Splunk is one of the leading SIEM solutions in the market. It allows users to collect, analyze, and correlate network and machine logs in real time. It uses SPL (Search Processing Language) to make the search effective.
Almost the first thing we want to look into is the Fields pane (like many other SIEM tool). We want to get an idea of the data that are collected. Fields pane are located on the left side.
| fields to only display the fields we want
| search "Powershell" to search the keyword we want. (but not sure how this is different from directly typing the keyword in the search bar)
uniq to show only the unique, we can use dedup here to fitler out the duplicate result.
head, tail, sort to organize the result

top returns the top result (also count them)
chart count by Field also return the count number (but not in order like top)rename A as Btable allows us to only show the reuslt we want. (similar to SQL)
stats to return the stats