Skip to content

Commit 9dba675

Browse files
Hotfix for addressing broken links (#609)
* fixing link * fixing second link * fixing typo for wazuh-management * removing colon; fixing typos * cleaning up top level headings --------- Co-authored-by: Connor Aubry <[email protected]>
1 parent 5e7c048 commit 9dba675

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Your input is essential to the continuous improvement of LME and to ensure it be
6969
1. [Retrieving Passwords](#retrieving-passwords)
7070
2. [Starting and Stopping LME](#starting-and-stopping-lme)
7171
3. [Uninstall LME](#uninstall-lme)
72-
5. [Documentation:](#5-documentation)
72+
5. [Documentation](#5-documentation)
7373
6. [Developer Notes](#6-developer-notes)
7474

7575

@@ -263,7 +263,7 @@ ok: [localhost] => {
263263
### 5. Deploying Agents
264264
To populate the dashboards with data, you need to install agents. Detailed guides for deploying Wazuh and Elastic agents are available in the following documents:
265265

266-
- [Deploy Wazuh Agent](/docs/markdown/agents/wazuh-agent-mangement.md)
266+
- [Deploy Wazuh Agent](/docs/markdown/agents/wazuh-agent-management.md)
267267
- [Deploying Elastic-Agent](/docs/markdown/agents/elastic-agent-management.md)
268268

269269

@@ -380,9 +380,9 @@ We're doing our best to have regular updates that add new and/or requested featu
380380
1. [Alerting](/docs/markdown/maintenance/elastalert-rules.md): Adding custom notifications for triggered alerts using elastalert2
381381
2. [Active Response](/docs/markdown/agents/wazuh-active-response.md): Creating custom wazuh active response actions to automatically respond to a malicious event wazuh detects.
382382
3. [Backups](/docs/markdown/maintenance/backups.md): Customizing backups of logs for your organizations own compliance needs.
383-
4. [Custom log types](/docs/markdown/agents/elastic-agent-mangement.md#lme-elastic-agent-integration-example): using elastic agents built in [integrations](https://www.elastic.co/guide/en/integrations/current/index.html) ingest a log type specific to your organization.
383+
4. [Custom log types](/docs/markdown/agents/elastic-agent-management.md#lme-elastic-agent-integration-example): using elastic agents built in [integrations](https://www.elastic.co/guide/en/integrations/current/index.html) ingest a log type specific to your organization.
384384
385-
## 5. Documentation:
385+
## 5. Documentation
386386
387387
### Logging Guidance
388388
- [LME in the Cloud](/docs/markdown/logging-guidance/cloud.md)
@@ -412,11 +412,11 @@ We're doing our best to have regular updates that add new and/or requested featu
412412
413413
### Agents:
414414
Here is documentation on agent configuration and management.
415-
- [Elastic-Agent](/docs/markdown/agents/elastic-agent-mangement.md)
415+
- [Elastic-Agent](/docs/markdown/agents/elastic-agent-management.md)
416416
- Wazuh:
417417
- [Wazuh Configuration](/docs/markdown/maintenance/wazuh-configuration.md)
418418
- [Active Response](/docs/markdown/agents/wazuh-active-response.md)
419-
- [Agent Management](/docs/markdown/agents/wazuh-agent-mangement.md)
419+
- [Agent Management](/docs/markdown/agents/wazuh-agent-management.md)
420420
421421
### Endpoint Tools:
422422
To make best use of the agents, complement them with utilities that generate forensically relevant data to analyze and support detections.
@@ -427,7 +427,7 @@ Consider adding them to Windows/Linux.
427427
#### Linux:
428428
- [Auditd](/docs/markdown/endpoint-tools/install-auditd.md)
429429
430-
## 6. Developer notes:
430+
## 6. Developer Notes
431431
Git clone and git checkout your development branch on the server:
432432
433433
```bash

build/includes.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ Readme.md
1616
./docs/markdown/maintenance/volume-management.md
1717
./docs/markdown/maintenance/vulnerability-scan-setup.md
1818
./docs/markdown/maintenance/wazuh-configuration.md
19-
./docs/markdown/agents/elastic-agent-mangement.md
19+
./docs/markdown/agents/elastic-agent-management.md
2020
./docs/markdown/agents/wazuh-active-response.md
21-
./docs/markdown/agents/wazuh-agent-mangement.md
21+
./docs/markdown/agents/wazuh-agent-management.md
2222
./docs/markdown/endpoint-tools/install-auditd.md
2323
./docs/markdown/endpoint-tools/install-sysmon.md

docs/markdown/agents/wazuh-active-response.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Wazuh can automatically block IP addresses attempting SSH brute-force attacks us
1111
1. **Verify Default Script**:
1212
- Check for `firewall-drop` script in `/var/ossec/active-response/bin/` on Linux/Unix systems.
1313

14-
2. **Configure Command in wazuh_manager.conf**: Note this command (firewall-drop) already exists. But you can create custom scripts located in the active response/bin path and add new commands into the .conf file located at wazuh_manger.conf located at /opt/lme/config/wazuh_cluster/wazuh_manager.conf
14+
2. **Configure Command in wazuh_manager.conf**: Note this command (firewall-drop) already exists. But you can create custom scripts located in the active response/bin path and add new commands into the .conf file located at wazuh_manager.conf located at /opt/lme/config/wazuh_cluster/wazuh_manager.conf
1515

1616

1717

@@ -64,4 +64,4 @@ This setup provides an automated defense against SSH brute-force attacks, enhanc
6464

6565
See a list of Wazuh Rules that trigger here: [Wazuh Ruleset](https://github.com/wazuh/wazuh/tree/master/ruleset/rules)
6666

67-
Consult Wazuh Documentation for more on active response configuration.
67+
Consult Wazuh Documentation for more on active response configuration.

0 commit comments

Comments
 (0)