Replies: 1 comment 2 replies
-
And honestly, it's not just process information, but much more than that as well: process names, process PIDs, usernames, accounts and domains, most of the other tools I'm seeing parse this information out. With winevtlog I can see these values in the |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm comparing output from fluent bit's winevtlog input to similar tools such as Winlogbeat and evtx.
With these other tools, process information about an executable (e.g.,
C:\Program Files\Google\Chrome\Application\chrome.exe
) or command line (e.g.,C:\Windows\System32\RuntimeBroker.exe -Embedding
) are available in specific fields for these values. With fluent bit's winevtlog, I can sometimes see executable names in the stringinserts, but this is much less convenient than filtering directly on a field intended for this purpose.Is there a way to get this sort of process information in the output of fluent bit's windows event log input? Or do I have to do post-processing of StringInserts and look for strings ending in
.exe
or something like that to get the same effect?Beta Was this translation helpful? Give feedback.
All reactions