Skip to content

Latest commit

 

History

History
58 lines (52 loc) · 1.74 KB

Misc-WIndows-Events.md

File metadata and controls

58 lines (52 loc) · 1.74 KB

Get Windows Event Logs sumamry

Get-WinEvent -ListLog * | Select-Object * | Where-Object {($_.RecordCount -ne $null) -and ($_.RecordCount -ne 0)}

Get Logs

Get-Winevent -LogName "Windows PowerShell"
Get-WinEvent -LogName "Microsoft-Windows-Powershell/Operational"
Get-WinEvent -LogName "Microsoft-Windows-Sysmon/Operational"
Get-WinEvent -LogName "Microsoft-Windows-PrintService/Operational"
Get-WinEvent -LogName "Microsoft-Windows-AppLocker/EXE and DLL"

Clear all event logs

wevtutil el | Foreach-Object {wevtutil cl "$_"}

Filter Logs

Get-WinEvent -FilterHashtable @{LogName = "Security"; ID = "4663"}
Get-WinEvent -FilterHashTable @{LogName="Microsoft-Windows-AppLocker/EXE and DLL"; ID="8003","8004"} | select *

Get Logs (with XML data)

Get-WinEvent -FilterHashTable @{LogName="Microsoft-Windows-AppLocker/EXE and DLL"; ID="8002"} | Foreach-Object { $_.ToXml() }

Get AppLocker Logs (different info)

Get-AppLockerFileInformation –EventLog -LogPath "Microsoft-Windows-AppLocker/EXE and DLL" –EventType Audited –Statistics

Enable Windows Event Logs

$LogNames = @(
    "Microsoft-Windows-DriverFrameworks-UserMode/Operational",
    "Microsoft-Windows-Dhcp-Server/AuditLog",
    "Microsoft-Windows-Dhcp-Server/DebugLogs",
    "Microsoft-Windows-Dhcp-Server/FilterNotifications",
    "Microsoft-Windows-Dhcp-Server/Operational",
    "Microsoft-Windows-Dhcpv6-Client/Admin",
    "Microsoft-Windows-Dhcpv6-Client/Operational"
  )
ForEach ($LogName in $LogNames) {
    $EventLog = Get-WinEvent -ListLog $LogName
    if ($EventLog.IsEnabled) {
        Write-Host "Already enabled: $LogName"
    }
    else {
        Write-Host "Enabling: $LogName"
        $EventLog.IsEnabled = $true
        $EventLog.SaveChanges()
    }
}