<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Analyzing PowerShell logs in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/660088#M227870</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Thank you very much for this suggestion.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 08 Oct 2023 04:35:00 GMT</pubDate>
    <dc:creator>quangnm21</dc:creator>
    <dc:date>2023-10-08T04:35:00Z</dc:date>
    <item>
      <title>Analyzing PowerShell logs in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/659994#M227842</link>
      <description>&lt;P&gt;Hello everyone. I'm currently working on a lab assignment and I'm having trouble understanding the meaning of two specific fields in PowerShell log hunting. Could someone please explain these two fields to me? I would greatly appreciate it. Thank you.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="quangnm21_0-1696604173479.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27486i336C8E3E81FF1481/image-size/medium?v=v2&amp;amp;px=400" role="button" title="quangnm21_0-1696604173479.png" alt="quangnm21_0-1696604173479.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="quangnm21_1-1696604205140.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27487iFFD98B94030DB25C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="quangnm21_1-1696604205140.png" alt="quangnm21_1-1696604205140.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 14:58:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/659994#M227842</guid>
      <dc:creator>quangnm21</dc:creator>
      <dc:date>2023-10-06T14:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Analyzing PowerShell logs in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/660005#M227844</link>
      <description>&lt;P&gt;I don't know PowerShell logs...but in a situation like this I would set the Selected to Yes for the fields you're trying to figure out.&amp;nbsp; Based on your screen shots, those fields appear for 100% of your events.&amp;nbsp; When you set that to Yes, you will see the field &amp;amp; value appear with each event in your results.&amp;nbsp; Then you can try and match up what the value is with the text that's there in the event.&lt;BR /&gt;&lt;BR /&gt;But - also keep in mind there could be calculated events, too.&amp;nbsp; For example, MessageTotal might be the # of bytes in the event, and won't actually appear within the data.&amp;nbsp; Having them displayed with each event will help you deduce what they might represent, though - if MessageTotal was 1 for a whole bunch of 1-byte events, then you know your answer.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="selected_yes.png" style="width: 853px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27488iE41D7D07521B5AB0/image-size/large?v=v2&amp;amp;px=999" role="button" title="selected_yes.png" alt="selected_yes.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 16:07:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/660005#M227844</guid>
      <dc:creator>_JP</dc:creator>
      <dc:date>2023-10-06T16:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Analyzing PowerShell logs in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/660088#M227870</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thank you very much for this suggestion.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2023 04:35:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Analyzing-PowerShell-logs-in-Splunk/m-p/660088#M227870</guid>
      <dc:creator>quangnm21</dc:creator>
      <dc:date>2023-10-08T04:35:00Z</dc:date>
    </item>
  </channel>
</rss>

