Adversaries commonly execute discovery commands such as net.exe, ipconfig.exe, and whoami.exe. Rather than query for each of these commands individually, you would like to use a single query with all of them. What Splunk operator is needed to complete the following query? aid=my-aid event_simpleName=ProcessRollup2 (FileName=net.exe __________ FileName=ipconfig.exe _________ FileName=whoami.exe) | table ComputerName UserName FileName CommandLine
nestorian
Highly Voted 1 year, 4 months agoalanalanalan
Most Recent 4 months, 2 weeks agogr23
10 months, 2 weeks agoJimmy390
1 year, 1 month agoexamtopics3000
1 year, 3 months ago