Data collection rule for security events not working in Azure sentinel

Jasper Van Damme 111 Reputation points
2021-08-06T09:41:50.46+00:00

Hi,

I am trying to migrate away from the Log Analytics agent to the Azure monitoring agent for the security events in Azure sentinel. Reason being that I only need certain event ID's. For that I have already configured one server with the azure monitoring agent which is not visible in Arc.

However, when I configure a custom data collection rule, it is not working. I have tested the xpath query locally on the domain controller and there it works fine.
All the other agents that are still using the old Security Events solution are working fine. But I don't see any data coming in from the new domain controller with the Azure monitoring agents.

The Azure monitoring agent is in a healthy state in the Azure portal.
121136-image.png

I currently have the Security Events and Windows Security Events (Preview) active in Azure sentinel.

Here are the two event collection rules that I have configured:
121201-image.png

I have tried various xpath queries already but none seem to be collecting the data.

Any ideas?
Br,
Jasper

Azure Monitor
Azure Monitor
An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
2,803 questions
Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
976 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. George Moise 2,346 Reputation points Microsoft Employee
    2021-08-06T09:49:42.37+00:00

    Hi Jasper,

    Two things here... 1st, if the VM from where you want to collect these specific Security Events is not an Azure VM, then you need to ensure that this VM is onboarded on Azure Arc (if is an Azure VM, then the Data Collection Rule (DCR) should allow you to select it as a Resource)

    The 2nd one, based on the documentation here, please try to configure the DCR with following XPath Query:

    Security!*[System[(EventID=4624 or EventID=4768)]]

    BR,
    George