What is an XDR agent?

Agent features

Threat Hunting

Wazuh maps detected events to the relevant adversary tactics and techniques. It also ingests third-party threat intelligence data that allows an analyst to create custom queries to filter events and aid threat hunting.

Behavioral analysis

Wazuh allows an analyst to detect and respond to threats based on unusual behavior patterns. The Wazuh behavioral analysis capabilities involve using advanced analytics to identify deviations from normal behavior, which may indicate potential security threats. These capabilities include monitoring file integrity, network traffic, user behavior, and anomalies in system performance metrics.

Compliance & reporting

Meet enterprise compliance requirements, generate reports, and demonstrate the effectiveness of your security posture. Wazuh performs regulatory compliance checks against regulations and security standards, such as PCI-DSS, HIPAA, GDPR, and more.

Threat intelligence

Wazuh incorporates threat intelligence feeds to detect and respond to known threats. It integrates with threat intelligence sources, including open source intelligence (OSINT), commercial feeds, and user-contributed data to provide up-to-date information on potential threats.

Automated response

Reduce the average response time to incidents with the Wazuh active response module. Wazuh automatically responds to threats to mitigate the potential impact on your systems. An analyst can use the built-in response actions or create custom actions according to an incident response plan.

Fully open source

Wazuh, as an open-source XDR platform, provides several key benefits. Its open-source nature allows for complete transparency, ensuring that the service provider has thoroughly vetted the code, eliminating the risk of running any suspicious or insecure components. This reassures you that due diligence has been conducted. Wazuh is also highly customizable, allowing us to adapt it to specific requirements and maintain control over their security operations. With strong community support and broad integration capabilities, Wazuh enables us to create a comprehensive and reliable security ecosystem for our clients.

Better than an Anti-virus

Advantages

Why it’s more secure than just a traditional Anti virus solution

Using an Extended Detection and Response (XDR) system in combination with antivirus software for endpoint protection is crucial because antivirus alone often misses advanced threats, so you often wouldn’t even know something happened. Fileless malware, for example, bypasses traditional antivirus software by operating within the system’s memory or legitimate applications. In 2020, fileless malware attacks surged by 900%, illustrating how sophisticated attackers have become. They exploit trusted system tools like PowerShell, making it difficult for antivirus programs to detect these threats. Furthermore, fileless attacks accounted for 38% of all endpoint attacks in 2019​, underscoring the limitations of antivirus software, which primarily focuses on signature-based detection.

XDR solutions address these gaps by offering real-time monitoring, behavioral analysis, and broader threat intelligence, enabling detection of advanced, stealthy attacks. This layered approach strengthens endpoint defenses, catching threats that antivirus alone would overlook.

Common attacks

Threat statistics & mitigation

Phishing (~35% of attacks)

Wazuh can monitor logs and analyze data for suspicious activities related to phishing attempts. For example, it can detect unusual login attempts or malicious website queries.

Malware (~25% of attacks)

Wazuh can perform file integrity monitoring and check for changes in system files and configurations that may indicate malware presence. It can also analyze logs from antivirus tools and detect suspicious behaviors or anomalies. At the same time, alerting administrators to potential malware infections, allowing for rapid response and remediation. It can also integrate with endpoint protection solutions to enhance overall defense.

Ransomware (~25% of attacks)

Wazuh can alert and respond on unusual file modifications or encryptions that may suggest ransomware activity. It can also analyze logs for signs of known ransomware behaviors or indicators of compromise (IoCs). Early detection of ransomware activity allows for quicker response to isolate affected systems, preventing further encryption of files and reducing the impact of the attack.

DoS attacks (~10% of attacks)

Wazuh can monitor network traffic and system logs for patterns indicative of DoS/DDoS attacks, such as unusual traffic spikes or high resource usage. With this knowledge, an analyst can provide you information on how to mitigate such attacks according to your situation.

MitM attacks (~5% of attacks)

Wazuh can monitor network traffic and logs on the endpoint for signs of abnormal activities, such as unauthorized access or traffic interception attempts. It can also check for anomalies in SSL/TLS configurations and certificate changes. Wazuh can also alert administrators to potential man-in-the-middle attacks, enabling them to investigate and address vulnerabilities.