<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>get-events</title><link>https://evotec.xyz/fr/tags/get-events</link><description>Evotec Main Website</description><atom:link href="https://evotec.xyz/fr/tags/get-events/index.xml" rel="self" type="application/rss+xml" /><item><title>Restoring (Recovering) PowerShell Scripts from Event Logs</title><link>https://evotec.xyz/fr/blog/restoring-recovering-powershell-scripts-from-event-logs</link><description>A few days ago, I was asked to take a look at PowerShell Malware. While I don’t know much about malware, my curiosity didn’t let me skip on this occasion, and I was handed over WindowsPowerShell.evtx file. Ok, that’s not what I expected! I wanted PowerShell .ps1 files that I can read and assess? Well, you play with the cards you were dealt with. What I was handed over was PowerShell Event Log. PowerShell writes whatever you execute, and it thinks it is risky, to Windows PowerShell Operation Event Log.</description><pubDate>Fri, 28 Aug 2020 15:39:28 GMT</pubDate><guid>https://evotec.xyz/fr/blog/restoring-recovering-powershell-scripts-from-event-logs</guid><category>event log</category><category>get-events</category><category>powershell</category><category>powershellmanager</category><category>pseventviewer</category><category>Windows</category></item><item><title>Active Directory – How to track down why and where the user account was locked out</title><link>https://evotec.xyz/fr/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out</link><description>I’ve been working with Windows Events for a while now. One of the things I did to help me diagnose problems and reporting on Windows Events was to write PSEventViewer to help to parse the logs and write PSWinReporting to help monitor (with use of PSEventViewer) Domain Controllers for events that happen across the domain. It’s handy and I, get those excellent daily reports of what happened while I was gone.</description><pubDate>Thu, 24 Jan 2019 15:25:31 GMT</pubDate><guid>https://evotec.xyz/fr/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out</guid><category>active directory</category><category>event viewer</category><category>get-events</category><category>get-winevent</category><category>powershell</category><category>pseventviewer</category><category>pswinreporting</category><category>windows</category><category>windows server</category></item><item><title>Working with Windows Events with PowerShell</title><link>https://evotec.xyz/fr/blog/working-with-windows-events-with-powershell</link><description>As you may (and should) know Event Log is your first place to look for explanations on why server/client is…</description><pubDate>Mon, 28 May 2018 09:28:21 GMT</pubDate><guid>https://evotec.xyz/fr/blog/working-with-windows-events-with-powershell</guid><category>Active Directory</category><category>event viewer</category><category>Exchange</category><category>get-events</category><category>get-winevent</category><category>microsoft</category><category>powershell</category><category>windows</category></item><item><title>Get-EventsLibrary.ps1 – Monitoring Events PowerShell</title><link>https://evotec.xyz/fr/blog/get-eventslibrary-ps1-monitoring-events-powershell</link><description>This event library (Get-EventsLibrary.ps1) is PowerShell script that parses Security (mostly) logs on Domain Controllers. It has few reports capabilities…</description><pubDate>Thu, 19 Apr 2018 09:48:35 GMT</pubDate><guid>https://evotec.xyz/fr/blog/get-eventslibrary-ps1-monitoring-events-powershell</guid><category>active directory</category><category>ad</category><category>domain controller</category><category>get-events</category><category>monitoring</category><category>powershell</category><category>Windows</category></item></channel></rss>