashboard management** > **Security**, and then **Roles** to open the roles page.

#. Search for the **all_access** role in the roles list and select it.

Expand All @@ -83,7 +83,7 @@ Follow these steps to create an internal user, create a new role mapping, and gi

#. To map the user with Wazuh, follow these steps:

#. Go to the Wazuh WUI, click **Wazuh** to open the menu, select **Security**, and then **Roles mapping** to open the page.
#. Click the upper-left menu icon **** to open the options, go to **Server management** > **Security**, and then **Roles mapping** to open the page.
#. Click **Create Role mapping** and complete the empty fields with the following parameters:

- **Role mapping name**: Assign a name to the role mapping.
Expand All @@ -107,7 +107,7 @@ Follow these steps to create an internal user, create a new role mapping, and gi

#. To map the user to the appropriate role, follow these steps:

#. Click the upper-left menu icon **☰** to open the options, select **Security**, and then **Roles** to open the roles page.
#. Click the upper-left menu icon **☰** to open the options, go to **Indexer/dashboard management** > **Security**, and then **Roles** to open the roles page.

#. Click **Create role**, complete the empty fields with the following parameters, and then click **Create** to complete the task.

Expand All @@ -127,7 +127,7 @@ Follow these steps to create an internal user, create a new role mapping, and gi

#. To map the user with Wazuh, follow these steps:

#. Go to the Wazuh WUI, click **Wazuh** to open the menu, select **Security**, and then **Roles mapping** to open the page.
#. Click the upper-left menu icon **** to open the options, go to **Server management** > **Security**, and then **Roles mapping** to open the page.

#. Click **Create Role mapping** and complete the empty fields with the following parameters:

Expand Down
6 changes: 3 additions & 3 deletions source/compliance/gdpr/gdpr-IV.rst
Original file line number Diff line number Diff line change
Expand Up @@ -330,10 +330,10 @@ Ubuntu endpoint
# touch /customers/regular_data.txt
# echo "this is regular data" >> /customers/regular_data.txt

You can see a level 7 alert generated in the **Integrity monitoring** section of the Wazuh dashboard to show that a file in the monitored directory was modified.
You can see a level 7 alert generated in the **File Integrity Monitoring** section of the Wazuh dashboard to show that a file in the monitored directory was modified.

.. thumbnail:: /images/compliance/gdpr/integrity-monitoring-level-7.png
:title: Integrity monitoring level 7 alert visualization
:title: File Integrity Monitoring level 7 alert visualization
:align: center
:width: 80%

Expand All @@ -347,7 +347,7 @@ Ubuntu endpoint
You can see a level 15 alert generated to show that a sensitive file in the monitored directory was modified.

.. thumbnail:: /images/compliance/gdpr/integrity-monitoring-level-15.png
:title: Integrity monitoring level 15 alert visualization
:title: File Integrity Monitoring level 15 alert visualization
:align: center
:width: 80%

Expand Down
4 changes: 2 additions & 2 deletions source/compliance/hipaa/configuration-assessment.rst
Original file line number Diff line number Diff line change
Expand Up @@ -23,10 +23,10 @@ The SCA module can help to implement the following HIPAA sections:
Use cases: SCA scan and SSH session timeout
-------------------------------------------

- In this use case, the SCA module performs periodic scans on an Ubuntu 22.04 endpoint to ensure that it complies with security policies and hardening configurations. Additionally, the SCA module on the Wazuh dashboard displays the status of the SCA checks (passed, failed, or not applicable) and the time of the last scan for a specific endpoint, as shown below:
- In this use case, the SCA module performs periodic scans on an Ubuntu 22.04 endpoint to ensure that it complies with security policies and hardening configurations. Additionally, the **Configuration Assessment** module on the Wazuh dashboard displays the status of the SCA checks (passed, failed, or not applicable) and the time of the last scan for a specific endpoint, as shown below:

.. thumbnail:: /images/compliance/hipaa/02-configuration-assessment.png
:title: The SCA module on the Wazuh dashboard displays the status of the SCA checks
:title: The Configuration Assessment module on the Wazuh dashboard displays the status of the SCA checks
:align: center
:width: 80%

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/hipaa/visualization-and-dashboard.rst
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Visualization and dashboard
===========================

Wazuh offers a web dashboard for data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for security events, compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, and cloud infrastructure monitoring. It’s useful for performing forensic and historical alert analysis.
Wazuh offers a web dashboard for data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for threat hunting, compliance, detected vulnerable applications, file integrity monitoring data, configuration assessment results, and cloud infrastructure monitoring. It’s useful for performing forensic and historical alert analysis.

The Wazuh dashboard assists in meeting the following HIPAA section:

Expand Down
2 changes: 1 addition & 1 deletion source/compliance/nist/configuration-assessment.rst
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ This use case shows how Wazuh helps meet the **CM-6 Configuration settings** req

# systemctl restart wazuh-agent

#. Select the **Security configuration assessment** module on your Wazuh dashboard. SCA scans are enabled by default so you don’t require further configuration actions.
#. Select the **Configuration Assessment** module on your Wazuh dashboard. SCA scans are enabled by default so you don’t require further configuration actions.

.. thumbnail:: /images/compliance/nist/select-sca-module.png
:title: Select the SCA module
Expand Down
6 changes: 3 additions & 3 deletions source/compliance/nist/file-integrity-monitoring.rst
Original file line number Diff line number Diff line change
Expand Up @@ -44,11 +44,11 @@ In this scenario, the Wazuh FIM monitors the SSH configuration file ``/etc/ssh/s

# sed -re 's/^(PasswordAuthentication)([[:space:]]+)no/\1\2yes/' -i.`date -I` /etc/ssh/sshd_config

#. Select the **Integrity monitoring** tab from the Wazuh dashboard. Find the alert triggered by rule ID ``550``. The alert details show that the content of ``/etc/ssh/sshd_config`` has changed. They include the differences in the file checksum, the modification made, the modification time, and other information.
#. Select the **File Integrity Monitoring** module from the Wazuh dashboard. Find the alert triggered by rule ID ``550``. The alert details show that the content of ``/etc/ssh/sshd_config`` has changed. They include the differences in the file checksum, the modification made, the modification time, and other information.

.. thumbnail:: /images/compliance/nist/integrity-monitoring-tab.png
:title: Integrity monitoring tab
:alt: Integrity monitoring tab
:title: File Integrity Monitoring module
:alt: File Integrity Monitoring module
:align: center
:width: 80%

Expand Down
6 changes: 3 additions & 3 deletions source/compliance/nist/malware-detection.rst
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,11 @@ The Wazuh rootcheck module is enabled by default on the Wazuh agent configuratio

$ sudo systemctl restart wazuh-agent

#. Navigate to the **Security events** dashboard. Search for the event with rule ID ``510``.
#. Navigate to the **Threat Hunting** dashboard. Search for the event with rule ID ``510``.

.. thumbnail:: /images/compliance/nist/security-events-dashboard.png
:title: Security events dashboard
:alt: Security events dashboard
:title: Threat Hunting dashboard
:alt: Threat Hunting dashboard
:align: center
:width: 80%

Expand Down
4 changes: 2 additions & 2 deletions source/compliance/nist/visualization-and-dashboard.rst
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Visualization and dashboard
Desvelao marked this conversation as resolved.
Show resolved Hide resolved
===========================

Wazuh offers a web dashboard for continuous data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for: security events, regulatory compliance, detected vulnerable applications, file integrity monitoring, configuration assessment results, and cloud infrastructure monitoring. It helps perform forensic and historical alert analyses.
Wazuh offers a web dashboard for continuous data visualization and analysis. The Wazuh dashboard comes with out-of-the-box modules for: threat hunting, regulatory compliance, detected vulnerable applications, file integrity monitoring, configuration assessment results, and cloud infrastructure monitoring. It helps perform forensic and historical alert analyses.

The :doc:`Wazuh dashboard </getting-started/components/wazuh-dashboard>` assists in meeting the following NIST 800-53 controls:

Expand All @@ -24,7 +24,7 @@ Generate a report of successful authentications

This use case shows how Wazuh helps meet the **CA-7 Continuous monitoring** NIST requirement by providing security reporting to administrators. Use the Wazuh dashboard to generate a report of all successful authentications in the last 24 hours:

#. Go to the Wazuh dashboard menu and select **Discover** under **OpenSearch Dashboards**.
#. Go to the Wazuh dashboard menu and select **Discover** under **Explore**.

.. thumbnail:: /images/compliance/nist/select-discover.png
:title: Select Discover
Expand Down
Loading