Hi @Colin R
Thank you for reaching us!
May I know Which connecter you have used is it Windows Security Events via AMA or Security Events via Legacy Agent.
where you have created the data collection rule? is the rule is created in the data collection rule tab, or the rule is created in the content hub under the Windows Security Events via AMA.
If the rule is created data collection rule tab the mapping of data ingestion happens to events.
If the rule is create Windows Security Events via AMA the data ingestion happens to Security events. Please ensure create the rule inside the data connector configuration.
If this is not the case troubleshoot by check your Data collection rule in JASON contains a section for 'windowsEventLogs'. If not create DCR.
Check that the file C:\WindowsAzure\Resources\AMADataStore.<virtual-machine-name>\mcs\mcsconfig.lkg.xml
exists.
Open the file and check if it contains Subscription
nodes as shown in the example below:
<Subscription eventName="c9302257006473204344_14882095577508259570"
query="System!*[System[(Level = 1 or Level = 2 or Level = 3)]]">
<Column name="ProviderGuid" type="mt:wstr" defaultAssignment="00000000-0000-0000-0000-000000000000">
<Value>/Event/System/Provider/@Guid</Value>
</Column>
...
</Column>
</Subscription>
Reference: Troubleshooting guidance for the Azure Monitor agent on Windows virtual machines and scale sets https://techcommunity.microsoft.com/blog/fasttrackforazureblog/windows-events-how-to-collect-them-in-sentinel-and-which-way-is-preferred-to-det/3997342
Hope this helps. Do let us know if you any further queries by responding in the comments section.
Thanks,
Akhilesh V.
If this answers your query, do click Accept Answer
and Yes
for was this answer helpful. And, if you have any further query do let us know.