All Apps and Add-ons

How to extract version information from event viewer logs for Windows Defender?

New Member

Can someone help me with setting up a search that could pull version information from a Windows Defender event 1151 log?

I have the TA for Windows Defender app installed and I believe that the data is being parsed correctly. I am fairly new in getting started with Splunk and have been unable to determine what type of search syntax does what I want it to do.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...