Adversaries commonly execute discovery commands such as net.exe, ipconfig.exe, and whoami.exe. Rather than query for each of these commands individually, you would like to use a single query with all of them. What Splunk operator is needed to complete the following query? aid=my-aid event_simpleName=ProcessRollup2 (FileName=net.exe __________ FileName=ipconfig.exe _________ FileName=whoami.exe) | table ComputerName UserName FileName CommandLine
nestorian
Highly Voted 1 year, 10 months agoalanalanalan
Most Recent 10 months agogr23
1 year, 4 months agoJimmy390
1 year, 7 months agoexamtopics3000
1 year, 9 months ago