Overview

Product video
Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response, and regulatory compliance.
The solution includes the Wazuh server, which is in charge of analyzing the data received from the agents, processing events through decoders and rules, and using threat intelligence to look for well-known IOCs (Indicators Of Compromise). A single Wazuh server can analyze data from hundreds or thousands of agents. Alerts generated by Wazuh are sent to Wazuh indexer, where they are indexed and stored. The unique integration between Wazuh and Wazuh dashboard provides a powerful user interface for data visualization and analysis. The server is also used to manage the agents, configuring and upgrading them remotely when necessary. Additionally, the server is capable of sending orders to the agents, for example, to trigger a response when a threat is detected.
Wazuh provides a security solution capable of monitoring your infrastructure, detecting threats, intrusion attempts, system anomalies, poorly configured applications, and unauthorized user actions. It also provides a framework for incident response and compliance, all in one platform.
Highlights
- Open Source Security Platform
- Host Based Intrusion Detection Solution
- Endpoint Detection and Response
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
---|---|
c5a.xlarge Recommended | $0.00 |
m3.xlarge | $0.00 |
m5dn.2xlarge | $0.00 |
hs1.8xlarge | $0.00 |
u-24tb1.metal | $0.00 |
c5ad.xlarge | $0.00 |
cc2.8xlarge | $0.00 |
t2.2xlarge | $0.00 |
i2.xlarge | $0.00 |
m5d.12xlarge | $0.00 |
Vendor refund policy
We do not currently support refunds.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
See the instructions below
Hardware requirements: https://documentation.wazuh.com/current/quickstart.html#hardwareÂ
The instance needs to have the following protocols and ports configured for its correct operation. These requirements are provided in a default Security Group: https://documentation.wazuh.com/current/getting-started/architecture.html#required-portsÂ
To access the instance by ssh, you will need to use the user: wazuh-user
When the instance is launched, the user passwords are automatically changed to the instance ID with the first letter capitalized. For example: I-07f25f6afe4789342. This ensures that only the creator has access to the interface. This process can take an average of five minutes, depending on the type of instance. During this time, both SSH access and access to the Wazuh dashboard are disabled.
It is highly recommended to change the default passwords of Wazuh indexer users. To perform this action, see our Password management section: https://documentation.wazuh.com/current/user-manual/user-administration/password-management.html#changing-the-passwords-for-all-usersÂ
To access the Wazuh dashboard UI, navigate to the address https://<instance_ip> and log in with:
- Username: admin
- Password: <your_instance_id>
The password is the instance ID with the first letter capitalized. For example: I-07f25f6afe4789342
Resources
Vendor resources
Support
Vendor support
Wazuh has one of the largest open source security communities in the world. You can become part of it to learn from other users, participate in discussions, talk to our development team, and contribute to the project.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Open source flexibility supports cost reduction and efficiency
What is our primary use case?
Wazuh is a SIEM platform with various applications in today's environment. Compliance checks have helped with regulatory requirements. I pulled in PCI DSS to check for file integrity monitoring. I completed one project where I removed malware.
What is most valuable?
The valuable features of Wazuh include being open source and having the capacity to be used for anything desired. It allows for creating new automations, whereas other Software as a Service platforms have their own business models. With this open source tool, organizations can establish their own customized setup.
What needs improvement?
That would require me to discuss with the Wazuh team regarding areas that could be improved, as I have numerous ideas. From a developer's perspective, this is a Linux system with an active community and dense documentation. There are many people sharing different projects of similar tasks, which is beneficial.
In the proof of concept documentation, it's a mixture of Windows, whereas they also catered to Ubuntu . I'm referring to apt and yum languages for downloading the server indexer. I downloaded in apt, but their first proof of concept is in yum, so I must change languages. This is something I do not prefer because I prefer a more uniform language. When running in production, I'm on a time crunch as time is money.
Wazuh could improve by creating videos on YouTube covering installation, use cases, and integration of third-party APIs for different scenarios that other SAAS services provide. While Wazuh provides these features, one must read their documentation thoroughly to customize it. This is a great feature, but initially, I don't have time to scan multiple items. They could make it more uniform and developer-friendly. As a software engineer, it takes considerable time, but as a businessman, I need to complete tasks quickly and need that flexibility.
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
Wazuh requires substantial maintenance. The indexer frequently times out, requiring system restarts. When it comes to errors, debugging takes considerable time.
How are customer service and support?
I spoke with Wazuh support today regarding a quote. I would rate Wazuh support an 8 out of 10. They responded quickly, which was crucial as I was on a time constraint.
How would you rate customer service and support?
Positive
How was the initial setup?
What was our ROI?
Due to confidentiality, I cannot share specific quantifiable benefits that deploying Wazuh has brought to my company. However, it resulted in cost reduction by avoiding lump sum payments and providing the benefit of having our own system.
What's my experience with pricing, setup cost, and licensing?
Wazuh is free to use, but there are licensing fees for third parties. Their consultancy fee and support fees are relatively high. On a scale of 1 to 10, I would rate their consultancy and support fees a 5.
Which other solutions did I evaluate?
What other advice do I have?
I would be willing to provide a review for products I have experience with. I recommend Wazuh to everyone and believe more platforms, not just SIEMÂ and XDRÂ capability platforms, should be open source, allowing people to leverage these tools for the greater good. I support it completely. Overall, I rate Wazuh 8 out of 10.
Innovative platform enables proactive threat hunting and endpoint monitoring
What is our primary use case?
I use Wazuh for daily security operations mainly on EDR endpoints by installing it on the agents that we are monitoring to collect security data. It helps us monitor endpoints and know what is going on at each endpoint, and we are able to tap the data and use it in other platforms such as SOAR .
I find the threat hunting features of Wazuh most valuable, as we are more interested in the threat hunting side and want to move ahead into threat hunting before any threat becomes something that cannot be dealt with. Wazuh has a threat hunting functionality that we use extensively.
The intrusion detection capabilities work effectively in my environment, as we also have firewalls, and we rely more on the firewall side for intrusion detection.
What is most valuable?
The threat hunting features of Wazuh are particularly valuable for our operations. We focus heavily on threat hunting capabilities to address potential threats before they become unmanageable.
The intrusion detection capabilities integrate seamlessly with our existing firewall infrastructure. The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOARÂ .
What needs improvement?
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities. I hope this will be part of the new versions.
Regarding challenges with Wazuh, I cannot pinpoint specific difficulties. When I face a challenge, I prefer not to spend too much time on it and may move to another solution that will give us the results. Sometimes what seems a challenge is just an implementation issue, and while the documentation is comprehensive, it can become overwhelming when quick information is needed for implementation.
For how long have I used the solution?
I have been using Wazuh for about a year now.
What was my experience with deployment of the solution?
Wazuh is easy to set up, as it's clearly defined in their documentation, with various options such as bare metal or Docker implementations. The level of documentation is superior compared to other open source products.
Sometimes issues arise with some of these tools, but because they are open source, there are limitations to what can be expected.
What do I think about the stability of the solution?
I would rate the stability of Wazuh a nine out of ten.
What do I think about the scalability of the solution?
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints. I haven't encountered issues with the engine struggling, and it's simply a matter of having enough memory to handle open search memory issues. I think they've done exceptionally in terms of scalability.
I rate the scalability of Wazuh an eight out of ten, as I haven't reached the point of struggling with it.
How was the initial setup?
I would rate the setup of Wazuh a nine out of ten.
What was our ROI?
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money, but I haven't made any comparisons since we started using Wazuh immediately.
What's my experience with pricing, setup cost, and licensing?
Wazuh is completely free of charge.
What other advice do I have?
I have not seen Wazuh moving in the direction of AI-driven threat detection projects myself, but since the market is moving that way, I wouldn't be surprised if they implemented it soon.
My plans to increase the usage of Wazuh or switch to another tool depend on what my boss decides.
We don't refer to any community support specifically, as we rely on other platforms such as GitHub or Discord, depending on the application.
I recommend that as more companies come on board with Wazuh, it will motivate those who contribute to it, but I am also cautious that as it gains attention, a large company might buy it and change its course of business.
Overall, I rate Wazuh a nine out of ten.
Which deployment model are you using for this solution?
Open source customization and CVE reporting enhance threat detection
What is our primary use case?
We use Wazuh as a SIEM solution because it is open source, highly customizable, and continually expanding. Our clients can request various solutions for their issues, which Wazuh is able to address.
What is most valuable?
One of the most valuable features of Wazuh is its capability as a CVE helper. It assists in pulling reports about active CVEs in the system. Wazuh is a SIEMÂ tool that is highly customizable and versatile. The fact that it is open source means it is always being expanded, which is beneficial for customizing solutions for individual client requests.
What needs improvement?
There is room for improvement by integrating more AI into Wazuh. It requires constant nurturing, as I have to provide it with code and specific requirements. This maintenance can be quite labor-intensive and time-consuming.
For how long have I used the solution?
I have been using Wazuh for nearly three years.
What do I think about the stability of the solution?
The stability of Wazuh is largely dependent on maintenance. If it is well-maintained, it is stable, rating around eight to nine. Without proper maintenance, stability could drop to around five to six.
What do I think about the scalability of the solution?
Wazuh is scalable and suitable for small to medium-sized businesses or enterprises. It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
How are customer service and support?
There is no dedicated technical support for Wazuh as it is open source. I rely on available documentation and self-support.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of Wazuh is not more complex than any other SIEM solutions available.
What other advice do I have?
I would recommend Wazuh to others. It is a good system that provides a comprehensive view of network activities when correctly set up with syslog and proper log injection. Overall, I would rate Wazuh an eight out of ten.
Which deployment model are you using for this solution?
Evaluating robust file monitoring with insights for community support improvements
What is our primary use case?
I am currently evaluating and using Wazuh for file monitoring and compliance reporting. We are in the process of conducting a POC to understand how the rules work. I lead this effort to explore and evaluate Wazuh as part of my learning and work experience.
What is most valuable?
Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs. These aspects are vital as they provide alerts for changes and facilitate the monitoring of compliance. The platform is also relatively easy to set up and operate. Reports are straightforward to extract and prove useful for compliance requirements.
What needs improvement?
I am investigating more about the community support for Wazuh. I can't provide a definitive answer yet. An issue I noticed is with tag values in certain rules not functioning properly. It's unclear if this is a design flaw or intentional. These are areas I'm still exploring.
For how long have I used the solution?
I have been using Wazuh for about seven months.
What do I think about the scalability of the solution?
Wazuh offers scaling options and is scalable from a mid to advanced level. However, I am still evaluating if it meets enterprise-scale requirements.
How are customer service and support?
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Before Wazuh, we used market products for our needs. We are exploring other options due to Wazuh being open source.
How was the initial setup?
The initial setup of Wazuh was not complex once the requirements were understood. In a POC environment, setting up took about a day and a half.
What about the implementation team?
I am spearheading this POC effort. Once completed, more people will likely be involved.
What was our ROI?
There is high potential for ROI, especially for small to medium businesses comparing Wazuh to market solutions. Wazuh offers more cost-effective options without compromising on security.
What's my experience with pricing, setup cost, and licensing?
Since Wazuh is open source, the pricing for support could be applicable to medium-sized companies without much issue. However, I haven't fully explored what comes with this pricing.
Which other solutions did I evaluate?
We have looked into the Elastic Stac k and haven't explored integrating it with Wazuh since Elastic Stack is no longer open source.
What other advice do I have?
I would recommend Wazuh. It's a valuable tool for security operations. On a scale of one to ten, I currently rate Wazuh as a six. I may rate it higher after more experience.
Which deployment model are you using for this solution?
Improved security visibility but needs better support and integration
What is our primary use case?
Our primary use case was around data collection and anomaly detection. We integrated Wazuh with Google Cloud and other cloud providers to receive alerts and insights if there is any unauthorized data access in the production environment.Â
We also monitor virtual machines for any malicious command execution and get notifications for any privilege access attempts. Additionally, we detect anomalies in traffic patterns related to specific client accounts.
How has it helped my organization?
Wazuh has provided us with excellent clarity on data access, allowing us to significantly reduce instances of unnecessary production environment access and improve processes.Â
We now have real-time visibility into the production environment on both cloud and critical virtual machines, which was not possible with our previous manual audits.
What is most valuable?
We found the MITRE framework mapping and the agent enrollment service to be the most valuable features of Wazuh. These components are essential for our security needs.
What needs improvement?
The support channel is not optimal, and extensive research is required on our part to implement Wazuh effectively. The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub. Although they offer data fetching from Cloud Bucket as a more economical option, it was not functioning properly.
For how long have I used the solution?
I've used the solution for four months, during which it was effectively deployed in our production environment for approximately 45 days.
What do I think about the stability of the solution?
The stability of Wazuh is strong, with no issues stemming from the solution itself. Any downtime we experienced was due to human error in configuration.
What do I think about the scalability of the solution?
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate. We found scalability to be decent, as we could easily adjust our infrastructure to handle increased traffic.
How are customer service and support?
We use the open-source version of Wazuh, which does not provide paid support. Although the community is active, it is not highly responsive. Conversion from issue to resolution is average.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Before Wazuh, we relied on periodic audits, which were time-consuming and did not provide automated detection of security anomalies.
How was the initial setup?
Initial setup was incredibly simple, requiring only the running of one script for a single node setup. Complexities arose during integration with Kubernetes-based workloads due to insufficient documentation.
What about the implementation team?
We required only two people for both the deployment and ongoing maintenance of Wazuh.
What was our ROI?
The return on investment is visible in reduced mean time to detect from potentially three months to about an hour and mean time to respond from up to thirty days to two days.
What's my experience with pricing, setup cost, and licensing?
We did not incur costs for Wazuh itself, only for the underlying infrastructure such as PubSub, storage, and compute instances, totaling around two lakh Indian rupees per month.
Which other solutions did I evaluate?
We evaluated Google Chronicle and Elastic-based SIEMÂ (ELK SIEMÂ ), but Wazuh was the most cost-effective solution, being open-source with necessary compute infrastructure.
What other advice do I have?
Wazuh is well-suited for small to medium-sized organizations seeking better data and security visibility for a reasonable investment. There is a learning curve due to less comprehensive documentation, but it is a beautifully designed solution.
I'd rate the solution seven out of ten.