The CDB list
The CDB list in Wazuh serves as a repository for distinct hashes or checksums of malicious and benign files. The Wazuh security platform can precisely compare the files’ cryptographic representations on a system and those kept in the CDB. The CDB list consists of lists of users, file hashes, IP addresses, domain names, and so on. In this section, we will cover the following topics:
- The workings of the CDB list
- Setting up the Wazuh server
- Configuring Windows endpoints
- Testing
- Visualizing the alerts
The workings of the CDB list
You can save a list of users, file hashes, IP addresses, and domain names in a text file called a CDB list. A CDB list can have entries added in a key:value
pair or a key:only
format. Lists on CDBs can function as allow or deny lists. Wazuh processes the CDB list in the process mentioned here:
- Hash generation: CDB lists consist of hashes of both good and bad content such as IP addresses, malware hashes...