debian
ids
security
siem
tutos
wazuh
xdr
Wazuh sur Debian 12
Installation de Wazuh sur Debian 12 Bookworm.
Composant
Version
Debian
12 Bookworm
Wazuh
4.7+
Durée estimée : 40 minutes
1. Prérequis
apt update
apt install -y curl apt-transport-https gnupg
# Ressources recommandées : 4 CPU, 8 GB RAM, 50 GB disque
2. Installation tout-en-un
curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh
curl -sO https://packages.wazuh.com/4.7/config.yml
cat > config.yml << 'EOF'
nodes:
indexer:
- name: wazuh-indexer
ip: 127.0.0.1
server:
- name: wazuh-server
ip: 127.0.0.1
dashboard:
- name: wazuh-dashboard
ip: 127.0.0.1
EOF
bash wazuh-install.sh -a
3. Installation manuelle
Repository
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | gpg --dearmor > /etc/apt/keyrings/wazuh.gpg
echo "deb [signed-by=/etc/apt/keyrings/wazuh.gpg] https://packages.wazuh.com/4.x/apt/ stable main" > /etc/apt/sources.list.d/wazuh.list
apt update
Installer les composants
# Indexer
apt install -y wazuh-indexer
# Manager
apt install -y wazuh-manager
# Dashboard
apt install -y wazuh-dashboard
systemctl enable --now wazuh-indexer wazuh-manager wazuh-dashboard
4. Firewall
ufw allow 443 /tcp # Dashboard
ufw allow 1514 /tcp # Agent
ufw allow 1515 /tcp # Agent
ufw allow 55000 /tcp # API
ufw reload
5. Accès
URL: https://IP:443
Credentials dans /etc/wazuh-install-files/wazuh-passwords.txt
6. Installer un agent Debian
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | gpg --dearmor > /etc/apt/keyrings/wazuh.gpg
echo "deb [signed-by=/etc/apt/keyrings/wazuh.gpg] https://packages.wazuh.com/4.x/apt/ stable main" > /etc/apt/sources.list.d/wazuh.list
apt update
WAZUH_MANAGER = "wazuh.example.com" apt install -y wazuh-agent
systemctl daemon-reload
systemctl enable --now wazuh-agent
7. File Integrity Monitoring
<!-- /var/ossec/etc/ossec.conf -->
<syscheck>
<disabled> no</disabled>
<frequency> 43200</frequency>
<directories check_all= "yes" realtime= "yes" > /etc</directories>
<directories check_all= "yes" realtime= "yes" > /usr/bin</directories>
<directories check_all= "yes" realtime= "yes" > /bin</directories>
<ignore> /etc/mtab</ignore>
</syscheck>
8. Vulnerability Detection
<!-- /var/ossec/etc/ossec.conf sur manager -->
<vulnerability-detector>
<enabled> yes</enabled>
<interval> 5m</interval>
<provider name= "nvd" >
<enabled> yes</enabled>
</provider>
<provider name= "debian" >
<enabled> yes</enabled>
</provider>
</vulnerability-detector>
9. Active Response
<active-response>
<command> firewall-drop</command>
<location> local</location>
<rules_id> 5710,5712</rules_id>
<timeout> 3600</timeout>
</active-response>
Comparatif Rocky vs Debian
Aspect
Rocky 9
Debian 12
Package manager
dnf
apt
Firewall
firewalld
ufw
SELinux
Oui
AppArmor
Commandes
# Status
systemctl status wazuh-manager wazuh-indexer wazuh-dashboard
# Logs
tail -f /var/ossec/logs/ossec.log
# Agents
/var/ossec/bin/agent_control -l
# Test règles
/var/ossec/bin/wazuh-logtest
Changelog
Date
Modification
2024-12
Création initiale