Having read-only access to the interface of your technology allows Expel to dig deeper when performing incident investigations. Our device health team uses this access to investigate potential health issues with your tech.
By following these steps, you create a user account for Expel which keeps Expel activity separate from other activity on the Wazuh console. Note: This guide is for cloud installations of Wazuh. For on-premises installations, see the Wazuh on-prem getting started guide.
Step 1: Get the Elastic API
Ask Wazuh support (email@example.com) to expose the Elastic API and allow List these six IPs:
- Write down the exposed Elastic API. Your API URL should be similar to https://<cloud_instance>.cloud.wazuh.com/api/elastic/. Notify your Engagement Manager if your URL doesn't end with the suffix "/api/elastic."
Step 2: Create an account in Elastic
This step configures a user with a read-only role for Expel to access this API.
- Go to Open Distro for Elasticsearch > Security > Roles > Create Role.
Create a role with these options:
- Cluster Permissions: cluster_all.
- Index Permissions: Add the index - * , with index permissions - search, get, read.
- Tenant permissions: global_tenant with Read only.
- Go to the Mapped Users tab and select Create Internal User.
- Type a username and password for the new user and write them down.
- Go back to the Roles screen and click Map users.
- Select the newly created user and click Save.
- Go to Wazuh > Security > Roles mapping.
Create a new Role mapping with these options:
- Roles: readonly.
- Internal users: Select the newly created user from the list.
Step 3: Setup the archives index
This step sets up the Wazuh-archives index.
- Go to Wazuh > Management > Configuration > Edit Configuration.
Change the logall_json setting to yes.
- After you configure the archive, the archive file goes to cold storage. For investigative purposes, we want to query this index in real-time. The next step is to reach out to your Wazuh support team to change this index to hot storage. This is a change to the filebeat.yml file which must be done by the Wazuh cloud support team.
Step 2. Configure the technology in Workbench
Now that we have access and noted the credentials, we can integrate Wazuh with Expel Workbench.
- In a new browser tab, log into https://workbench.expel.io.
- On the console page, navigate to Settings and click Security Devices.
- At the top right of the page, select Add Security Device.
- Find and select your technology.
Type these details:
- Name: Friendly name for the integration.
- Location: Cloud.
- Username: Username for the newly created user.
- Password: Password for the newly created user.
- Server address: type the Wazuh cloud server address. Note: Do not enter the Elastic API address.
- Is this a Wazuh cloud Instance?: y
- Click Save.
After a few minutes, refresh the Security Devices page and you see your device status reporting as Healthy, or if there is an issue, you see details of what the issue may be.
To check if alerts are coming through, navigate to Alerts on the console page. Click the icon in the upper right to switch to grid view, then check the list for device alerts.