Run these to confirm: Do the events really have a source at index time? | metadata type=sources index=<your_windows_index> `` If you see WinEventLog:Security, WinEventLog:Microsoft-Windows-PowerShell/Operational, etc., that proves the indexers know the true source. Compare what search-time shows vs metadata index=<your_windows_index> sourcetype=WinEventLog* | stats count by source sourcetype | head 20 If source is blank or looks wrong here while (1) shows real sources, you have an override at search time. Where to fix it 1) Field Extractions & Aliases Go to Settings → Fields → Field Extractions Filter for: sourcetype=WinEventLog:* or XmlWinEventLog:* Output field equals source (case-insensitive) Also check Settings → Fields → Field Aliases for any: FIELDALIAS-... = Provider_Name AS source FIELDALIAS-... = Source AS source Fix: Disable or change the target field to something else (e.g., event_source, win_provider, provider_name).
... View more