About Get-AppLockerEventlog

0 23
This script can help researchers collect all important information related to ev...

About Get-AppLockerEventlog

This script can help researchers collect all important information related to events, which can then be applied to scenarios such as information security forensics, threat hunting, and troubleshooting.

The current version of Get-AppLockerEventlog supports extracting the following log information:

EXE

DLL

MSI

Script

Encapsulated App deployment

Encapsulated App execution

Valuable information that can be obtained

FileType,

EventID,

Message,

User,

Computer,

EventTime,

FilePath,

Publisher,

FileHash,

Package

RuleName,

LogName,

TargetUser.

Tool download

Since this script is developed based on PowerShell, we can only use this script on Windows devices or devices configured with PowerShell environments.

Researchers can use the following command to clone the source code of this project locally:

git clone https://github.com/RomaissaAdjailia/Get-AppLockerEventlog.git

Tool usage

HunType parameter

This parameter specifies the type of event you want to retrieve and provides four values for selection.

1、All

This option will retrieve all AppLocker event logs related to threat search, information security forensics, and troubleshooting. This option is also the default value for the HunType parameter:

.\Get-AppLockerEventlog.ps1 -HunType All

2、Block

This option will retrieve all events triggered by applications blocked by AppLocker. This type of event log is crucial for threat search or security forensics and has a high priority because it indicates an attempt at malicious behavior or suggests that previous malicious activities have attempted to bypass defense mechanisms:

.\Get-AppLockerEventlog.ps1 -HunType Block |Format-Table -AutoSize

3、Allow

This option can retrieve all events triggered by applications allowed by AppLocker. This log information is very important for threat search or security forensics, as well as application behavior monitoring, because it can help us detect any possible bypasses or configuration errors:

.\Get-AppLockerEventlog.ps1 -HunType Allow | Format-Table -AutoSize

4、Audit

If the enforcement mode (audit mode) is enabled, the tool will retrieve all events generated when AppLocker blocks applications. These events can help us check for misconfigurations and malicious operations that occurred during the audit phase:

.\Get-AppLockerEventlog.ps1 -HunType Audit

Output results

The analysis output of the tool will be displayed directly on the screen:

At the same time, the tool will output the results to a CSV file: AppLocker-log.csv

License agreement

The development and release of this project followMITOpen source license agreement.

Project address

Get-AppLockerEventlog:【GitHub Gateway

Reference materials

https://medium.com/@elromaissa2/diving-in-applocker-for-blue-team-57a7328ce5c0

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

About the related technologies and implementations associated with tracing the source of posts by PDD employees

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

9. Get the information about network protocols supported on this computer

Based on AbstractProcessor, MapStruct is extended to automatically generate entity mapping utility classes

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

最后修改时间:
admin
上一篇 2025年03月26日 17:43
下一篇 2025年03月26日 18:06

评论已关闭