Skip to content

Powershell Logs

Evidence: Powershell Logs
Description: Collect Powershell Logs
Category: System
Platform: windows
Short Name: pwrs
Is Parsed: No
Sent to Investigation Hub: Yes
Collect File(s): Yes

PowerShell transcription creates detailed logs of PowerShell sessions including all commands executed and their output. Transcription must be enabled via Group Policy or registry settings.

When enabled, transcripts are saved as text files and contain complete records of PowerShell activity, making them extremely valuable for detecting malicious PowerShell usage.

This collector gathers structured data about powershell logs.

FieldDescriptionExample
NameArtifact namePowershell Log
TypeFile or FolderFolder
SourcePathOriginal pathC:\Transcripts\PowerShell_transcript.DESKTOP.abc123.20231015143000.txt
PathRelative path in evidenceOther/PowerShell_transcript…

This collector:

  • Reads the transcript output directory from registry:
    • HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription - OutputDirectory value
    • HKCU\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription - OutputDirectory value
  • Collects all files from the configured transcript directories

PowerShell transcripts provide complete visibility into PowerShell command execution. Investigators use this data to identify malicious PowerShell commands, track attacker reconnaissance activities, detect PowerShell-based lateral movement, analyze encoded or obfuscated commands, and establish complete PowerShell activity timelines.