Dashboard
Connecting...
-
Active Agents
-
Open Incidents
-
Alerts (24h)
-
Endpoints
Recent Alerts
TimeHostEventSeverityScoreDetails
🔍
No alerts yet
Agents Status
💻
No agents
TimeHostEventMITRETacticRuleSeverityScoreDetails
HostnameIPOSStatusLast SeenActions
-
Events
-
Alerts
-
OS
-
IP
Events
TimeTypeMITRERuleSeverityScoreDetail
Active Response
-
Events (24h)
-
Critical/High
-
Auth Failures
-
Auth Success
Results
TimeHostTypeMITRE IDTacticRuleSeverityScoreDetails
-
Total
-
Enabled
-
Custom
-
Critical
IDNameMITRETacticSeverityScoreTypeStatusActions
-
Alerts
-
Tracked Users
-
High Risk
-
Anomaly Types
User Profiles
👤
No profiles yet
Recent UEBA Alerts
TimeUserTypeScoreMITRE
-
Total Packages
-
Critical CVEs
-
High CVEs
-
Last Scan
Detected Vulnerabilities
PackageVersionCVESeverityCVSSDescription
🛡
Click Scan Now
-
Score %
-
Grade
-
Passed
-
Failed
CIS Benchmark Results
Check IDTitleSeverityStatusOutput
Click Run Checks
Checking AI status...
🤖 AI Security Assistant
The AI has access to your live SIEM data — ask anything about your current alerts, threats, or how to respond.
Ask me anything about your security environment...

Examples:
"What are the most critical threats right now?"
"Explain what T1110 attack is happening"
"Write a PowerShell script to block IP 45.33.32.156"
"Is the suspicious port scan a false positive?"
"What should I investigate first?"
API Key
Scan
Recent Scans
🦠
No scans yet
Command
Output
No output yet
HostnameAgent IDOSIPStatusLast SeenActions
UsernameFull NameEmailRoleStatusLast LoginActions
Wazuh API Connection
Connection Status
🔌
Not connected
Configure connection to the left
Wazuh Agents
IDNameIPOSStatusLast Seen
Connect Wazuh to see agents
Recent Wazuh Alerts
TimeAgentRuleLevelDescription
No alerts
Integration Guide
① Enable Wazuh API
On your Wazuh manager:
systemctl status wazuh-manager

Default API port: 55000
Default user: wazuh-wui
② Forward Wazuh Alerts to Cibervault
Add to /var/ossec/etc/ossec.conf:

<integration>
  <name>custom-cibervault</name>
  <hook_url>http://CIBERVAULT_IP:8081/api/v1/wazuh/alert</hook_url>
  <level>7</level>
  <alert_format>json</alert_format>
</integration>
③ Agent Enrollment
Install Cibervault agent on Wazuh-monitored hosts to get EDR + SIEM coverage on the same endpoint.
④ Unified View
Wazuh alerts appear in Incidents page with source=wazuh tag. Cibervault EDR alerts appear in Wazuh via syslog forwarding.
Server Info
Server:
SMTP Alerts