Cybersecurity Ops with bash - Chapter 8 Solutions

Below are selected solutions for the Chapter 8 workshop questions from Cybersecurity Ops with bash.

Question 4

Modify to allow the user to specify the Windows log to be monitored by passing in a command-line argument.


The first line of code in identifies the Application log as the one that will be monitored.

The first line can be replace with the following:

This will use the value of the first argument passed to the script as the log to monitor. If no argument is provided it will default to Application.


© 2019 by Paul Troncone and Carl Albing