How do I get windows firewall logs my workspace?

F S 25 Reputation points
2025-03-11T19:02:46.3033333+00:00

I have a W11 endpoint, not a VM btw. I deployed AMA through Intune. AMA is running fine. My workspace is only showing Heartbeat logs for the endpoint.

I need FW logs. I made sure public, private & domain profiles are enabled on my endpoint. I made sure logging for successful & dropped packets are enabled on all profiles too. I checked my firewall logs and there are firewall logs accumulating.

I have a data connector (Windows Firewall) connected to my workspace. It shows connected and is configured properly. I originally did have the Windows Firewall Events via AMA connector and I set up a DCR for it, but the data connector is showing disconnected now.

Is there something I'm missing to get the FW logs to show in my workspace?

Azure Monitor
Azure Monitor
An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
3,574 questions
{count} votes

Accepted answer
  1. Venkat V 1,485 Reputation points Microsoft External Staff
    2025-03-28T07:44:54.4766667+00:00

    I assumed I didn't need to have Azure Arc for my endpoint since I installed AMA. Am I wrong for assuming that?

    For any machine that isn't in Azure, the Azure Arc agent must be installed on the machine before the Azure Monitor Agent can be installed. Follow the MS Doc for more details

    The reason for not receiving Windows Firewall logs in the Log Analytics workspace, even after installing the Security and Audit solution and enabling the Firewall, may be that logging is not enabled.

    Please ensure that firewall logging is enabled on the Windows VM by navigating to Firewall & network protection > Advanced settings. Then, right-click on Windows Defender Firewall, go to Domain Profile, and select Customize under logging.

    enter image description here

    Please make sure to enable logging for each profile.

    Once logging is enabled, the logs will be generated in the following path:

    The default location for firewall log files is C:\windows\system32\logfiles\firewall\pfirewall.log.

    You can enable logging for all profiles using the following command line:

    netsh advfirewall set allprofiles logging allowedconnections enable
    
    netsh advfirewall set allprofiles logging droppedconnections enable
    

    I tested this in my environment, as the firewall logs were not showing before.

    enter image description here

    I created a Windows VM and enabled Security and Audit, along with a Log Analytics Workspace, as shown below.

    enter image description here

    Then, I created a DCR rule with endpoint configurations as shown below.

    enter image description here

    Under Collect and Driver Settings, add a Data Source > Select Firewall Logs > Under the Destination tab, select the previously created Log Analytics workspace.

    enter image description here

    enter image description here

    In the final step, I enabled Windows Firewall logs on my VM as explained above. After 5 to 10 minutes, the Windows Firewall logs appeared in the Log Analytics workspace, as shown below.

    enter image description here

    **
    Reference**: Collect Windows Firewall logs from virtual machine with Azure Monitor

    How to use the Windows operating system (OS) Azure Monitor Agent Troubleshooter

    I hope this helps to resolve your issue. Please feel free to ask any questions if the solution provided isn't helpful.

    ------------------------------------------------------------------------------------------
    Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.