<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Syed Abdul kani P M K</title>
    <description>The latest articles on DEV Community by Syed Abdul kani P M K (@syed_abdul_kani_pmk).</description>
    <link>https://dev.to/syed_abdul_kani_pmk</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3912826%2F5ec10e49-d323-4f8f-a3ba-438f88dcde4d.jpg</url>
      <title>DEV Community: Syed Abdul kani P M K</title>
      <link>https://dev.to/syed_abdul_kani_pmk</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/syed_abdul_kani_pmk"/>
    <language>en</language>
    <item>
      <title>Wazuh All-in-One: Your First Step to Smarter Threat Detection (No, Really)</title>
      <dc:creator>Syed Abdul kani P M K</dc:creator>
      <pubDate>Mon, 04 May 2026 23:42:24 +0000</pubDate>
      <link>https://dev.to/syed_abdul_kani_pmk/wazuh-all-in-one-your-first-step-to-smarter-threat-detection-no-really-47ib</link>
      <guid>https://dev.to/syed_abdul_kani_pmk/wazuh-all-in-one-your-first-step-to-smarter-threat-detection-no-really-47ib</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;📂 &lt;em&gt;Series: SIEM Deployment&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Alright, let's talk shop. After over a decade in the trenches – from building out SOCs from scratch to wrangling SIEMs like Splunk, QRadar, and Microsoft Sentinel in some seriously high-stakes environments – I've seen a lot of tools come and go. Some are brilliant, some are overhyped, and some just… work. Wazuh falls firmly into that last category, with a generous helping of "brilliant" thrown in, especially when you consider its open-source nature.&lt;/p&gt;

&lt;p&gt;I've been in situations where the budget was tighter than a drum, but the need for deep host visibility, file integrity monitoring (FIM), and security configuration assessment (SCA) was absolutely critical. That's where Wazuh shines. It's not just a log aggregator; it’s a full-blown host intrusion detection system (HIDS) that can give you insights into endpoint activity that even some commercial EDRs struggle to match without a hefty price tag.&lt;/p&gt;

&lt;p&gt;Today, I want to walk you through deploying Wazuh using its all-in-one (AIO) model. Why AIO? Because it's the fastest, most straightforward way to get Wazuh up and running, especially if you're experimenting, running a small environment, or just need a proof-of-concept. Think of it as your express lane to understanding what this powerful platform can do. We're going to cut through the fluff, use actual commands, and I'll tell you &lt;em&gt;why&lt;/em&gt; we're doing each step, not just &lt;em&gt;what&lt;/em&gt;. This isn't some generic AI-generated guide; this is how I'd do it, and how I've advised countless junior engineers to do it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Wazuh? And Why All-in-One for Starters?
&lt;/h2&gt;

&lt;p&gt;Let's be clear: Wazuh isn't going to replace your Splunk Enterprise Security or your CrowdStrike Falcon. It's a different beast, but a foundational one. While those high-end platforms excel at enterprise-wide visibility, threat hunting across massive datasets, and automated response, Wazuh digs deep into the host. It gives you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Host Intrusion Detection (HIDS):&lt;/strong&gt; Real-time monitoring for system calls, unauthorized access attempts, and suspicious processes.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;File Integrity Monitoring (FIM):&lt;/strong&gt; Tracks changes to critical system files, configuration files, and registry entries. This is gold for detecting backdoor installations or unauthorized modifications.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Security Configuration Assessment (SCA):&lt;/strong&gt; Checks your hosts against known benchmarks (like CIS or NIST) to identify misconfigurations. Believe me, misconfigurations are often the easiest entry points for attackers.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Vulnerability Detection:&lt;/strong&gt; Scans for known vulnerabilities on your endpoints.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Log Data Analysis:&lt;/strong&gt; Collects, aggregates, and analyzes logs from operating systems and applications. This is where it starts to feel a bit like a mini-SIEM for your endpoints.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, why Wazuh over, say, just shipping everything to a central SIEM? Because Wazuh processes and correlates much of this data at the endpoint and manager level before it even hits your SIEM (if you choose to integrate it later). This reduces noise, enriches alerts, and provides context that raw logs often lack. For organizations that are cost-conscious, or small to medium-sized businesses (SMBs) that need robust security without a seven-figure budget, Wazuh is, honestly, my go-to recommendation for deep endpoint visibility. It's a fantastic open-source alternative that punches way above its weight class.&lt;/p&gt;

&lt;p&gt;Now, about the &lt;strong&gt;All-in-One (AIO) deployment&lt;/strong&gt;. The official Wazuh documentation offers distributed deployments, which are essential for scaling to hundreds or thousands of agents. But for learning, testing, or even protecting a handful of critical servers, AIO is perfect. It bundles the Wazuh Manager, the Elastic Stack (Elasticsearch, Kibana), and Filebeat onto a single server. This means less infrastructure to manage, fewer network ports to open, and a much faster path to seeing data. You get the full Wazuh experience without the complexity of setting up a multi-node Elasticsearch cluster right out of the gate. Plus, once you're comfortable, migrating to a distributed setup isn't nearly as daunting as starting there.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Battle Plan: Preparing Your Server
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimages.unsplash.com%2Fphoto-1751448555253-f39c06e29d82%3Fcrop%3Dentropy%26cs%3Dtinysrgb%26fit%3Dmax%26fm%3Djpg%26ixid%3DM3w5NDI2OTl8MHwxfHNlYXJjaHwxfHxjeWJlciUyMHNlY3VyaXR5JTIwZGFzaGJvYXJkfGVufDF8MHx8fDE3Nzc5MzgxNDN8MA%26ixlib%3Drb-4.1.0%26q%3D80%26w%3D1080" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimages.unsplash.com%2Fphoto-1751448555253-f39c06e29d82%3Fcrop%3Dentropy%26cs%3Dtinysrgb%26fit%3Dmax%26fm%3Djpg%26ixid%3DM3w5NDI2OTl8MHwxfHNlYXJjaHwxfHxjeWJlciUyMHNlY3VyaXR5JTIwZGFzaGJvYXJkfGVufDF8MHx8fDE3Nzc5MzgxNDN8MA%26ixlib%3Drb-4.1.0%26q%3D80%26w%3D1080" alt="A security and privacy dashboard with its status." width="1080" height="720"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Photo by &lt;a href="https://unsplash.com" rel="noopener noreferrer"&gt;Zulfugar Karimov&lt;/a&gt; on Unsplash&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Before we even think about running an installer, we need a solid foundation. Don't skip this part; proper preparation saves hours of troubleshooting later. I've wasted too many nights debugging issues that boiled down to insufficient resources or a firewall blocking a critical port.&lt;/p&gt;

&lt;p&gt;For this AIO deployment, you'll need a dedicated server. I'm going to assume you're using a fresh installation of &lt;strong&gt;Ubuntu Server 20.04/22.04 LTS&lt;/strong&gt; or &lt;strong&gt;CentOS 7/8 Stream&lt;/strong&gt;. My examples will lean towards Ubuntu, but the concepts apply universally.&lt;/p&gt;
&lt;h3&gt;
  
  
  Server Specifications:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;CPU:&lt;/strong&gt; At least 4 cores. 8 is better if you plan on more than 10-20 agents.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;RAM:&lt;/strong&gt; Minimum 8GB. 16GB is highly recommended, especially since Elasticsearch loves RAM.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Storage:&lt;/strong&gt; At least 50GB, preferably 100GB+ SSD. Log data can grow quickly.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Network Considerations:
&lt;/h3&gt;

&lt;p&gt;Make sure your server can access the internet to download packages. Crucially, you'll need to allow inbound connections to the following ports:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;TCP 55000:&lt;/strong&gt; For Wazuh agents to register and communicate with the manager.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;TCP 443:&lt;/strong&gt; For accessing the Wazuh web interface (Kibana).&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;TCP 514/UDP 514:&lt;/strong&gt; If you plan on forwarding syslog from other devices to Wazuh. (Not strictly needed for AIO core functionality, but good to keep in mind).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Essential Pre-installation Steps:
&lt;/h3&gt;

&lt;p&gt;First things first, update your system. This ensures you have the latest security patches and package versions, preventing potential conflicts.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# For Ubuntu/Debian-based systems&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;apt update &lt;span class="nt"&gt;-y&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; &lt;span class="nb"&gt;sudo &lt;/span&gt;apt upgrade &lt;span class="nt"&gt;-y&lt;/span&gt;

&lt;span class="c"&gt;# For CentOS/RHEL-based systems&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;yum update &lt;span class="nt"&gt;-y&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; Always start with a clean, updated slate. It's like checking your gear before a mission – you don't want surprises.&lt;/p&gt;

&lt;p&gt;Next, we need some common utilities that the installer (or you) might use. &lt;code&gt;wget&lt;/code&gt; and &lt;code&gt;curl&lt;/code&gt; are for downloading, &lt;code&gt;vim&lt;/code&gt; (my personal preference, though &lt;code&gt;nano&lt;/code&gt; is fine too) is for editing config files if needed.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# For Ubuntu/Debian-based systems&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;apt &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-y&lt;/span&gt; curl wget vim

&lt;span class="c"&gt;# For CentOS/RHEL-based systems&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;yum &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-y&lt;/span&gt; curl wget vim
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; These are your basic toolkit. You'd be surprised how often a barebones server lacks them.&lt;/p&gt;

&lt;p&gt;Now, this next part is critical for a smooth installation, but comes with a huge &lt;em&gt;caveat&lt;/em&gt;. For a proof-of-concept or a test environment, temporarily disabling the firewall and SELinux (on CentOS/RHEL) simplifies things immensely. &lt;strong&gt;HOWEVER, for &lt;em&gt;any&lt;/em&gt; production environment, you &lt;em&gt;must&lt;/em&gt; properly configure your firewall rules and SELinux policies instead of disabling them.&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# --- Firewall Configuration (Ubuntu) ---&lt;/span&gt;
&lt;span class="c"&gt;# Check firewall status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;ufw status

&lt;span class="c"&gt;# If active, allow necessary ports (55000 for agents, 443 for web UI)&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;ufw allow 55000/tcp
&lt;span class="nb"&gt;sudo &lt;/span&gt;ufw allow 443/tcp

&lt;span class="c"&gt;# If you need to disable for testing (AGAIN, NOT FOR PROD!)&lt;/span&gt;
&lt;span class="c"&gt;# sudo ufw disable&lt;/span&gt;

&lt;span class="c"&gt;# --- Firewall Configuration (CentOS/RHEL) ---&lt;/span&gt;
&lt;span class="c"&gt;# Check firewall status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;systemctl status firewalld

&lt;span class="c"&gt;# If active, allow necessary ports&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;firewall-cmd &lt;span class="nt"&gt;--add-port&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;55000/tcp &lt;span class="nt"&gt;--permanent&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;firewall-cmd &lt;span class="nt"&gt;--add-port&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;443/tcp &lt;span class="nt"&gt;--permanent&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;firewall-cmd &lt;span class="nt"&gt;--reload&lt;/span&gt;

&lt;span class="c"&gt;# If you need to disable for testing (AGAIN, NOT FOR PROD!)&lt;/span&gt;
&lt;span class="c"&gt;# sudo systemctl stop firewalld&lt;/span&gt;
&lt;span class="c"&gt;# sudo systemctl disable firewalld&lt;/span&gt;

&lt;span class="c"&gt;# --- SELinux Configuration (CentOS/RHEL) ---&lt;/span&gt;
&lt;span class="c"&gt;# Check SELinux status&lt;/span&gt;
sestatus

&lt;span class="c"&gt;# If enforcing, set to permissive for testing (NOT FOR PROD!)&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;setenforce 0
&lt;span class="nb"&gt;sudo sed&lt;/span&gt; &lt;span class="nt"&gt;-i&lt;/span&gt; &lt;span class="s1"&gt;'s/SELINUX=enforcing/SELINUX=permissive/g'&lt;/span&gt; /etc/selinux/config

&lt;span class="c"&gt;# Reboot might be required for /etc/selinux/config changes to take full effect,&lt;/span&gt;
&lt;span class="c"&gt;# but 'setenforce 0' applies immediately.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; Firewalls and SELinux are security features that can prevent Wazuh components from communicating. For a quick AIO deployment, temporarily relaxing them helps confirm the Wazuh components themselves are working. Once confirmed, &lt;em&gt;re-enable them and configure specific rules&lt;/em&gt;. Failing to do so is a common mistake that leaves systems vulnerable. I've seen teams spend days chasing a "bug" that was just a forgotten firewall rule.&lt;/p&gt;

&lt;h2&gt;
  
  
  Deploying Wazuh All-in-One: Step-by-Step
&lt;/h2&gt;

&lt;p&gt;Now that our server is prepped, the actual deployment is surprisingly simple thanks to Wazuh's official installation script.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Download the Wazuh Installation Script:&lt;/strong&gt;&lt;br&gt;
We'll download the latest AIO installer script directly from the Wazuh GitHub repository. Always check the official documentation for the absolute latest version, but this pattern is generally stable.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Download the Wazuh installation script&lt;/span&gt;
curl &lt;span class="nt"&gt;-sO&lt;/span&gt; https://raw.githubusercontent.com/wazuh/wazuh-documentation/master/resources/create_wazuh_cluster.sh
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; This script automates the installation and configuration of all necessary components: Elasticsearch, Filebeat, Kibana, and the Wazuh Manager. It saves you from manually installing and configuring each one, which is a significant time-saver and reduces human error.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Make the Script Executable:&lt;/strong&gt;&lt;br&gt;
Downloaded scripts aren't executable by default for security reasons. We need to grant it execution permissions.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;chmod&lt;/span&gt; +x create_wazuh_cluster.sh
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; Without execute permissions, your system won't allow you to run the script.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Run the Installer Script:&lt;/strong&gt;&lt;br&gt;
Now, execute the script. We'll use the &lt;code&gt;-a&lt;/code&gt; flag to specify an All-in-One deployment.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; ./create_wazuh_cluster.sh &lt;span class="nt"&gt;-a&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; The &lt;code&gt;-a&lt;/code&gt; flag tells the script to perform an all-in-one installation. The &lt;code&gt;sudo&lt;/code&gt; is necessary because the script will be installing packages, creating users, and modifying system configurations. This process will take some time, typically 15-30 minutes, depending on your internet speed and server resources. It will download a lot of packages, install Java (for Elasticsearch), set up repositories, and configure services. Let it run.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A quick note on a common mistake:&lt;/em&gt; During this process, or immediately after, many teams forget to check the logs. If something goes wrong, the output on your terminal might scroll past too fast. The &lt;code&gt;create_wazuh_cluster.sh&lt;/code&gt; script is usually pretty good about logging its steps, but always, &lt;em&gt;always&lt;/em&gt; know where to look if something breaks. For system services, &lt;code&gt;journalctl -xe&lt;/code&gt; is your best friend. For Wazuh manager specific issues, check &lt;code&gt;/var/ossec/logs/ossec.log&lt;/code&gt;. For Elasticsearch and Kibana, their logs are usually in &lt;code&gt;/var/log/elasticsearch&lt;/code&gt; and &lt;code&gt;/var/log/kibana&lt;/code&gt; respectively. Don't just stare blankly at a failed installation; dive into the logs!&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Verify Services Status:&lt;/strong&gt;&lt;br&gt;
Once the script completes, it's crucial to verify that all components are running correctly.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Check Wazuh Manager status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;systemctl status wazuh-manager

&lt;span class="c"&gt;# Check Elasticsearch status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;systemctl status elasticsearch

&lt;span class="c"&gt;# Check Kibana status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;systemctl status kibana

&lt;span class="c"&gt;# Check Filebeat status&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;systemctl status filebeat
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;&lt;strong&gt;Why:&lt;/strong&gt; This confirms that the installation was successful and all the critical services for Wazuh, its data store (Elasticsearch), its visualization layer (Kibana), and its log shipper (Filebeat, which sends Wazuh alerts to Elasticsearch) are operational. You should see "active (running)" for all of them.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What's Next? Your First Agent and Basic Checks
&lt;/h2&gt;

&lt;p&gt;With Wazuh Manager and its components humming along, the next step is to get some data in. This means deploying an agent to a target machine. For simplicity, let's assume you're deploying to a Linux machine (Ubuntu, CentOS, etc.).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access the Wazuh UI:&lt;/strong&gt;&lt;br&gt;
Open your web browser and navigate to &lt;code&gt;https://YOUR_WAZUH_SERVER_IP&lt;/code&gt;. You'll likely encounter a certificate warning (since it's a self-signed cert). Accept it.&lt;br&gt;
The default credentials are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Username:&lt;/strong&gt; &lt;code&gt;admin&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Password:&lt;/strong&gt; &lt;code&gt;admin&lt;/code&gt; (You should absolutely change this immediately in a production environment!)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once logged in, you'll see the Wazuh dashboard. It might look a bit empty, which is expected – we haven't added any agents yet!&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Enroll Your First Agent:&lt;/strong&gt;&lt;br&gt;
From the Wazuh UI, navigate to &lt;strong&gt;Wazuh &amp;gt; Agents &amp;gt; Deploy new agent&lt;/strong&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Select your operating system (e.g., "Linux").&lt;/li&gt;
&lt;li&gt;  Choose your architecture.&lt;/li&gt;
&lt;li&gt;  Select "Wazuh Manager"&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;em&gt;Cover photo by &lt;a href="https://unsplash.com/@imgix" rel="noopener noreferrer"&gt;imgix&lt;/a&gt; on &lt;a href="https://unsplash.com" rel="noopener noreferrer"&gt;Unsplash&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>siem</category>
    </item>
  </channel>
</rss>
