Daily Operations
SIEM Dashboard Operations
The SIEM Dashboard (Wazuh-based) provides agent-driven security monitoring with dedicated dashboards per security domain.
Daily Security Monitoring
Step 1: Review the Overview Dashboard
Navigate to the SIEM Overview dashboard.
Check the “Total Alerts” chart for unusual spikes.
Review “Top 5 Alerts” for immediate priorities.
Use the severity level slider to filter by event priority.
Step 2: Investigate High-Priority Areas
Click the relevant dashboard card based on detected issues (e.g., Windows, Vulnerabilities, Audit).
Use filters to focus on affected systems or time ranges.
Review related events in the MITRE ATT&CK dashboard for attack technique mapping.
Wazuh Rule Levels
The SIEM Dashboard uses Wazuh rule levels (1–15) to classify event severity:
Level range |
Priority |
Recommended action |
|---|---|---|
1–3 |
Informational |
Archive for compliance and audit trails |
4–7 |
Low to medium |
Review weekly for trends |
8–11 |
High |
Investigate promptly |
12–15 |
Critical |
Immediate response required |
Use the severity slider on the Overview dashboard to filter events by level and reduce noise during daily monitoring.
Compliance Monitoring
From the main SIEM dashboard, click the relevant compliance card:
PCI DSS — payment card processing environments
HIPAA — healthcare and patient data
GDPR — EU personal data processing
NIST 800-53 — government and federal standards
TSC — SOC 2 trust services assessments
Review the compliance dashboard for current status, violations, and gaps.
Export reports for documentation and audit purposes.
Alerts Operations
The native Alerts interface provides alert rule management, incident handling, and risk-based prioritization.
Daily Alert Review
Step 1: Check Alert Status
Navigate to SIEM → Alert Status.
Verify the alert module status is “RUNNING”.
Review processing times and event counts for anomalies.
Step 2: Review Incidents
Navigate to SIEM → Incidents.
Filter by status “New” to see unhandled incidents.
Prioritize incidents by risk value — higher scores indicate higher risk.
Assign incidents to team members and update statuses.
Step 3: Risk-based Prioritization
Navigate to SIEM → Risks.
Review risk entries for high-value categories.
Cross-reference with recent incidents to identify recurring high-risk entities.
Incident Investigation
Open the incident from the Incidents tab.
Click View document to inspect the original alert data.
Use the Discover URL (if generated by the alert rule) to view related events in context.
Add investigation notes to the incident.
Verify suspicious fields against the blacklist.
Update the incident status as the investigation progresses (New → Ongoing → Solved or False).
Creating Alerts for New Threats
Navigate to SIEM → Create Alert Rule.
Enter a descriptive name and select the appropriate rule type.
Set the index pattern and click “Read Fields” to load available fields.
Write the YAML rule definition with detection logic.
Configure the alert method (Email, Slack, Jira, etc.).
Optionally enable risk scoring and associate playbooks.
Use “Test Rule” to validate before saving.
Submit the rule.