Can someone help me with setting up a search that could pull version information from a Windows Defender event 1151 log?
I have the TA for Windows Defender app installed and I believe that the data is being parsed correctly. I am fairly new in getting started with Splunk and have been unable to determine what type of search syntax does what I want it to do.