How to send Windows logs from an on premises windows machine to Microsoft Sentinel?

Colin R 0 Reputation points
2025-01-21T21:40:59.6366667+00:00

Hi,

I'm trying to set up Microsoft Sentinel, and I need to forward windows logs from all of our machines. I'm experimenting with the configuration on a machine running Windows 11 Pro, then plan to copy the configuration across the rest of our machines.

I'm using the following documentation:

I've installed the Azure Monitor Agent on the machine, but I noticed that there wasn't anything in the agent to point it/connect it to my Microsoft Sentinel instance. After some reading, I connected my Windows 11 Pro machine to Azure via Arc. After that, I created a data collection rule where I was able to select the Windows 11 Pro Machine, and I selected all logs. I've also created a Log Analytics Workspace and a Data Collection Endpoint.

I am still not receiving any logs, not even heartbeat logs. Though it seems like I should be? Am I missing something? I have wasted so much trying to get this working. The old monitoring solution seemed much simpler, but it has been deprecated.

Thanks,

Windows
Windows
A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.
5,746 questions
Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,210 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Akhilesh Vallamkonda 11,360 Reputation points Microsoft Vendor
    2025-01-23T21:01:19.7833333+00:00

    Hi @Colin R

    Thank you for reaching us!

    May I know Which connecter you have used is it Windows Security Events via AMA or Security Events via Legacy Agent.

    where you have created the data collection rule? is the rule is created in the data collection rule tab, or the rule is created in the content hub under the Windows Security Events via AMA.

    If the rule is created data collection rule tab the mapping of data ingestion happens to events.

    If the rule is create Windows Security Events via AMA the data ingestion happens to Security events. Please ensure create the rule inside the data connector configuration.

    If this is not the case troubleshoot by check your Data collection rule in JASON contains a section for 'windowsEventLogs'. If not create DCR.

    Check that the file C:\WindowsAzure\Resources\AMADataStore.<virtual-machine-name>\mcs\mcsconfig.lkg.xml exists.

    Open the file and check if it contains Subscription nodes as shown in the example below:

    <Subscription eventName="c9302257006473204344_14882095577508259570" 
    query="System!*[System[(Level = 1 or Level = 2 or Level = 3)]]">
        <Column name="ProviderGuid" type="mt:wstr" defaultAssignment="00000000-0000-0000-0000-000000000000">
          <Value>/Event/System/Provider/@Guid</Value>
        </Column>
        ...
        </Column>
    </Subscription>
    

    Reference: Troubleshooting guidance for the Azure Monitor agent on Windows virtual machines and scale sets https://techcommunity.microsoft.com/blog/fasttrackforazureblog/windows-events-how-to-collect-them-in-sentinel-and-which-way-is-preferred-to-det/3997342

    Hope this helps. Do let us know if you any further queries by responding in the comments section.

    Thanks,

    Akhilesh V.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.