Compare commits
28 Commits
Author | SHA1 | Date |
---|---|---|
|
f238aeaf05 | 7 months ago |
|
32e37585cd | 7 months ago |
|
4cbd982f74 | 7 months ago |
|
71f46cb052 | 7 months ago |
|
1f9b203953 | 7 months ago |
|
3356a0b7bc | 7 months ago |
|
2b5e393a58 | 7 months ago |
|
4629e94830 | 7 months ago |
|
7e5af04ca5 | 7 months ago |
|
09007270c3 | 7 months ago |
|
aadd24d025 | 7 months ago |
|
58eb17b849 | 7 months ago |
|
8ad48ca390 | 7 months ago |
|
340a7f96e3 | 7 months ago |
|
fc00532c2d | 7 months ago |
|
e222c39967 | 7 months ago |
|
bf5a070658 | 7 months ago |
|
8bc3507637 | 7 months ago |
|
e9cff0e553 | 7 months ago |
|
7424167841 | 7 months ago |
|
602d857b22 | 8 months ago |
|
541df41774 | 8 months ago |
|
865d77c51c | 8 months ago |
|
ca84da7bc3 | 8 months ago |
|
c32c950dc4 | 8 months ago |
|
19501d4439 | 8 months ago |
|
2cb80c58a1 | 8 months ago |
|
51da9a2377 | 8 months ago |
Binary file not shown.
@ -1,99 +1,100 @@
|
||||
[
|
||||
{
|
||||
"name": "Suspicious User Agent",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE UserAgent LIKE '%python%' OR UserAgent LIKE '%ruler%' OR UserAgent LIKE '%curl%' OR UserAgent LIKE '%Wget%' OR UserAgent LIKE '%python-requests%' OR UserAgent LIKE '%AADInternals%' OR UserAgent LIKE '%azurehound%' OR UserAgent LIKE '%axios%' OR UserAgent LIKE '%BAV2ROPC%' "
|
||||
},
|
||||
{
|
||||
"name": "User adding or removing Inbox Rule",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%InboxRule%' OR Operation LIKE 'Set-Mailbox' OR Operation LIKE '%DeliverToMailboxAndForward%' OR Operation LIKE '%ForwardingAddress%' OR Operation LIKE '%ForwardingAddress%' "
|
||||
},
|
||||
{
|
||||
"name": "After Hours Activity",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE (CASE WHEN CAST(substr(CreationTime, 12, 2) AS INTEGER) < 0 THEN 24 + (CAST(substr(CreationTime, 12, 2) AS INTEGER)) ELSE CAST(substr(CreationTime, 12, 2) AS INTEGER) END >= 20 OR CASE WHEN CAST(substr(CreationTime, 12, 2) AS INTEGER) < 0 THEN 24 + (CAST(substr(CreationTime, 12, 2) AS INTEGER)) ELSE CAST(substr(CreationTime, 12, 2) AS INTEGER) END < 6) AND NOT (Operation LIKE 'File%' OR Operation LIKE 'List%' OR Operation LIKE 'Page%' OR Operation LIKE '%UserLogin%');"
|
||||
},
|
||||
{
|
||||
"name": "Possible file exfiltration",
|
||||
"severity": "Low",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%FileUploaded%' "
|
||||
},
|
||||
{
|
||||
"name": "Admin searching in emails of other users",
|
||||
"severity": "Low",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%SearchStarted%' OR Operation LIKE '%SearchExportDownloaded%' OR Operation LIKE '%ViewedSearchExported%' "
|
||||
},
|
||||
{
|
||||
"name": "Strong Authentication Disabled",
|
||||
"severity": "medium",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%disable strong authentication%'"
|
||||
},
|
||||
{
|
||||
"name": "User added to admin group",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%add member to group%' AND ModifiedProperties Like '%admin%') OR ( Operation LIKE '%AddedToGroup%' AND TargetUserOrGroupName Like '%admin%') "
|
||||
},
|
||||
{
|
||||
"name": "New Policy created",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%add policy%' ) "
|
||||
},
|
||||
{
|
||||
"name": "Security Alert triggered",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%AlertTriggered%' AND NOT Severity Like '%Low%') "
|
||||
},
|
||||
{
|
||||
"name": "Transport rules ( mail flow rules ) modified",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%TransportRule%') "
|
||||
},
|
||||
{
|
||||
"name": "An application was registered in Azure AD",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Add service principal.%') "
|
||||
},
|
||||
{
|
||||
"name": "Add app role assignment grant to user",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Add app role assignment grant to user.%') "
|
||||
},
|
||||
{
|
||||
"name": "eDiscovery Abuse",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%New-ComplianceSearch%') "
|
||||
},
|
||||
{
|
||||
"name": "Operations affecting OAuth Applications",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'Add application.' OR Operation = 'Update application' OR Operation = 'Add service principal.' OR Operation = 'Update application Certificates and secrets management' OR Operation = 'Update applicationUpdate service principal.' OR Operation = 'Add app role assignment grant to user.' OR Operation = 'Add delegated permission grant.' OR Operation = 'Add owner to application.' OR Operation = 'Add owner to service principal.') "
|
||||
},
|
||||
{
|
||||
"name": "Suspicious Operations affecting Mailbox ",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'Set-MailboxJunkEmailConfiguration' OR Operation = 'SoftDelete' OR Operation = 'SendAs' OR Operation = 'HardDelete' OR Operation = 'MoveToDeletedItems' ) "
|
||||
},
|
||||
{
|
||||
"name": "Suspicious Operations affecting SharePoint ",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'AddedToSecureLink' OR Operation = 'SearchQueryPerformed' OR Operation = 'SecureLinkCreated' OR Operation = 'SecureLinkUpdated' OR Operation = 'SharingInvitationCreated' ) "
|
||||
},
|
||||
{
|
||||
"name": "User Modifying RetentionPolicy ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%UnifiedAuditLogRetentionPolicy%' ) "
|
||||
},
|
||||
{
|
||||
"name": "User Modifying Audit Logging ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%AdminAuditLogConfig%' ) "
|
||||
},
|
||||
{
|
||||
"name": "String Authentication Disabled ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Disable Strong Authentication.%' ) "
|
||||
}
|
||||
|
||||
|
||||
]
|
||||
{
|
||||
"description": "此 JSON 文件包含与 O365 安全检测相关的规则,每条规则包括名称、严重性等级和查询语句。",
|
||||
"rules": [
|
||||
{
|
||||
"name": "Suspicious User Agent",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE UserAgent LIKE '%python%' OR UserAgent LIKE '%ruler%' OR UserAgent LIKE '%curl%' OR UserAgent LIKE '%Wget%' OR UserAgent LIKE '%python-requests%' OR UserAgent LIKE '%AADInternals%' OR UserAgent LIKE '%azurehound%' OR UserAgent LIKE '%axios%' OR UserAgent LIKE '%BAV2ROPC%' "
|
||||
},
|
||||
{
|
||||
"name": "User adding or removing Inbox Rule",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%InboxRule%' OR Operation LIKE 'Set-Mailbox' OR Operation LIKE '%DeliverToMailboxAndForward%' OR Operation LIKE '%ForwardingAddress%' OR Operation LIKE '%ForwardingAddress%' "
|
||||
},
|
||||
{
|
||||
"name": "After Hours Activity",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE (CASE WHEN CAST(substr(CreationTime, 12, 2) AS INTEGER) < 0 THEN 24 + (CAST(substr(CreationTime, 12, 2) AS INTEGER)) ELSE CAST(substr(CreationTime, 12, 2) AS INTEGER) END >= 20 OR CASE WHEN CAST(substr(CreationTime, 12, 2) AS INTEGER) < 0 THEN 24 + (CAST(substr(CreationTime, 12, 2) AS INTEGER)) ELSE CAST(substr(CreationTime, 12, 2) AS INTEGER) END < 6) AND NOT (Operation LIKE 'File%' OR Operation LIKE 'List%' OR Operation LIKE 'Page%' OR Operation LIKE '%UserLogin%');"
|
||||
},
|
||||
{
|
||||
"name": "Possible file exfiltration",
|
||||
"severity": "Low",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%FileUploaded%' "
|
||||
},
|
||||
{
|
||||
"name": "Admin searching in emails of other users",
|
||||
"severity": "Low",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%SearchStarted%' OR Operation LIKE '%SearchExportDownloaded%' OR Operation LIKE '%ViewedSearchExported%' "
|
||||
},
|
||||
{
|
||||
"name": "Strong Authentication Disabled",
|
||||
"severity": "medium",
|
||||
"query": "SELECT * FROM events WHERE Operation LIKE '%disable strong authentication%'"
|
||||
},
|
||||
{
|
||||
"name": "User added to admin group",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%add member to group%' AND ModifiedProperties Like '%admin%') OR ( Operation LIKE '%AddedToGroup%' AND TargetUserOrGroupName Like '%admin%') "
|
||||
},
|
||||
{
|
||||
"name": "New Policy created",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%add policy%' ) "
|
||||
},
|
||||
{
|
||||
"name": "Security Alert triggered",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%AlertTriggered%' AND NOT Severity Like '%Low%') "
|
||||
},
|
||||
{
|
||||
"name": "Transport rules ( mail flow rules ) modified",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%TransportRule%') "
|
||||
},
|
||||
{
|
||||
"name": "An application was registered in Azure AD",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Add service principal.%') "
|
||||
},
|
||||
{
|
||||
"name": "Add app role assignment grant to user",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Add app role assignment grant to user.%') "
|
||||
},
|
||||
{
|
||||
"name": "eDiscovery Abuse",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%New-ComplianceSearch%') "
|
||||
},
|
||||
{
|
||||
"name": "Operations affecting OAuth Applications",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'Add application.' OR Operation = 'Update application' OR Operation = 'Add service principal.' OR Operation = 'Update application Certificates and secrets management' OR Operation = 'Update applicationUpdate service principal.' OR Operation = 'Add app role assignment grant to user.' OR Operation = 'Add delegated permission grant.' OR Operation = 'Add owner to application.' OR Operation = 'Add owner to service principal.') "
|
||||
},
|
||||
{
|
||||
"name": "Suspicious Operations affecting Mailbox ",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'Set-MailboxJunkEmailConfiguration' OR Operation = 'SoftDelete' OR Operation = 'SendAs' OR Operation = 'HardDelete' OR Operation = 'MoveToDeletedItems' ) "
|
||||
},
|
||||
{
|
||||
"name": "Suspicious Operations affecting SharePoint ",
|
||||
"severity": "Medium",
|
||||
"query": "SELECT * FROM events WHERE ( Operation = 'AddedToSecureLink' OR Operation = 'SearchQueryPerformed' OR Operation = 'SecureLinkCreated' OR Operation = 'SecureLinkUpdated' OR Operation = 'SharingInvitationCreated' ) "
|
||||
},
|
||||
{
|
||||
"name": "User Modifying RetentionPolicy ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%UnifiedAuditLogRetentionPolicy%' ) "
|
||||
},
|
||||
{
|
||||
"name": "User Modifying Audit Logging ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%AdminAuditLogConfig%' ) "
|
||||
},
|
||||
{
|
||||
"name": "String Authentication Disabled ",
|
||||
"severity": "High",
|
||||
"query": "SELECT * FROM events WHERE ( Operation LIKE '%Disable Strong Authentication.%' ) "
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
Before Width: | Height: | Size: 10 KiB |
Before Width: | Height: | Size: 236 KiB |
Before Width: | Height: | Size: 86 KiB |
Before Width: | Height: | Size: 70 KiB |
Before Width: | Height: | Size: 222 KiB |
@ -1,101 +1,107 @@
|
||||
try{
|
||||
New-Item -ItemType "directory" -Path "wineventlog"
|
||||
|
||||
# 尝试创建一个名为 "wineventlog" 的目录
|
||||
try {
|
||||
New-Item -ItemType "directory" -Path "wineventlog"
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "can't create a new directory"
|
||||
catch {
|
||||
# 如果创建目录失败,输出错误信息
|
||||
echo "can't create a new directory"
|
||||
}
|
||||
|
||||
try{
|
||||
get-eventlog -log Security | export-csv wineventlog/Security.csv
|
||||
# 尝试获取安全日志并导出为 CSV 文件
|
||||
try {
|
||||
get-eventlog -log Security | export-csv wineventlog/Security.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Security Logs"
|
||||
catch {
|
||||
# 如果获取安全日志失败,输出错误信息
|
||||
echo "Can't retrieve Security Logs"
|
||||
}
|
||||
|
||||
try
|
||||
{
|
||||
Get-WinEvent -LogName System | export-csv wineventlog/System.csv
|
||||
# 尝试获取系统日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName System | export-csv wineventlog/System.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve System Logs"
|
||||
catch {
|
||||
# 如果获取系统日志失败,输出错误信息
|
||||
echo "Can't retrieve System Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName Application | export-csv wineventlog/Application.csv
|
||||
# 尝试获取应用程序日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName Application | export-csv wineventlog/Application.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Application Logs"
|
||||
catch {
|
||||
# 如果获取应用程序日志失败,输出错误信息
|
||||
echo "Can't retrieve Application Logs"
|
||||
}
|
||||
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName "Windows PowerShell" | export-csv wineventlog/Windows_PowerShell.csv
|
||||
# 尝试获取 Windows PowerShell 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName "Windows PowerShell" | export-csv wineventlog/Windows_PowerShell.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Windows PowerShell Logs"
|
||||
catch {
|
||||
# 如果获取 Windows PowerShell 日志失败,输出错误信息
|
||||
echo "Can't retrieve Windows PowerShell Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-LocalSessionManager/Operational" | export-csv wineventlog/LocalSessionManager.csv
|
||||
# 尝试获取 Microsoft-Windows-TerminalServices-LocalSessionManager/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-LocalSessionManager/Operational" | export-csv wineventlog/LocalSessionManager.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 LocalSessionManager 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" | export-csv wineventlog/Windows_Defender.csv
|
||||
# 尝试获取 Microsoft-Windows-Windows Defender/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" | export-csv wineventlog/Windows_Defender.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-Windows Defender/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 Windows Defender 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-Windows Defender/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName Microsoft-Windows-TaskScheduler/Operational | export-csv wineventlog/TaskScheduler.csv
|
||||
# 尝试获取 Microsoft-Windows-TaskScheduler/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName Microsoft-Windows-TaskScheduler/Operational | export-csv wineventlog/TaskScheduler.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-TaskScheduler/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 TaskScheduler 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-TaskScheduler/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName Microsoft-Windows-WinRM/Operational | export-csv wineventlog/WinRM.csv
|
||||
# 尝试获取 Microsoft-Windows-WinRM/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName Microsoft-Windows-WinRM/Operational | export-csv wineventlog/WinRM.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-WinRM/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 WinRM 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-WinRM/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName Microsoft-Windows-Sysmon/Operational | export-csv wineventlog/Sysmon.csv
|
||||
# 尝试获取 Microsoft-Windows-Sysmon/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName Microsoft-Windows-Sysmon/Operational | export-csv wineventlog/Sysmon.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-Sysmon/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 Sysmon 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-Sysmon/Operational Logs"
|
||||
}
|
||||
|
||||
|
||||
try{
|
||||
Get-WinEvent -LogName Microsoft-Windows-PowerShell/Operational | export-csv wineventlog/Powershell_Operational.csv
|
||||
# 尝试获取 Microsoft-Windows-PowerShell/Operational 日志并导出为 CSV 文件
|
||||
try {
|
||||
Get-WinEvent -LogName Microsoft-Windows-PowerShell/Operational | export-csv wineventlog/Powershell_Operational.csv
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-PowerShell/Operational Logs"
|
||||
catch {
|
||||
# 如果获取 PowerShell Operational 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-PowerShell/Operational Logs"
|
||||
}
|
||||
|
||||
|
||||
try
|
||||
{
|
||||
Compress-Archive -Path wineventlog -DestinationPath ./logs.zip
|
||||
# 尝试压缩 "wineventlog" 目录为 logs.zip
|
||||
try {
|
||||
Compress-Archive -Path wineventlog -DestinationPath ./logs.zip
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "couldn't compress the the log folder "
|
||||
catch {
|
||||
# 如果压缩失败,输出错误信息
|
||||
echo "couldn't compress the log folder"
|
||||
}
|
||||
|
@ -1,101 +1,107 @@
|
||||
try{
|
||||
New-Item -ItemType "directory" -Path "wineventlog"
|
||||
|
||||
# 尝试创建一个名为 "wineventlog" 的目录
|
||||
try {
|
||||
New-Item -ItemType "directory" -Path "wineventlog"
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "can't create a new directory"
|
||||
catch {
|
||||
# 如果创建目录失败,输出错误信息
|
||||
echo "can't create a new directory"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl Security wineventlog/Security.evtx
|
||||
# 尝试导出安全日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Security wineventlog/Security.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Security Logs"
|
||||
catch {
|
||||
# 如果导出安全日志失败,输出错误信息
|
||||
echo "Can't retrieve Security Logs"
|
||||
}
|
||||
|
||||
try
|
||||
{
|
||||
wevtutil epl System wineventlog/System.evtx
|
||||
# 尝试导出系统日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl System wineventlog/System.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve System Logs"
|
||||
catch {
|
||||
# 如果导出系统日志失败,输出错误信息
|
||||
echo "Can't retrieve System Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl Application wineventlog/Application.evtx
|
||||
# 尝试导出应用程序日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Application wineventlog/Application.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Application Logs"
|
||||
catch {
|
||||
# 如果导出应用程序日志失败,输出错误信息
|
||||
echo "Can't retrieve Application Logs"
|
||||
}
|
||||
|
||||
|
||||
try{
|
||||
wevtutil epl "Windows PowerShell" wineventlog/Windows_PowerShell.evtx
|
||||
# 尝试导出 Windows PowerShell 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl "Windows PowerShell" wineventlog/Windows_PowerShell.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Windows PowerShell Logs"
|
||||
catch {
|
||||
# 如果导出 Windows PowerShell 日志失败,输出错误信息
|
||||
echo "Can't retrieve Windows PowerShell Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl "Microsoft-Windows-TerminalServices-LocalSessionManager/Operational" wineventlog/LocalSessionManager.evtx
|
||||
# 尝试导出 Microsoft-Windows-TerminalServices-LocalSessionManager/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl "Microsoft-Windows-TerminalServices-LocalSessionManager/Operational" wineventlog/LocalSessionManager.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 LocalSessionManager 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl "Microsoft-Windows-Windows Defender/Operational" wineventlog/Windows_Defender.evtx
|
||||
# 尝试导出 Microsoft-Windows-Windows Defender/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl "Microsoft-Windows-Windows Defender/Operational" wineventlog/Windows_Defender.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-Windows Defender/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 Windows Defender 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-Windows Defender/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl Microsoft-Windows-TaskScheduler/Operational wineventlog/TaskScheduler.evtx
|
||||
# 尝试导出 Microsoft-Windows-TaskScheduler/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Microsoft-Windows-TaskScheduler/Operational wineventlog/TaskScheduler.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-TaskScheduler/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 TaskScheduler 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-TaskScheduler/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl Microsoft-Windows-WinRM/Operational wineventlog/WinRM.evtx
|
||||
# 尝试导出 Microsoft-Windows-WinRM/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Microsoft-Windows-WinRM/Operational wineventlog/WinRM.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-WinRM/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 WinRM 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-WinRM/Operational Logs"
|
||||
}
|
||||
|
||||
try{
|
||||
wevtutil epl Microsoft-Windows-Sysmon/Operational wineventlog/Sysmon.evtx
|
||||
# 尝试导出 Microsoft-Windows-Sysmon/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Microsoft-Windows-Sysmon/Operational wineventlog/Sysmon.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-Sysmon/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 Sysmon 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-Sysmon/Operational Logs"
|
||||
}
|
||||
|
||||
|
||||
try{
|
||||
wevtutil epl Microsoft-Windows-PowerShell/Operational wineventlog/Powershell_Operational.evtx
|
||||
# 尝试导出 Microsoft-Windows-PowerShell/Operational 日志到指定的 EVTX 文件
|
||||
try {
|
||||
wevtutil epl Microsoft-Windows-PowerShell/Operational wineventlog/Powershell_Operational.evtx
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "Can't retrieve Microsoft-Windows-PowerShell/Operational Logs"
|
||||
catch {
|
||||
# 如果导出 PowerShell Operational 日志失败,输出错误信息
|
||||
echo "Can't retrieve Microsoft-Windows-PowerShell/Operational Logs"
|
||||
}
|
||||
|
||||
|
||||
try
|
||||
{
|
||||
Compress-Archive -Path wineventlog -DestinationPath ./logs.zip
|
||||
}
|
||||
catch
|
||||
{
|
||||
echo "couldn't compress the the log folder "
|
||||
}
|
||||
# 尝试压缩 "wineventlog" 目录为 logs.zip
|
||||
try {
|
||||
Compress-Archive -Path wineventlog -DestinationPath ./logs.zip
|
||||
}
|
||||
catch {
|
||||
# 如果压缩失败,输出错误信息
|
||||
echo "couldn't compress the log folder"
|
||||
}
|
Loading…
Reference in new issue