Query and report user logons relations from MS Windows Security Events
-
Updated
Aug 9, 2018 - Python
8000
Query and report user logons relations from MS Windows Security Events
Enterprise PowerShell & VBScript suite for Active Directory automation, ITSM-aligned provisioning, security hardening, and digital forensics - built for Windows Server and workstation environments by a Senior IAM Analyst with a focus on accuracy, scalability, and compliance.
Windows Server Active Directory IT automation cybersecurity PowerShell VBScript enterprise IT infrastructure scripting system administration identity management secure environments automation tools open-source digital forensics.
ThreatLens is a free, open-source AI assistant that analyses Windows Event Logs and Linux logs like a senior SOC analyst --- powered by Groq LLaMA 3.3 and local embeddings.
A useful tool to check for time modifications
Windows event logs practise samples - Large collection (evtx, json, csv formats)
Add a description, image, and links to the evtx-analisys topic page so that developers can more easily learn about it.
To associate your repository with the evtx-analisys topic, visit your repo's landing page and select "manage topics."