Stay updated with the latest Cybersecurity News on our TecnetBlog.

Wazuh 4.13.0: Key Cybersecurity Updates and Improvements

Written by Gustavo Sánchez | Sep 19, 2025 4:00:00 PM

Wazuh has announced the release of version 4.13.0, an update that takes the platform to a new level in terms of visibility, performance, and resilience. This new version introduces key improvements designed to further simplify security management and IT infrastructure monitoring.

One of the most notable additions is the new IT hygiene dashboard, which allows centralized visualization and querying of all environment hygiene-related data. This is a highly useful tool for maintaining control and organization of assets from a single location.

Another major addition is active reloading, a feature that enables dynamic updates of decoders, rules, and CDB lists without needing to restart the Wazuh Manager service. This translates into greater operational agility and fewer interruptions.

In addition, Wazuh 4.13.0 includes several enhancements to system reliability, overall performance, and multiple fixes across both the user interface and the core components of the platform.

 

 

Key New Features in Wazuh 4.13.0

 

IT Hygiene Dashboard

 

One of the most exciting new features in Wazuh 4.13.0 is the introduction of the new IT hygiene dashboard—a tool designed to provide a clear, centralized view of the state of the systems you are monitoring.

With this dashboard, it’s now possible to access and analyze key information about endpoints directly from the Wazuh control panel. All data collected by the agents (thanks to the IT hygiene module) is consolidated, automatically indexed, and ready to be queried quickly, either through the built-in dashboards or your own custom dashboards.

The dashboard provides a unified view of all monitored endpoints, with data organized into intuitive sections: Overview, System, Software, Processes, and Network. This allows you to quickly visualize the real-time status of each device, detect misconfigurations, or identify potential risks before they become incidents.

In particular, the Overview section highlights key metrics such as:

 

  1. Detected operating system types

  2. Installed and running packages

  3. CPUs of monitored hosts

  4. Open source ports

  5. Recent process activity

 

This new functionality enables better decision-making in terms of security and maintenance, allowing IT and security teams to respond more quickly and accurately.

 

IT Hygiene Dashboard

 

Detailed System Information

 

Within the IT hygiene dashboard, the System section offers a complete and detailed view of each monitored endpoint. Here, you’ll find key data about the operating systems and hardware in use—all in one place.

This section displays information such as operating system families, installed platforms, CPU models, number of cores, and real-time memory usage. All of this gives you a clear picture of the performance and configuration of the devices that make up your infrastructure.

Whether for maintenance tasks, audits, or simply keeping everything under control, this consolidated view saves time and helps you make more informed decisions.

 

System Control Panel

 

All About Installed Software

 

The Software section of the IT hygiene dashboard provides a clear, organized view of the packages installed on your endpoints, including relevant details about system updates and patches.

Here, you can see general information such as the top software vendors, types of packages, how many times they’ve been installed, and whether common updates have been applied or are still pending. It also includes data from the Windows Knowledge Base (KB), making it easier to identify missing patches or unaddressed vulnerabilities.

In short, it’s an extremely useful tool for keeping real control over the software status across your infrastructure—ensuring everything is up to date, secure, and working as it should.

 

Software Control Panel

 

Read more: What is patch management?

 

Full Visibility of Running Processes

 

The Processes section of the IT hygiene dashboard allows you to see in real time what’s running on your endpoints. It displays key details such as the names of active processes, start times, and well-organized summaries in tables that make analysis easy.

This functionality is ideal for detecting unusual processes, monitoring system activity, and maintaining greater control over what’s happening on each monitored device—all from a single place with clear visualization.

Ultimately, it’s a highly useful tool for strengthening security and optimizing system performance.

 

Processes Dashboard

 

Full Network Control

 

The Network section of the IT hygiene dashboard gives you a comprehensive view of everything happening at the connectivity level on your endpoints. Here, you’ll find detailed information on IP addresses, interfaces, protocols, active services, ports in use, and even organized summaries for each monitored endpoint.

The best part is that this feature updates automatically in real time—no complex configurations required. It also works seamlessly across both single-node environments and distributed multi-node infrastructures.

Thanks to these improvements, you can strengthen network visibility, optimize security operations, and maintain more efficient compliance control across your entire infrastructure.

 

Network Control Panel

 

Stronger Stability and Security in Wazuh 4.13.0

 

With this new version, Wazuh reinforces both the stability and security of the platform. Multiple fixes have been applied to core components to reduce runtime errors, improve dashboard responsiveness, and address issues reported by the community. All of this translates into a smoother, more reliable user experience.

One of the major highlights is the introduction of active reloading in the analysis engine. With this feature, it’s now possible to update decoders, rules, and CDB lists dynamically—without needing to restart the Wazuh Manager. This streamlines daily management and prevents unnecessary interruptions.

On the security front, Wazuh introduces significant changes: the use of UNC paths and mapped network drives is now restricted on monitored Windows endpoints. This measure strengthens protection against NetNTLMv2 hash exposure and minimizes the risk of remote code execution. From this version onward, only secure local file system paths are allowed, and any unsafe paths will be automatically blocked during configuration loading.

 

Conclusion

 

With version 4.13.0, Wazuh reaffirms its commitment to delivering a more stable, secure platform ready to face ever-evolving threats. These improvements not only enhance performance but also raise the level of protection in critical IT environments.

For an in-depth look at every technical detail, check out the full release notes in the official Wazuh documentation.