Port 22

Month of PowerShell - Working with the Event Log, Part 2 - Threat Hunting with Event Logs

We continue our look at working with the Windows event log using PowerShell with 10 threat hunting techniques.