A Microsoft cloud service that enables deployment of Azure services across hybrid and multicloud environments.
Hello Cyber Punk, you’re on the right track using Azure Arc + AMA to pull WDAC logs into Log Analytics without upgrading to Defender P2. The main piece that’s missing is a Data Collection Rule (DCR) that tells the Azure Monitor Agent exactly which Windows Event channel to ship—namely the CodeIntegrity operational log where WDAC writes its audit events.
Here’s what you can try:
- Create a Data Collection Rule In the Azure portal (or via CLI/PowerShell), create a DCR that points to your Log Analytics workspace and includes the Windows event channel “Microsoft-Windows-CodeIntegrity/Operational.” Example DCR JSON (replace placeholders with your values):
• If you prefer CLI, see the “Upload logs to Azure Monitor” doc for the{ "dataSources": { "windowsEventLogs": [ { "channels": [ "Microsoft-Windows-CodeIntegrity/Operational" ], "streams": [ "Microsoft-Windows-Event" ], "format": "xml" } ] }, "destinations": { "logAnalytics": [ { "workspaceResourceId": "/subscriptions/<subID>/resourceGroups/<rg>/providers/Microsoft.OperationalInsights/workspaces/<lawName>" } ] } }az monitor data-collection-rule createsyntax. - Assign the DCR to your Arc-enabled machines • In your Log Analytics workspace → Agents management → Data Collection Rules → Assign rule → select your Azure Arc machines. • Or use
az monitor data-collection-rule association createto bind the rule to your Arc machines. - Validate AMA initialization and log flow • On the endpoint, look under
C:\ProgramData\AzureMonitorAgent\—you should see a folder for your DCR and some config files once it’s applied. • Check the AMA logs in that ProgramData path for any errors. • In the portal Log Analytics workspace, run a quick KQL query to confirm logs are arriving:WindowsEvent | where EventLog == "Microsoft-Windows-CodeIntegrity/Operational" | take 20 - Troubleshoot if you still don’t see anything • Double-check outbound HTTPS (443) is allowed to your workspace. • Ensure the machine is healthy in Azure Arc (run
azcmagent show). • Review the local AMA logs (C:\ProgramData\AzureMonitorAgent\Logs) for DCR parsing or connectivity errors.
Note: Defender Plan 2 will give you turnkey WDAC telemetry in Defender for Endpoint, but you can absolutely collect the raw CodeIntegrity events with AMA + DCR in Plan 1.
Let me know if you hit any specific errors in the AMA logs or if your DCR JSON needs tweaking!
Reference list
• Upload logs to Azure Monitor (via Arc data services DCR examples)
https://learn.microsoft.com/azure/azure-arc/data/upload-logs?wt.mc_id=azure-cxp-community