강의

멘토링

로드맵

Security & Network

/

Computer Security

[Security] Building and Operating a Threat Hunting System Using Wazuh+ELK (SIEM) (Basic)

[Training for Security Experts] Master how to build and operate an optimized threat hunting system by combining Wazuh and the ELK stack. Upgrade your security skills with strategies and hands-on exercises that can be applied directly in the field!

(4.9) 8 reviews

140 learners

Level Basic

Course period Unlimited

  • zeromini
security
security
Linux
Linux
Microsoft Windows
Microsoft Windows
ossec
ossec
wazuh
wazuh
security
security
Linux
Linux
Microsoft Windows
Microsoft Windows
ossec
ossec
wazuh
wazuh

Windows threat hunting is possible by linking Chainsaw + Sigma Rule + Wazuh.

Hello, this is Zeromini

Please refer to the blog below to effectively perform threat hunting using the basic rules provided by Wazuh + Chainsaw + SigmaRule, and check the results in ELK through Wazuh Agent.

https://socfortress.medium.com/wazuh-and-chainsaw-integration-for-near-real-time-sigma-detection-6f3e729e892

Comment