$ 0 0 I was watching a very interesting video "Windows Security Log Secrets" the other day this looked as a useful rule to implement. Can anybody help me put this one together?