Overview
Wazuh Dashboard Plugins provide a comprehensive suite of security modules organized into logical categories. Each module offers specialized dashboards, real-time monitoring, and detailed analytics for different aspects of security operations.Module Categories
Modules are organized into categories that align with security operations workflows:Endpoint Security
Protection and monitoring for endpoints including malware detection, FIM, and configuration assessment
Threat Intelligence
Advanced threat detection using MITRE ATT&CK, vulnerability scanning, and malware detection
Security Operations
Compliance frameworks (PCI DSS, GDPR, HIPAA, NIST), audit, and policy monitoring
Cloud Security
Multi-cloud monitoring for AWS, Azure, GCP, Office 365, and GitHub
Agent Management
Deploy, configure, and monitor Wazuh agents across your infrastructure
Server Management
Configure rules, decoders, groups, and manage cluster operations
Endpoint Security Modules
Configuration Assessment (SCA)
Module ID:configuration-assessmentCategory: Endpoint Security
Order: 200
- Overview
- Use Cases
- Implementation
Security Configuration Assessment (SCA) performs automated audits of system configurations against security benchmarks and best practices.Key Features:
- CIS benchmark compliance checks
- Custom policy definition support
- Policy compliance scoring
- Failed check remediation guidance
- Historical compliance trends
wazuh-states-sca*Malware Detection
Module ID:malware-detectionCategory: Endpoint Security
Order: 201
- Overview
- Alert Types
Detects and analyzes malware infections through multiple detection engines including signature-based, behavioral, and integration with VirusTotal.Detection Methods:
- File integrity monitoring anomalies
- Rootcheck detection
- VirusTotal integration
- YARA rule matching
- Behavioral analysis
wazuh-events* (filtered by malware detection rules)File Integrity Monitoring (FIM)
Module ID:file-integrity-monitoringCategory: Endpoint Security
Order: 202
- Overview
- Dashboards
- Implementation
Monitors file system changes in real-time to detect unauthorized modifications, additions, or deletions.Monitored Attributes:
- File content (hash)
- Permissions and ownership
- Size and timestamps
- Windows registry keys and values (Windows)
- File attributes and ACLs
wazuh-states-fim-files*- File stateswazuh-states-fim-registry-keys*- Registry keys (Windows)wazuh-states-fim-registry-values*- Registry values (Windows)
Threat Intelligence Modules
Vulnerability Detection
Module ID:vulnerabilitiesCategory: Threat Intelligence
Order: 300
CVE Database Integration: Continuously updated vulnerability database correlates installed packages with known CVEs.
- Overview
- Metrics
- Index Pattern
Identifies vulnerabilities in installed software packages by correlating with CVE databases.Features:
- Automated vulnerability scanning
- CVE severity scoring (CVSS)
- Affected package identification
- Patch availability tracking
- Vulnerability trending
wazuh-states-vulnerabilities*MITRE ATT&CK
Module ID:mitre-attackCategory: Threat Intelligence
Order: 301 Maps detected security events to the MITRE ATT&CK framework for threat intelligence and attack pattern analysis. Framework Coverage:
- Tactics: High-level adversary goals (Initial Access, Execution, Persistence, etc.)
- Techniques: Methods to achieve tactical goals
- Mitigations: Recommended countermeasures
- Kill Chain Analysis: Attack progression visualization
wazuh-events* (events tagged with MITRE ATT&CK IDs)
Docker Security
Module ID:dockerCategory: Threat Intelligence
Order: 302 Monitors Docker containers and hosts for security events and configuration issues. Monitoring Capabilities:
- Container lifecycle events
- Image vulnerability scanning
- Network activity monitoring
- Resource usage anomalies
- Docker daemon security events
Security Operations Modules
Regulatory Compliance
Multiple compliance framework modules help organizations meet regulatory requirements:PCI DSS
PCI DSS
Module ID:
Standard: Payment Card Industry Data Security StandardCoverage:
pci-dssStandard: Payment Card Industry Data Security StandardCoverage:
- 12 requirements mapping
- Cardholder data protection
- Network security controls
- Access control measures
- Security testing procedures
GDPR
GDPR
Module ID:
Regulation: General Data Protection RegulationCoverage:
gdprRegulation: General Data Protection RegulationCoverage:
- Data processing activities
- User consent tracking
- Data subject rights
- Breach notification
- Privacy by design
HIPAA
HIPAA
Module ID:
Standard: Health Insurance Portability and Accountability ActCoverage:
hipaaStandard: Health Insurance Portability and Accountability ActCoverage:
- PHI access controls
- Audit trail requirements
- Integrity controls
- Transmission security
- Administrative safeguards
NIST 800-53
NIST 800-53
Module ID:
Framework: NIST Special Publication 800-53Coverage:
nist-800-53Framework: NIST Special Publication 800-53Coverage:
- 18 control families
- Risk management framework
- Security control assessment
- Continuous monitoring
- Authorization processes
TSC
TSC
Module ID:
Standard: Trust Services CriteriaCoverage:
tscStandard: Trust Services CriteriaCoverage:
- Security (CC6)
- Availability (A1)
- Processing integrity (PI1)
- Confidentiality (C1)
- Privacy (P1-P8)
Audit and Policy Monitoring
Module ID:policy-monitoringCategory: Security Operations Monitors system audit logs and enforces security policies. Capabilities:
- Linux audit system integration
- Windows audit policy monitoring
- Policy violation detection
- User activity auditing
- Privileged command tracking
Cloud Security Modules
Amazon Web Services (AWS)
Module ID:awsCategory: Cloud Security
Order: 500
- Services Monitored
- Dashboard Metrics
- Data Source
- CloudTrail: API activity and governance
- GuardDuty: Threat detection findings
- IAM: Identity and access management events
- VPC Flow Logs: Network traffic analysis
- Config: Resource configuration changes
- WAF: Web application firewall events
- Inspector: Vulnerability assessment findings
Microsoft Azure
Module ID:azureCategory: Cloud Security
Order: 501 Integration Points:
- Azure Active Directory logs
- Azure Security Center alerts
- Activity logs
- Resource health events
- Policy compliance data
Google Cloud Platform (GCP)
Module ID:google-cloudCategory: Cloud Security
Order: 502 Monitoring:
- Cloud Audit Logs
- Security Command Center
- IAM policy changes
- Compute Engine events
- Cloud Storage access
Office 365
Module ID:office-365Category: Cloud Security
Order: 503 Tracked Activities:
- Exchange mailbox access
- SharePoint file operations
- Azure AD sign-ins
- Teams activity
- OneDrive file sharing
GitHub
Module ID:githubCategory: Cloud Security
Order: 504 Monitored Events:
- Repository creation/deletion
- Branch protection changes
- Webhook configurations
- Organization membership
- Security alerts
IT Hygiene (Inventory) Module
Module ID:it-hygieneCategory: Endpoint Security
Order: 203
IT Hygiene provides comprehensive visibility into system inventories and configurations across your infrastructure.
Inventory Categories
The IT Hygiene module tracks multiple inventory types:- System Inventories
- Network Inventories
- Package Inventories
- User Inventories
- Process & Service Inventories
System Information:
- OS details and versions
- Hostname and architecture
- Kernel information
- CPU details
- Memory (total, free, used, usage %)
- Board manufacturer and serial
wazuh-states-inventory-system*wazuh-states-inventory-hardware*
Field Formatting
IT Hygiene applies special formatting to inventory fields:Module Organization
Application Order Convention
From the source code documentation:Module Visibility
Each module defines where it appears:Event Categorization
Events are categorized into specialized index patterns for optimized querying:System Activity
wazuh-events-v5-system-activity*Process execution, system calls, kernel eventsSecurity Events
wazuh-events-v5-security*Authentication, authorization, security violationsAccess Management
wazuh-events-v5-access-management*User authentication, authorization, access controlApplications
wazuh-events-v5-applications*Application-specific events and logsNetwork Activity
wazuh-events-v5-network-activity*Network connections, traffic, firewall eventsOther Events
wazuh-events-v5-other*Uncategorized or miscellaneous eventsModule Constants
Fromconstants.ts:507-526:
Dashboard Architecture
Each module typically provides:- Overview Dashboard: High-level metrics and trends
- Events Dashboard: Real-time event stream and filtering
- Inventory Dashboard: Current state data (where applicable)
- Agent-Specific Views: Per-agent details and metrics
Data Source Filters
Modules apply controlled filters to focus on relevant data:Related Pages
Architecture
System architecture and component overview
Data Sources
Index patterns and data organization details
Plugin System
Plugin lifecycle and development
API Reference
Module APIs and interfaces