This repository contains templates, configurations, and rules for the Wazuh SIEM platform and similar systems.
The goal is to provide the community with a structured collection of ready-to-use configurations that make deployment, management, and security event detection easier.
SIEM (Security Information and Event Management) is a solution that collects, analyzes, and correlates security-related data from multiple sources in real time.
It helps detect, investigate, and respond to security incidents while meeting compliance requirements such as:
- GDPR (General Data Protection Regulation)
- NIS2 Directive for network and information security
- ISO/IEC 27001 information security standards
- Industry-specific regulations (e.g., PCI-DSS, HIPAA)
A SIEM system is essential for organizations that need to maintain visibility into their IT environment, respond quickly to threats, and demonstrate compliance to auditors.
Wazuh is an open-source SIEM platform built on top of the Elastic Stack (Elasticsearch, Logstash, Kibana).
This means it benefits from Elasticsearch's high-performance search and analytics capabilities, Logstash's data processing, and Kibana's visualization tools.
Wazuh extends these core technologies with advanced security monitoring, intrusion detection, log analysis, and compliance management features.
rules/
– Custom and modified rules for incident detection.decoders/
– Custom decoders for specific log formats.alerts/
– Examples and recommendations for alert settings.dashboards/
– Visualization panels for Kibana/OpenSearch Dashboards.integrations/
– Configurations for integrations with other systems.
- Clone the repository:
git clone https://github.com/AdamFiser/siem_templates.git
- Select the templates you want to use.
- Copy them into your Wazuh installation (e.g.,
/var/ossec/etc/
or the equivalent directory). - Restart the Wazuh Manager service:
systemctl restart wazuh-manager
Contributions are highly welcome! You can help by adding new rules, improving existing ones, or fixing mistakes.
- Fork this repository.
- Create a new branch for your changes:
git checkout -b my-changes
- Add or edit files.
- Test to ensure your rules/configurations work correctly.
- Submit a Pull Request with a clear description:
- What has been changed/added
- Why it is useful
- How to test it
Tip: When adding a new rule, include details of the detected event and example log entries in the PR description.
This project is licensed under the MIT License.
You are free to use, modify, and share according to your needs.
If you have questions, open an Issue or contact the author directly via GitHub.