OSD Blog

Guides, comparisons, and best practices for deploying and managing your Wazuh SIEM.

Best Practices6 min read

Case Study: SaaS Startup Detects Root Compromise 24h After Deploying a SIEM

They had 15 people, no SOC, and enterprise prospects demanding a SIEM. 24 hours after deploying, they found a root compromise running for 9 days.

April 27, 2026
case-studysaasssh
Comparisons11 min read

Managed SOC vs. Running Your Own SIEM: Cost Comparison for SMBs

A managed SOC costs €3-5K/month. A managed SIEM costs €50. Here is when each makes sense — and why most SMBs are overpaying for security.

April 26, 2026
socmdrsiem
Architecture12 min read

How to Install Wazuh with Docker in 5 Minutes (Step-by-Step)

Deploy a full Wazuh SIEM stack with Docker Compose in under 5 minutes. Manager, indexer, and dashboard — from zero to monitoring in one terminal session.

April 24, 2026
wazuhdockerinstall
Best Practices11 min read

NIS2 for Small Businesses: Do You Need to Comply? (Practical Guide)

NIS2 is live in the EU and penalties are steep. Find out if your small business needs to comply and what concrete steps to take — even without a security team.

April 22, 2026
nis2smetpe
Features14 min read

Detecting Lateral Movement with Your SIEM: A Wazuh Guide

Attackers move laterally before they strike. Detect Pass-the-Hash, PsExec, WMI, and RDP pivoting with Wazuh rules mapped to MITRE ATT&CK.

April 16, 2026
lateral-movementsiemwazuh
Best Practices13 min read

How to Reduce False Positives in Your SIEM: Wazuh Tuning Guide

Alert fatigue kills your SOC. Learn how to tune Wazuh rules, use CDB lists, adjust severity levels, and go from 10K daily alerts to 50 actionable ones.

April 14, 2026
siemfalse-positivestuning
Features14 min read

How to Detect Brute Force Attacks with Wazuh SIEM

Detect SSH, RDP, and web brute force attacks in real time with Wazuh. Includes rule IDs, custom detection rules, active response auto-blocking, and tuning tips.

April 12, 2026
wazuhbrute-forcedetection
Comparisons12 min read

SIEM for Startups: Real Costs Compared (2026)

Splunk costs $45K/year. Datadog $15K. OSD starts at €150/year. A transparent cost comparison of every SIEM option for startups in 2026.

April 6, 2026
siemcoststartup
Best Practices12 min read

How to Pass SOC 2 as a Startup (Without a $50K SIEM)

Enterprise clients demand SOC 2. Traditional SIEM stacks cost $50K+/year. Here is how startups pass SOC 2 Type II with Wazuh on OSD for under €50/month.

April 2, 2026
soc2startupcompliance
Comparisons12 min read

Affordable SIEM for Regulatory Compliance: NIS2, SOC 2, ISO 27001 from €15/month

NIS2, SOC 2, and ISO 27001 all require log centralization and security monitoring. Deploy a compliant SIEM with Wazuh and OSD for a fraction of commercial SIEM costs.

March 29, 2026
siemaffordablecompliance
Best Practices13 min read

SOC 2 Compliance with a SIEM: How Wazuh Meets Trust Service Criteria

SOC 2 Type II audits require continuous security monitoring. Learn how Wazuh maps to SOC 2 Trust Service Criteria and generates the evidence auditors expect.

March 28, 2026
soc2compliancesiem
Comparisons12 min read

How Much Does Wazuh Cost? Wazuh Cloud Pricing Per Agent Per Month (2026)

Complete breakdown of Wazuh Cloud pricing per agent per month in 2026. Compare Wazuh Cloud ($571/mo) vs OSD (from 15 EUR/mo) and find the cheapest way to run Wazuh.

March 26, 2026
wazuhwazuh-cloudpricing
Best Practices10 min read

ISO 27001 Compliance with a SIEM: How Wazuh Maps to Annex A Controls

ISO 27001 certification demands continuous security monitoring. See how Wazuh maps to key Annex A controls and generates the audit evidence your certifying body expects.

March 23, 2026
iso-27001compliancesiem
Best Practices14 min read

NIS2 Directive: How a SIEM Helps EU Businesses Achieve Compliance

The NIS2 directive is now enforceable across the EU. Learn who must comply, what the key requirements are, and how Wazuh covers the essential security obligations.

March 22, 2026
nis2complianceeu
Agent Deployment8 min read

Deploy Wazuh Agent on Linux (Ubuntu, Debian, CentOS)

Step-by-step guide to installing and enrolling Wazuh agents on Linux distributions. Covers Ubuntu, Debian, CentOS, and RHEL with package manager and manual methods.

February 21, 2026
wazuhagentlinux
Comparisons9 min read

OSD vs Wazuh Cloud: Which Deployment Model?

Compare OSD (Open SIEM Deployer) with Wazuh Cloud. Pricing, control, data sovereignty, and deployment speed for your Wazuh SIEM.

February 19, 2026
osdwazuh-cloudcomparison
Comparisons11 min read

Splunk vs Wazuh: Complete SIEM Comparison

Splunk vs Wazuh head-to-head comparison. Pricing, features, scalability, ease of use, and total cost of ownership for enterprise SIEM needs.

February 10, 2026
splunkwazuhsiem
Comparisons12 min read

Best Open-Source SIEM Solutions in 2026

Compare the top open-source SIEM platforms: Wazuh, OSSEC, Security Onion, AlienVault OSSIM, and more. Features, pricing, and deployment complexity.

February 7, 2026
siemopen-sourcecomparison
Architecture11 min read

Wazuh Architecture Explained: Indexer, Server, Dashboard

Understand how Wazuh works under the hood. Deep dive into the three main components: Wazuh Indexer, Wazuh Server, and Wazuh Dashboard, and how they interact.

February 3, 2026
wazuharchitectureindexer
Best Practices5 min read

Case Study: Marketing Agency Discovers Client Data Breach Via SIEM Alerts

A marketing agency found a former employee was still accessing client data 3 months after leaving. Their €50/month SIEM caught what HR and IT missed.

May 3, 2026
case-studymarketingagency
Best Practices6 min read

Case Study: Pharma Company Achieves GxP Audit Trail with a Managed SIEM

A pharma company needed GxP audit trails. FIM on their QMS caught an unauthorized change to a batch record template — before the FDA audit.

May 2, 2026
case-studypharmagxp
Best Practices6 min read

Case Study: Aerospace Subcontractor Meets CMMC Logging Requirements with a €95 SIEM

An aerospace subcontractor needed CMMC logging for a defense contract. Zero to compliant in 2 hours. Cost: €95/month.

May 1, 2026
case-studyaerospacedefense
Best Practices6 min read

Case Study: IoT Manufacturer Catches Firmware Build Server Tampering

An IoT manufacturer found unauthorized changes on their firmware build server. Without their SIEM, compromised firmware would have shipped to 12,000 devices.

April 30, 2026
case-studyiotmanufacturing
Best Practices6 min read

Case Study: IT Services Company Passes Client Security Audit in 48 Hours

An ESN had 5 days to pass a client security audit. They deployed a SIEM in 30 minutes and passed — with documented evidence.

April 29, 2026
case-studyesnit-services
Best Practices6 min read

Case Study: Logistics Company Stops Ransomware Before Encryption Starts

A logistics company detected lateral movement 3 hours before ransomware encryption. Their €95/month SIEM caught what their antivirus missed.

April 28, 2026
case-studylogisticsransomware
Best Practices11 min read

GDPR Log Monitoring: What Logs Must You Keep and For How Long?

GDPR requires you to detect breaches within 72 hours. Without log monitoring, that is impossible. Here is exactly what logs you need and for how long.

April 25, 2026
gdprrgpdlogs
Best Practices10 min read

Security Audit Checklist for Startups: 15 Points to Pass Every Time

Enterprise clients and investors will audit your security. Here is the 15-point checklist to pass — and how a €50/month SIEM covers half of it.

April 23, 2026
auditcheckliststartup
Best Practices13 min read

SIEM Log Sources: Which to Connect First for Maximum Detection

Not all logs are equal. A prioritized 90-day roadmap to connect authentication, endpoints, firewalls, cloud, and DNS logs to your Wazuh SIEM.

April 20, 2026
siemlog-sourcespriority
Features15 min read

Detect Malicious PowerShell with Wazuh: Rules and Examples

PowerShell is the #1 attacker tool. Detect encoded commands, download cradles, AMSI bypass, and C2 frameworks with Wazuh custom rules and Sysmon.

April 18, 2026
powershelldetectionwazuh
Features11 min read

Security Monitoring for SaaS: What to Log and Why

SaaS companies handle sensitive customer data but most have zero security monitoring. What to log, why it matters, and how to deploy monitoring in 5 minutes.

April 10, 2026
saassecuritymonitoring
Best Practices11 min read

The Series A Security Checklist: SIEM, Logs & Compliance

Investors and enterprise clients audit your security during due diligence. The 12-point checklist to be Series A-ready, and how Wazuh covers half of it.

April 8, 2026
startupseries-asecurity
Agent Deployment10 min read

How to Authenticate a Wazuh Agent on Windows Server with Password (Step-by-Step)

Secure Wazuh agent enrollment on Windows Server with password authentication. Covers Server Core, GPO deployment, and AD event monitoring.

April 7, 2026
wazuhagentwindows-server
Agent Deployment9 min read

How to Authenticate a Wazuh Agent on Windows with Password (Step-by-Step)

Secure your Windows Wazuh agent enrollment with password authentication. Full walkthrough using the MSI installer and PowerShell.

April 5, 2026
wazuhagentwindows
Best Practices11 min read

Your Startup's First SIEM: What to Deploy and When

When does a startup need a SIEM? What to deploy first? This guide covers triggers, tool selection, and how to go from zero to monitored in under an hour.

April 4, 2026
startupsiemfirst
Agent Deployment9 min read

How to Authenticate a Wazuh Agent on Linux with Password (Step-by-Step)

Secure your Linux Wazuh agent enrollment with password authentication. Full walkthrough for Ubuntu, Debian, CentOS, and RHEL.

April 3, 2026
wazuhagentlinux
Agent Deployment10 min read

How to Authenticate a Wazuh Agent on macOS with Password (Step-by-Step)

Secure your macOS Wazuh agent enrollment with password authentication. Full walkthrough from manager configuration to agent verification on Intel and Apple Silicon Macs.

April 1, 2026
wazuhagentmacos
Best Practices6 min read

Fix: AxiosError EACCES Permission Denied on wazuh.yml in Docker

Getting "AxiosError: EACCES: permission denied, open wazuh.yml" on Wazuh Docker? Here is the quick fix with the exact commands to resolve the file ownership issue.

April 1, 2026
wazuhdockereacces
Features11 min read

Ransomware Detection with SIEM: How Wazuh Catches Attacks Early

Your SIEM is your first line of defense against ransomware. Learn how Wazuh detects mass file encryption, suspicious processes, and lateral movement before it is too late.

March 27, 2026
ransomwaredetectionsiem
Comparisons12 min read

SIEM Pricing Comparison 2026: The True Cost of Every Major Platform

A transparent breakdown of SIEM costs in 2026 -- from Splunk to open-source alternatives. Includes hidden costs, TCO tables, and guidance for teams under 500 users.

March 26, 2026
siempricingcomparison
Best Practices9 min read

SIEM for Startups: Security Monitoring From Day One

Startups need a SIEM earlier than they think. Learn when to deploy, how to satisfy SOC 2 auditors, and why Wazuh is the cost-effective choice for growing teams.

March 25, 2026
siemstartupsoc2
Best Practices10 min read

Cyber Insurance & SIEM: How to Meet Insurer Requirements and Lower Premiums

Cyber insurance premiums are rising fast. Learn how deploying a SIEM like Wazuh helps you meet insurer requirements, reduce your risk profile, and lower your rates.

March 25, 2026
cyber-insurancesiemrequirements
Best Practices11 min read

The Complete SIEM Guide for Small and Medium Businesses

SMBs are prime cyberattack targets, yet most lack security monitoring. This guide shows how to choose, deploy, and run a SIEM on a small business budget.

March 24, 2026
siemsmbsmall-business
Best Practices10 min read

Running a SIEM Without a Dedicated SOC Team

You do not need a dedicated SOC team to benefit from a SIEM. Here is how to make Wazuh work for your small team with automation, alert tuning, and a 30-minute weekly routine.

March 24, 2026
siemsocautomation
Comparisons11 min read

SIEM vs EDR vs XDR: What's the Difference?

SIEM, EDR, and XDR decoded. Learn the key differences, where they overlap, and how Wazuh covers SIEM plus endpoint security in a single open-source platform.

March 23, 2026
siemedrxdr
Architecture10 min read

What Is a SIEM? A Complete Beginner's Guide

SIEM explained in plain language. Learn what Security Information and Event Management does, how it works in 4 steps, and how to get started with your first SIEM.

March 22, 2026
siembeginnerguide
Features10 min read

Integrate Microsoft 365 Logs with Wazuh

Connect M365 audit logs to Wazuh. Azure AD app setup, Office 365 Management API, suspicious sign-in detection, and compliance monitoring.

March 21, 2026
wazuhmicrosoft-365office-365
Features11 min read

Integrate Google Cloud Logs with Wazuh

Connect GCP audit logs to Wazuh SIEM using Pub/Sub. Configure log sinks, the gcp-pubsub module, and custom detection rules for cloud security events.

March 20, 2026
wazuhgcpgoogle-cloud
Features10 min read

Collect Proxmox VE Logs in Wazuh

Integrate Proxmox VE hypervisor logs into Wazuh SIEM. Agent installation, authentication monitoring, VM lifecycle events, and cluster security.

March 19, 2026
wazuhproxmoxhypervisor
Features9 min read

Collect OPNsense Firewall Logs in Wazuh

Integrate OPNsense firewall and Suricata IDS logs into Wazuh. Remote syslog setup, filter log parsing, IDS alert correlation, and dashboard tips.

March 18, 2026
wazuhopnsensefirewall
Features10 min read

Collect Palo Alto Firewall Logs in Wazuh

Forward Palo Alto PAN-OS firewall logs to your Wazuh SIEM. Step-by-step syslog configuration, custom decoders, rules, and threat visibility dashboards.

March 17, 2026
wazuhpalo-altofirewall
Features10 min read

Collect Fortinet FortiGate Logs in Wazuh

Integrate Fortinet FortiGate firewall logs into your Wazuh SIEM. Syslog forwarding setup, custom decoders, alerting rules, and dashboard tips.

March 16, 2026
wazuhfortinetfortigate
Features11 min read

Collect Cisco ASA, Switch & Router Logs in Wazuh

Integrate Cisco ASA, IOS switches, and routers with Wazuh SIEM. Syslog forwarding, built-in decoders, custom rules, and network security visibility.

March 15, 2026
wazuhciscoasa
Features11 min read

Cloud Security Monitoring with Wazuh (AWS, Azure)

Monitor your cloud infrastructure with Wazuh. Integrate AWS CloudTrail, GuardDuty, Azure Activity Logs, and detect cloud-specific threats.

March 14, 2026
wazuhawsazure
Features8 min read

Rootkit Detection with Wazuh

Detect rootkits and hidden malware on your servers using Wazuh. Configure rootcheck scanning, understand alerts, and set up automated remediation.

March 13, 2026
wazuhrootkitmalware
Features7 min read

Understanding the Wazuh Security Dashboard

Navigate the Wazuh dashboard like a pro. Learn about security events, agent overview, integrity monitoring, and vulnerability panels for effective SOC operations.

March 12, 2026
wazuhdashboardvisualization
Features9 min read

Automated Threat Response with Wazuh Active Response

Configure Wazuh to automatically respond to threats: block IPs, kill processes, quarantine files. Reduce incident response time from hours to seconds.

March 11, 2026
wazuhactive-responseautomation
Features10 min read

Log Collection and Analysis in Wazuh

Configure Wazuh to collect and analyze logs from servers, applications, firewalls, and cloud services. Syslog, JSON, Windows Events, and custom log formats.

March 10, 2026
wazuhlogssyslog
Agent Deployment9 min read

Deploy Wazuh Agent via Group Policy (GPO)

Deploy the Wazuh agent across your Active Directory domain using Group Policy. MSI deployment, startup scripts, and automated enrollment.

March 10, 2026
wazuhagentgpo
Features11 min read

PCI-DSS and GDPR Compliance with Wazuh

Use Wazuh built-in compliance dashboards for PCI-DSS, GDPR, HIPAA, and NIST 800-53. Generate audit-ready reports and monitor compliance in real time.

March 9, 2026
wazuhcompliancepci-dss
Agent Deployment8 min read

Deploy Wazuh Agent on macOS with Jamf Pro

Mass-deploy the Wazuh agent to your Mac fleet using Jamf Pro. PKG packaging, Smart Groups targeting, and automated enrollment.

March 9, 2026
wazuhagentjamf
Agent Deployment9 min read

Deploy Wazuh Agent at Scale with Microsoft Intune

Push the Wazuh agent to Windows endpoints using Microsoft Intune MDM. Win32 app packaging, deployment profiles, and monitoring compliance.

March 8, 2026
wazuhagentintune
Features9 min read

Vulnerability Detection with Wazuh

Scan your infrastructure for known vulnerabilities (CVEs) using Wazuh. Configure vulnerability feeds, prioritize remediation, and generate reports.

March 7, 2026
wazuhvulnerabilitycve
Features10 min read

Wazuh File Integrity Monitoring (FIM) Guide

Monitor critical file changes in real-time with Wazuh FIM. Configure directories, exclusions, alerting thresholds, and compliance reporting.

March 6, 2026
wazuhfimfile-integrity
Agent Deployment5 min read

Uninstall Wazuh Agent on macOS

Complete guide to removing the Wazuh agent from macOS. Covers the uninstall script, manual removal, LaunchDaemon cleanup, and verification steps.

March 5, 2026
wazuhagentuninstall
Agent Deployment7 min read

Uninstall Wazuh Agent on Windows (Server & Desktop)

Complete guide to removing the Wazuh agent from Windows Server and Desktop. Covers GUI, command-line, and PowerShell methods with cleanup steps.

March 4, 2026
wazuhagentuninstall
Agent Deployment6 min read

Uninstall Wazuh Agent on Linux (Ubuntu, Debian, CentOS, RHEL)

Step-by-step guide to uninstalling Wazuh agents from Linux distributions. Covers APT and YUM removal, service cleanup, and post-uninstall verification.

March 3, 2026
wazuhagentuninstall
Agent Deployment9 min read

Managing Wazuh Agent Groups at Scale

Organize and manage hundreds of Wazuh agents using groups. Apply different policies, configurations, and monitoring rules per group.

March 2, 2026
wazuhagentgroups
Best Practices9 min read

How to Tune Wazuh Alerts to Reduce Noise

Reduce alert fatigue in your SOC. Learn how to tune Wazuh rules, adjust severity levels, create custom rules, and implement alert suppression.

March 1, 2026
wazuhalertstuning
Agent Deployment8 min read

Wazuh Agent Enrollment Authentication Setup

Secure your Wazuh agent enrollment with password authentication. Prevent unauthorized agents from connecting to your SIEM manager.

February 28, 2026
wazuhagentauthentication
Agent Deployment6 min read

Deploy Wazuh Agent on macOS

Protect your Mac fleet with Wazuh agents. Learn how to install, configure, and enroll macOS endpoints for comprehensive security monitoring.

February 26, 2026
wazuhagentmacos
Agent Deployment7 min read

Deploy Wazuh Agent on Windows Server and Desktop

Install the Wazuh agent on Windows using the MSI installer or command line. Monitor Windows events, files, and security policies from your SIEM dashboard.

February 24, 2026
wazuhagentwindows
Best Practices7 min read

Update Wazuh on OSD (Open SIEM Deployer)

Step-by-step guide to safely updating your Wazuh Docker instance deployed by OSD. Backup, pull new images, and verify after upgrade.

February 22, 2026
wazuhosdupdate
Comparisons8 min read

Budget-Friendly SIEM Deployment for SMBs

Deploy a production-grade SIEM for under €20/month. How small and medium businesses can leverage Wazuh and OSD for enterprise-level security monitoring.

February 17, 2026
siembudgetsmb
Best Practices8 min read

SIEM Log Retention: How Long Should You Keep Logs?

Define your SIEM log retention strategy. Compliance requirements, storage costs, legal considerations, and practical recommendations by industry.

February 15, 2026
siemlogsretention
Comparisons9 min read

Managed SIEM vs Self-Hosted: Pros and Cons

Should you use a managed SIEM service or self-host? Analyze costs, control, compliance, maintenance, and security implications of each approach.

February 14, 2026
siemmanagedself-hosted
Comparisons10 min read

Elastic SIEM vs Wazuh: Feature-by-Feature Comparison

Elastic Security (formerly Elastic SIEM) versus Wazuh. Compare detection rules, dashboards, integrations, licensing, and deployment models.

February 12, 2026
elasticelasticsearchwazuh
Best Practices10 min read

SIEM Best Practices for 2026

Essential SIEM best practices for modern security operations. From log management to alert tuning, incident response workflows, and compliance reporting.

February 8, 2026
siembest-practicessecurity
Architecture9 min read

SIEM Sizing Guide: How Many Resources Do You Need?

Calculate the right server resources for your SIEM deployment. CPU, RAM, storage requirements based on agent count, log volume, and retention period.

February 5, 2026
siemsizingresources