Capabilities
In this section you will find:
A detailed explanation of how each capability works.
The configuration options for specific capabilities.
Frequently asked questions.
Some practical examples.
- Log data collection
- File integrity monitoring
- Auditing who-data
- Anomaly and malware detection
- Security Configuration Assessment
- Monitoring security policies
- Monitoring system calls
- Command monitoring
- Active response
- Agentless monitoring
- Anti-flooding mechanism
- Agent labels
- System inventory
- Vulnerability detection
- VirusTotal integration
- Osquery
- Agent key polling
- Fluentd forwarder
- Wazuh-Logtest