Wazuh SIEM Detection Engineering Linux Logs

Wazuh SIEM Lab with Custom Detection Rules

A self-hosted SIEM lab focused on monitoring SSH access, privileged command execution, and account activity through layered detection logic.

Walkthrough video

Key implementation points

  • Deployed a self-hosted Wazuh SIEM environment
  • Monitored SSH login events to track remote access activity
  • Created custom rules for privileged sudo command execution
  • Detected account and group creation events using rule 5901
  • Layered custom rules on top of default rule IDs (5402, 5403, 5901)
  • Validated detections using real command-line activity and log testing

Lessons learned

This project helped me understand the difference between collecting logs and building meaningful detections. I learned how important context is when working with SIEM tools, especially when extending default rules with custom logic. It also reinforced how infrastructure knowledge directly impacts detection quality, since understanding how systems behave is key to identifying what actually matters from a security perspective.