Splunk: Exploring SPL

cyber-host

index=windowslogs | chart count(EventCode) by Image

172.90.12.11

134

4

4

Search Query: index=windowslogs  Hostname="Salena.Adam" DestinationIp="172.18.38.5" 

172.90.12.11

0

12256

Search Query: index=windowslogs | table _time EventID Hostname SourceName | reverse  

4103

Salena.Adam

James.browne

4103

Microsoft-Windows-Directory-Services-SAM

196

James

70