event_platform=Win event_simpleName IN (UserAccountCreated, UserAccountDeleted)
| convert ctime(ContextTimeStamp_decimal) as TimeStamp
| rename RpcClientProcessId_decimal as falconPID
| eval ProcExplorer=case(falconPID!="","https://falcon.crowdstrike.com/investigate/process-explorer/" .aid. "/" . falconPID)
| table TimeStamp, aid, ComputerName event_simpleName, UserName, UserRid, ProcExplorer