Antonio Fresneda

Results 13 comments of Antonio Fresneda

In order to debug this problem, we have made a list of steps that must be followed in order to get more information: ## Check the active configuration of the...

# Update 1 After reviewing all the information collected and executing all the tests again, we have the following conclusions: ## Active configuration: There wasn't any wrong configuration: All the...

# Update 2 After debugging and looking through the following information, we have detected the root cause of the problem: - Enabled local audit policies on the system when FIM...

No warnings are generated after changing the base: ``` root@ubuntuagent:/home/vagrant/wazuh/src/unit_tests/build/wazuh_modules/vulnerability_detector# ctest Test project /home/vagrant/wazuh/src/unit_tests/build/wazuh_modules/vulnerability_detector Start 1: test_wm_vuln_detector 1/3 Test #1: test_wm_vuln_detector ............ Passed 0.12 sec Start 2: test_wm_vuln_detector_evr 2/3 Test...

Working branch https://github.com/wazuh/wazuh/tree/11295-add-openssl-cert-tool

Scan build didn't find any errors. ``` ➜ build git:(11295-add-openssl-cert-tool) scan-build make scan-build: Using '/usr/bin/clang-14' for static analysis [ 50%] Building CXX object CMakeFiles/cert-creator.dir/cert-creator.cpp.o [100%] Linking CXX executable cert-creator [100%]...

The authd IT check fail due to https://github.com/wazuh/wazuh-qa/issues/2922

Coverage report [coverage.zip](https://github.com/wazuh/wazuh/files/9249330/coverage.zip)

We have proposed two solutions in order to detect these policy changes: ## Detect the 4719 event In order to be able to get the 4719 events, we need to...

In https://github.com/wazuh/wazuh/pull/14763 both solutions have been implemented. In my opinion, the best one is to check every interval the configured policies: - We don't activate any other policy. - The...