⽅法⼀:
图形化界⾯
搜索事件查看器,或者打开控制⾯板—⼩图标—管理⼯具—事件查看器 ⽅法⼆:
脚本执⾏
有效部位#在powershell⾥⾯先执⾏Set-ExecutionPolicy bypass
#在powershell⾥⾯执⾏.\wifilog.ps1
# Table Creation
$LogonActivityTable = New-Object system.Data.DataTable “wifi Activity”
# Create Columns
$date = New-Object system.Data.DataColumn "Date",([string])
$id = New-Object system.Data.DataColumn "Id",([string])
$name = New-Object system.Data.DataColumn "Name",([string])
# Add Columns to Table
wdm驱动
$lumns.add($date)
$lumns.add($id)
$lumns.add($name)地震烈度表
# Store each event from the Security Log with the specificed dates and computer in an array
$log = Get-WinEvent -FilterHashtable @{logname='Microsoft-Windows-NetworkProfile/Operational';id='10000','10001'}
奇伟鞋油
foreach ($i in $log){
$row = $LogonActivityTable.NewRow()
$row.date = $i.TimeCreated.ToString()
$row.id = $i.id
$row.name = $i.message.split()[4]
$LogonActivityTable.Rows.Add($row)
}
$LogonActivityTable| Out-GridView -Title "WIFI 记录"
保存为ps1的格式 如图:
以管理员⾝份运⾏cmd,打开powershell切到脚本⽬录执⾏
钋Set-ExecutionPolicy bypass
.\wifilog.ps1
结果