We continue our look at working with the Windows event log using PowerShell with 10 threat hunting techniques.