agent security skill risk: medium
Wazuh Endpoint Detection Configuration Guide
Provides steps to authenticate to the Wazuh API, list and monitor agents, query security alerts, and test custom decoder and rule logic via the logtest endpoint.
- Policy sensitive
- Human review
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
--- name: implementing-endpoint-detection-with-wazuh description: "Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule" --- # Implementing Endpoint Detection with Wazuh ## Overview Wazuh is an open-source SIEM and XDR platform for endpoint monitoring, threat detection, and compliance. This skill covers managing agents via the Wazuh REST API, creating custom decoders and rules in XML for organization-specific detections, querying alerts, and testing rule logic using the logtest endpoint. ## When to Use - When deploying or configuring implementing endpoint detection with wazuh capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Wazuh Manager 4.x deployed with API enabled - Python 3.9+ with `requests` library - API credentials (username/password for JWT authentication) - Understanding of Wazuh decoder and rule XML syntax ## Steps ### Step 1: Authenticate to Wazuh API Obtain JWT token via POST to /security/user/authenticate. ### Step 2: List and Monitor Agents Query agent status, versions, and last keep-alive via /agents endpoint. ### Step 3: Query Security Alerts Search alerts by rule ID, severity, agent, or time range. ### Step 4: Test Custom Rules with Logtest Use the /logtest endpoint to validate decoder and rule logic against sample log lines. ## Expected Output JSON report with agent inventory, alert statistics, rule coverage, and logtest validation results.
REQUIRED CONTEXT
- Wazuh Manager 4.x with API enabled
- Python 3.9+ and requests library
- API credentials
EXPECTED OUTPUT
- Format
- markdown
- Schema
- json_report · agent inventory, alert statistics, rule coverage, logtest validation results
- Constraints
- include overview, when to use, prerequisites, numbered steps, and expected JSON report output
CAVEATS
- Dependencies
- Wazuh Manager 4.x deployed with API enabled
- Python 3.9+ with `requests` library
- API credentials (username/password for JWT authentication)
- Understanding of Wazuh decoder and rule XML syntax
- Ambiguities
- The 'When to Use' section contains redundant phrasing: 'deploying or configuring implementing endpoint detection with wazuh capabilities'
QUALITY
- OVERALL
- 0.55
- CLARITY
- 0.70
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.35
- COMPLETENESS
- 0.60
IMPROVEMENT SUGGESTIONS
- Fix redundant phrasing in the When to Use section to read cleanly as 'When deploying or configuring endpoint detection with Wazuh capabilities in your environment'
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity