Wazuh - Automatic log data analysis for intrusion detection HD

28.05.2017
Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage. The Wazuh rules help bring to your attention application or system errors, misconfigurations, attempted and/or successful malicious activities, policy violations and a variety of other security and operational issues. This video shows an example of how Wazuh is used to detect a Shellshock vulnerability exploitation attempt. Join our mailing list at: wazuh+subscribe@googlegroups.com https://wazuh.com @wazuh

Похожие видео

Показать еще