Wazuh alert triage automation

Automatically analyze incoming Wazuh alerts, extract key entities (IP/user/host), assign severity, and create a clean case summary your team can act on.

What happens

  1. Ingest new Wazuh alerts
  2. Extract entities and normalize indicators
  3. Assign severity and create a case
  4. Notify Slack with a summary (optional)

Deploy this workflow

Why it matters

  • Reduce analyst time spent on low-signal noise
  • Standardize triage quality across shifts
  • Keep response actions human-approved
  • Export evidence for audit and reporting
Tip: start with one alert source and one response playbook. Iterate based on metrics.

Related docs