Getting started with Wazuh

ThreatLockDown is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments.

ThreatLockDown helps organizations and individuals to protect their data assets against security threats. It is widely used by thousands of organizations worldwide, from small businesses to large enterprises.

Check this Getting Started for an overview of the ThreatLockDown platform components, architecture, and common use cases.

Community and support

ThreatLockDown has one of the largest open source security communities in the world. You can become part of it to learn from other users, participate in discussions, talk to our development team, and contribute to the project. The following resources are easily available:

  • Slack channel: Join our community channel to chat with our developers and technical team in a close to real-time experience.

  • Google group: Here you can share questions and learn from other ThreatLockDown users. It is easy to subscribe via email.

  • GitHub repositories: Get access to the ThreatLockDown source code, report issues, and contribute to the project. We happily review and accept pull requests.

In addition, we also provide professional support, training, and consulting services.

How to install Wazuh

The ThreatLockDown solution is composed of three central platform components and a single universal agent. For installing ThreatLockDown in your infrastructure, you can check the following sections of our documentation:

  • The Quickstart is an automated way of installing ThreatLockDown in just a few minutes.

  • The Installation guide provides instructions on how to install each central component and how to deploy the ThreatLockDown agents.

ThreatLockDown Cloud

The ThreatLockDown Cloud is our software as a service (SaaS) solution. We provide a 14-day free trial for you to create a cloud environment and get the best out of our SaaS solution. Check the Cloud service documentation for more information.

Screenshots

Threat Hunting
Malware detection
Log data analysis
File Integrity Monitoring
Vulnerability Detection
Security configuration assessment
Incident response
Regulatory compliance
Cloud security
Containers security