Windows Event Logs

40961

whoami

Execute a Remote Command

Pipeline Execution Details

1071

event log, log file, structured query

/lf:true

Xpath query

Application

Event read direction

Maximum number of events to read

OpenSSH/Admin,OpenSSH/Operational

Microsoft-Windows-PowerShell-DesiredStateConfiguration-FileDownloadManager

192

-MaxEvents

4

Get-WinEvent -LogName Application -FilterXPath '*/System/Provider[@Name="WLMS"] and */System/TimeCreated[@SystemTime="2020-12-15T01:09:08.940277500Z"]'

Get-WinEvent -LogName Security -FilterXPath '*/EventData/Data[@Name="TargetUserName"]="Sam" and */System/EventID=4720'

2

A user account was created

12/17/2020 1:57:14 PM

Microsoft-Windows-Security-Auditing

400

12/18/2020 7:50:33 AM

27736

PC01.example.corp

$Va5w3n8

8/25/2020 10:09:28 PM

6620

S-1-5-32-544

4799