Get Windows Events Into Sentinel
Windows security events are the bread and butter of any SOC. Learn how to select the right data connectors, configure Windows Security Events via AMA with data collection rules, and plan Windows Event Forwarding for legacy environments.
Why Windows events come first
Imagine a building with 10,000 employees and 500 security cameras.
Before you can investigate a break-in, those cameras need to be recording and sending footage to the control room. No footage = no investigation.
Windows security events are your cameras. Every login, failed password attempt, privilege escalation, process launch, and file access generates an event. Getting these events into Sentinel is the first step in any SOC β without them, your analytics rules have nothing to detect and your hunters have nothing to query.
There are two main ways to get Windows events into Sentinel: AMA (the modern agent) and WEF (the legacy forwarding method).
Choosing the right connector
Not all data connectors are equal. The exam tests whether you can select the right connector based on the data source requirements.
| Data Source | Recommended Connector | Why |
|---|---|---|
| Azure VMs (Windows) | Windows Security Events via AMA | Direct agent-based collection with DCR filtering |
| On-premises Windows servers | Windows Security Events via AMA (with Azure Arc) | Arc extends AMA to non-Azure machines |
| Large on-prem estate with existing WEF | Windows Event Forwarding + AMA on collector | Centralise events first, then forward to Sentinel |
| Microsoft Defender for Endpoint devices | XDR connector (built-in) | Device events flow through Defender XDR automatically |
| Azure platform logs | Diagnostic settings | Not Windows events β covered in the next module |
Exam tip: the legacy MMA connector
The older Microsoft Monitoring Agent (MMA) connector still appears in some documentation. It is deprecated. The exam expects you to recommend AMA for new deployments.
If a question mentions βan organisation is migrating from MMA to the current recommended agent,β the answer is Azure Monitor Agent (AMA).
Windows Security Events via AMA
The Azure Monitor Agent (AMA) is the modern, recommended way to collect Windows events. It uses Data Collection Rules (DCRs) to control exactly what gets sent to Sentinel.
How it works
- Install AMA on the Windows machine (Azure VMs get it automatically; on-prem machines need Azure Arc)
- Create a Data Collection Rule that specifies which event IDs or categories to collect
- Associate the DCR with the target machines
- Events flow from the machine β AMA β Log Analytics workspace β Sentinel
Data collection rule filtering
DCRs let you filter events at the source β before they even leave the machine. This saves ingestion costs and reduces noise.
| Preset | What It Collects | Events per Day (approx.) |
|---|---|---|
| Minimal | Critical security events only (failed logins, privilege escalation) | Low |
| Common | Most security-relevant events (logins, logoffs, account management, policy changes) | Medium |
| All Events | Every event from the Security log | High (can be very noisy) |
| Custom (XPath) | Specific Event IDs you define using XPath queries | You control |
Scenario: Anika's DCR strategy for 40 clients
Anika at Sentinel Shield manages ingestion for 40 MSSP clients. She cannot send βAll Eventsβ for every client β the cost would be astronomical.
Her DCR strategy:
- All clients get βCommonβ as the baseline β covers authentication, account changes, and policy modifications
- Financial services clients get a custom DCR adding Event ID 4688 (process creation) for threat hunting
- Healthcare clients get a custom DCR adding object access events for PHI compliance
- Small businesses get βMinimalβ β just failed logins and privilege escalation
Each clientβs DCR is associated with their specific machines via Azure Arc. One machine can only be associated with one DCR for a given data type.
Custom XPath filtering
For precise control, you write XPath queries in the DCR to select specific Event IDs:
Security!*[System[(EventID=4624 or EventID=4625 or EventID=4672 or EventID=4688)]]
This collects only:
- 4624 β successful logon
- 4625 β failed logon
- 4672 β special privileges assigned
- 4688 β new process created
Everything else stays on the machine.
Windows Event Forwarding (WEF)
WEF is Microsoftβs built-in mechanism for centralising Windows events before they reach Sentinel. It uses a collector server that pulls events from source machines.
When to use WEF
- Large on-premises environments with thousands of servers where installing AMA on every machine is impractical
- Environments that already have a WEF infrastructure in place
- Scenarios requiring event aggregation before cloud ingestion (reduces direct internet connections)
WEF architecture
Source machines β push events β WEF Collector β AMA on collector β Sentinel
The collector server runs the Windows Event Collector (WEC) service and has AMA installed. Source machines push events to the collector using subscriptions configured via Group Policy.
| Feature | AMA (Direct) | WEF + AMA (via Collector) |
|---|---|---|
| Agent required on each machine | Yes β AMA on every source | No β only AMA on the collector |
| Filtering | DCR-based (XPath) at source | WEF subscription filters + DCR on collector |
| Best for | Azure VMs, Arc-connected on-prem, smaller environments | Large on-prem estates, air-gapped networks, existing WEF setups |
| Latency | Near real-time (seconds) | Slightly higher (depends on WEF subscription interval) |
| Management | Azure Policy can auto-deploy AMA + DCR | Group Policy manages WEF subscriptions |
| Recommended by Microsoft | Yes β preferred for new deployments | Yes β for large-scale on-prem with existing WEF |
Exam tip: WEF is NOT deprecated
Unlike MMA, WEF is still a supported and recommended approach for specific scenarios. The exam may present a scenario with 5,000 on-premises servers and ask the best approach. If AMA on every machine is impractical, WEF + AMA on a collector is the answer.
Anika needs to collect only failed logon events (Event ID 4625) and process creation events (Event ID 4688) from a client's servers. Which approach should she use?
James at Pacific Meridian has 5,000 on-premises Windows servers in a datacenter with an existing WEF infrastructure. What is the most efficient way to get their security events into Sentinel?
π¬ Video coming soon
Next up: Windows events are flowing. Now letβs connect the rest β Syslog from Linux, CEF from firewalls, and Azure activity logs.