<feed xmlns="http://www.w3.org/2005/Atom"><title>pseventviewer</title><id>https://evotec.xyz/fr/tags/pseventviewer/index.atom.xml</id><updated>2020-08-28T15:39:28.0000000Z</updated><subtitle>Evotec Main Website</subtitle><link href="https://evotec.xyz/fr/tags/pseventviewer" /><link href="https://evotec.xyz/fr/tags/pseventviewer/index.atom.xml" rel="self" type="application/atom+xml" /><entry><title>Restoring (Recovering) PowerShell Scripts from Event Logs</title><id>https://evotec.xyz/fr/blog/restoring-recovering-powershell-scripts-from-event-logs</id><link href="https://evotec.xyz/fr/blog/restoring-recovering-powershell-scripts-from-event-logs" /><updated>2020-08-28T15:39:28.0000000Z</updated><summary>A few days ago, I was asked to take a look at PowerShell Malware. While I don’t know much about malware, my curiosity didn’t let me skip on this occasion, and I was handed over WindowsPowerShell.evtx file. Ok, that’s not what I expected! I wanted PowerShell .ps1 files that I can read and assess? Well, you play with the cards you were dealt with. What I was handed over was PowerShell Event Log. PowerShell writes whatever you execute, and it thinks it is risky, to Windows PowerShell Operation Event Log.</summary><category term="event log" /><category term="get-events" /><category term="powershell" /><category term="powershellmanager" /><category term="pseventviewer" /><category term="Windows" /></entry><entry><title>Four commands to help you track down insecure LDAP Bindings before March 2020</title><id>https://evotec.xyz/fr/blog/four-commands-to-help-you-track-down-insecure-ldap-bindings-before-march-2020</id><link href="https://evotec.xyz/fr/blog/four-commands-to-help-you-track-down-insecure-ldap-bindings-before-march-2020" /><updated>2020-01-19T19:54:06.0000000Z</updated><summary>In March 2020, Microsoft will release its monthly updates. With those updates, Microsoft will disable insecure LDAP Bindings, which is going to break a lot of your systems (hopefully not). But this was already communicated, and you know all about it, right? If not, you should read those two articles that can help you with understanding what is happening and when.</summary><category term="Active Directory" /><category term="adessentials" /><category term="powershell" /><category term="pseventviewer" /><category term="pswinreportingv2" /></entry><entry><title>Sending information to Event Log with extended fields using PowerShell</title><id>https://evotec.xyz/fr/blog/sending-information-to-event-log-with-extended-fields-using-powershell</id><link href="https://evotec.xyz/fr/blog/sending-information-to-event-log-with-extended-fields-using-powershell" /><updated>2020-01-01T16:22:02.0000000Z</updated><summary>Reading Event Logs is something that every admin does or at least should do quite often. When writing PowerShell scripts, you often need to read event logs to find out different things across your infrastructure. But now and then it’s quite the opposite. You need to write something to Event Log so it can be recorded for the future. Sure, you can write your information to log files, but since Windows already has a built-in logging system, it may be much easier to write stuff to event log. This allows you to centralize your event logs and processed by specialized tools like SIEM.</summary><category term="events pswinreporting" /><category term="PowerShell" /><category term="pseventviewer" /><category term="write-event" /></entry><entry><title>Active Directory – How to track down why and where the user account was locked out</title><id>https://evotec.xyz/fr/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out</id><link href="https://evotec.xyz/fr/blog/active-directory-how-to-track-down-why-and-where-the-user-account-was-locked-out" /><updated>2019-01-24T15:25:31.0000000Z</updated><summary>I’ve been working with Windows Events for a while now. One of the things I did to help me diagnose problems and reporting on Windows Events was to write PSEventViewer to help to parse the logs and write PSWinReporting to help monitor (with use of PSEventViewer) Domain Controllers for events that happen across the domain. It’s handy and I, get those excellent daily reports of what happened while I was gone.</summary><category term="active directory" /><category term="event viewer" /><category term="get-events" /><category term="get-winevent" /><category term="powershell" /><category term="pseventviewer" /><category term="pswinreporting" /><category term="windows" /><category term="windows server" /></entry><entry><title>Install-Module: The term Install-Module is not recognized as the name of cmdlet, function, script file or operable program</title><id>https://evotec.xyz/fr/blog/install-module-the-term-install-module-is-not-recognized-as-the-name-of-cmdlet-function-script-file-or-operable-program</id><link href="https://evotec.xyz/fr/blog/install-module-the-term-install-module-is-not-recognized-as-the-name-of-cmdlet-function-script-file-or-operable-program" /><updated>2018-07-25T08:15:53.0000000Z</updated><summary>Recently I was asked to implement PSWinReporting onto yet another domain. Happily I’ve started to install my 6 modules to…</summary><category term="install-module" /><category term="PowerShell" /><category term="pseventviewer" /><category term="psteams" /><category term="pswinreporting" /><category term="pswritecolor" /><category term="Windows" /></entry></feed>