<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>pseventviewer</title><link>https://evotec.xyz/de/tags/pseventviewer</link><description>Evotec Main Website</description><atom:link href="https://evotec.xyz/de/tags/pseventviewer/index.xml" rel="self" type="application/rss+xml" /><item><title>Restoring (Recovering) PowerShell Scripts from Event Logs</title><link>https://evotec.xyz/de/blog/restoring-recovering-powershell-scripts-from-event-logs</link><description>A few days ago, I was asked to take a look at PowerShell Malware. While I don’t know much about malware, my curiosity didn’t let me skip on this occasion, and I was handed over WindowsPowerShell.evtx file. Ok, that’s not what I expected! I wanted PowerShell .ps1 files that I can read and assess? Well, you play with the cards you were dealt with. What I was handed over was PowerShell Event Log. PowerShell writes whatever you execute, and it thinks it is risky, to Windows PowerShell Operation Event Log.</description><pubDate>Fri, 28 Aug 2020 15:39:28 GMT</pubDate><guid>https://evotec.xyz/de/blog/restoring-recovering-powershell-scripts-from-event-logs</guid><category>event log</category><category>get-events</category><category>powershell</category><category>powershellmanager</category><category>pseventviewer</category><category>Windows</category></item><item><title>Four commands to help you track down insecure LDAP Bindings before March 2020</title><link>https://evotec.xyz/de/blog/four-commands-to-help-you-track-down-insecure-ldap-bindings-before-march-2020</link><description>In March 2020, Microsoft will release its monthly updates. With those updates, Microsoft will disable insecure LDAP Bindings, which is going to break a lot of your systems (hopefully not). But this was already communicated, and you know all about it, right? If not, you should read those two articles that can help you with understanding what is happening and when.</description><pubDate>Sun, 19 Jan 2020 19:54:06 GMT</pubDate><guid>https://evotec.xyz/de/blog/four-commands-to-help-you-track-down-insecure-ldap-bindings-before-march-2020</guid><category>Active Directory</category><category>adessentials</category><category>powershell</category><category>pseventviewer</category><category>pswinreportingv2</category></item><item><title>Sending information to Event Log with extended fields using PowerShell</title><link>https://evotec.xyz/de/blog/sending-information-to-event-log-with-extended-fields-using-powershell</link><description>Reading Event Logs is something that every admin does or at least should do quite often. When writing PowerShell scripts, you often need to read event logs to find out different things across your infrastructure. But now and then it’s quite the opposite. You need to write something to Event Log so it can be recorded for the future. Sure, you can write your information to log files, but since Windows already has a built-in logging system, it may be much easier to write stuff to event log. This allows you to centralize your event logs and processed by specialized tools like SIEM.</description><pubDate>Wed, 01 Jan 2020 16:22:02 GMT</pubDate><guid>https://evotec.xyz/de/blog/sending-information-to-event-log-with-extended-fields-using-powershell</guid><category>events pswinreporting</category><category>PowerShell</category><category>pseventviewer</category><category>write-event</category></item><item><title>Active Directory – How to track down why and where the user account was locked out</title><link>https://evotec.xyz/de/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out</link><description>I’ve been working with Windows Events for a while now. One of the things I did to help me diagnose problems and reporting on Windows Events was to write PSEventViewer to help to parse the logs and write PSWinReporting to help monitor (with use of PSEventViewer) Domain Controllers for events that happen across the domain. It’s handy and I, get those excellent daily reports of what happened while I was gone.</description><pubDate>Thu, 24 Jan 2019 15:25:31 GMT</pubDate><guid>https://evotec.xyz/de/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out</guid><category>active directory</category><category>event viewer</category><category>get-events</category><category>get-winevent</category><category>powershell</category><category>pseventviewer</category><category>pswinreporting</category><category>windows</category><category>windows server</category></item><item><title>Install-Module: The term Install-Module is not recognized as the name of cmdlet, function, script file or operable program</title><link>https://evotec.xyz/de/blog/install-module-the-term-install-module-is-not-recognized-as-the-name-of-cmdlet-function-script-file-or-operable-program</link><description>Recently I was asked to implement PSWinReporting onto yet another domain. Happily I’ve started to install my 6 modules to…</description><pubDate>Wed, 25 Jul 2018 08:15:53 GMT</pubDate><guid>https://evotec.xyz/de/blog/install-module-the-term-install-module-is-not-recognized-as-the-name-of-cmdlet-function-script-file-or-operable-program</guid><category>install-module</category><category>PowerShell</category><category>pseventviewer</category><category>psteams</category><category>pswinreporting</category><category>pswritecolor</category><category>Windows</category></item></channel></rss>