diff --git a/public/templates/agents/agents-welcome.html b/public/templates/agents/agents-welcome.html index ae5ddd57f..60a8d6b9e 100644 --- a/public/templates/agents/agents-welcome.html +++ b/public/templates/agents/agents-welcome.html @@ -65,16 +65,16 @@
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB.
@@ -34,7 +34,7 @@The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individuals within the European Union. It also addresses the export of personal data outside the EU.
@@ -55,7 +55,7 @@The Linux Audit system provides a way to track security-relevant information on your system.
@@ -76,7 +76,7 @@OVAL (Open Vulnerability Assessment Language) interpreter used to check system configuration and detect vulnerable applications.
@@ -97,7 +97,7 @@CIS (Center for Internet Security) is an entity dedicated to safeguard private and public organizations against cyber threats. This entity provides CIS benchmarks guidelines, which are a recognized global standard and best practices for securing IT systems and data against cyberattacks.
@@ -117,7 +117,7 @@Wazuh provides a way to collect alerts from your AWS machines and store them to an agent. Once the agent reads the message, it sends it to the Wazuh manager which analyses it with decoders and rules.
@@ -138,7 +138,7 @@VirusTotal is an online service that analyzes files and URLs enabling the detection of viruses, worms, trojans and other kinds of malicious content using antivirus engines and website scanners. It also can be used to detect false positives.
diff --git a/public/utils/tab-names.js b/public/utils/tab-names.js index 7b5101836..3cd41bdab 100644 --- a/public/utils/tab-names.js +++ b/public/utils/tab-names.js @@ -11,23 +11,23 @@ */ export default { welcome : 'Welcome', - general : 'General', - fim : 'File integrity', + general : 'Security events', + fim : 'Integrity monitoring', pm : 'Policy monitoring', vuls : 'Vulnerabilities', - oscap : 'Open SCAP', - audit : 'Audit', + oscap : 'OpenSCAP', + audit : 'System auditing', ciscat : 'CIS-CAT', pci : 'PCI DSS', gdpr : 'GDPR', - aws : 'AWS', + aws : 'Amazon AWS', virustotal : 'VirusTotal', configuration: 'Configuration', + syscollector : 'Inventory data', api : 'API configuration', extensions : 'Extensions', pattern : 'Index pattern', about : 'About', - syscollector : 'Inventory', status : 'Status', ruleset : 'Ruleset', rules : 'Rules', diff --git a/server/reporting/tab-description.js b/server/reporting/tab-description.js index ff4356083..b80622dc9 100644 --- a/server/reporting/tab-description.js +++ b/server/reporting/tab-description.js @@ -11,55 +11,55 @@ */ export default { general: { - title: 'General', - description: '' + title: 'Security events', + description: 'Browse through your security alerts, identifying issues and threats in your environment.' }, fim: { - title: 'File integrity monitoring', - description: 'Wazuh\'s File integrity monitoring (FIM) system watches selected files, triggering alerts when these files are modified.' + title: 'Integrity monitoring', + description: 'Alerts related to file changes, including permissions, content, ownership and attributes.' }, pm: { title: 'Policy monitoring', - description: 'Policy monitoring is the process of verifying that all systems conform to a set of predefined rules regarding configuration settings and approved application usage.' + description: 'Verify that your systems are configured according to your security policies baseline.' }, vuls: { - title: 'Vulnerability detector', - description: 'Detect applications that are known to be vulnerable (affected by a CVE).' + title: 'Vulnerabilities', + description: 'Discover what applications in your environment are affected by well-known vulnerabilities.' }, oscap: { - title: 'Security Content Automation Protocol (SCAP)', - description: 'SCAP uses several specifications in order to automate continuous monitoring, vulnerability management, and reporting the results of security compliance scans.' + title: 'OpenSCAP', + description: 'Configuration assessment and automation of compliance monitoring using SCAP checks.' }, audit: { - title: 'Linux Audit', - description: 'The Linux auditd system is an extensive auditing tool, which we will only touch on here.' + title: 'System auditing', + description: 'Audit users behavior, monitoring command execution and alerting on access to critical files.' }, pci: { title: 'PCI DSS', - description: 'Wazuh helps to implement PCI DSS by performing log analysis, file integrity checking, policy monitoring, intrusion detection, real-time alerting and active response.' + description: 'Global security standard for entities that process, store or transmit payment cardholder data.' }, gdpr: { title: 'GDPR', - description: 'The General Data Protection Regulation took effect on May 25, 2018. Wazuh helps with most technical requirements by making the most of features such as File Integrity or Policy monitoring.' + description: 'General Data Protection Regulation (GDPR) sets guidelines for processing of personal data.' }, ciscat: { title: 'CIS-CAT', - description: 'Integrates CIS benchmark assessments into Wazuh agents.' + description: 'Configuration assessment using Center of Internet Security scanner and SCAP checks.' }, aws: { - title: 'Amazon web services', - description: 'Wazuh AWS rules focus on providing the desired visibility within the Amazon Web Services platform.' + title: 'Amazon AWS', + description: 'Security events related to your Amazon AWS services, collected directly via AWS API.' }, virustotal: { - title: 'Virustotal', - description: 'Scans monitored files for malicious content.' + title: 'VirusTotal', + description: 'Alerts resulting from VirusTotal analysis of suspicious files via an integration with their API.' }, syscollector: { - title: 'Inventory', - description: 'Scan the system to retrieve information related to OS, hardware and installed packages.' + title: 'Inventory data', + description: 'Applications, network configuration, open ports and processes running on your monitored systems.' }, configuration: { title: 'Configuration', - description: 'Agents can be configured remotely by using the agent.conf file. Check the agent configuration here.' + description: 'Check the current agent configuration remotely applied by its group.' } }