Using Powershell to Extract Fields from Windows Event Logs

preview_player
Показать описание
A problem was raised on how to pull usernames, and times out of logon events in Windows Event Security Logs with Powershell. This video provides a step by step process of how a PowerShell script was created that helped achieve this goal.

00:00 Splash Screen
00:10 Introduction
01:40 Start with Get-Help
02:40 Determining the Required Parameters
03:54 Working with Get-EventLog
07:34 Assign Results to a Variable
07:55 Converto-Json
09:44 Adding Data to a Custom PS Object
10:50 Get-Content to import the json file
15:20 How to make script work with more than one Windows Event Log
15:50 Building a For Loop
19:36 Working with an Array[]

The PowerShell Playlist can be accessed below

The latest L.A.M.E. Splunk apps are available at
Рекомендации по теме
Комментарии
Автор

Great Job making this video.... This is golden for people who need to analyse 1000+ logs for a specific event. Finding something specific from the message has always been tedious.

ThePiyush