Under Review

windows_event_audit_policy_changed

windows_event_audit_policy_changed

SCHEMA

audit_policy_changes string Changes that were made.
category string The name of auditing Category which subcategory was changed.
description string Plugin description text
eventid int The Windows event ID
provider_name string The Windows event provider
source string The Windows event source
subcategory string The name of auditing Subcategory which was changed.
subject_domain string The domain or computer name for the account that reported the logon
subject_username string The account that reported the logon

-- windows_event_audit_policy_changed INFO
SELECT 
   -- Device ID DETAILS
   meta_hostname, meta_ip_address, 

   -- Query Details
   query_name, audit_policy_changes, category, description, eventid,
   provider_name, source, subcategory, subject_domain, subject_username,

   -- Decoration 
   meta_boot_time, meta_eid, meta_endpoint_type, 
   meta_ip_mask, meta_mac_address, meta_os_name, meta_os_platform, meta_os_type,
   meta_os_version, meta_public_ip, meta_query_pack_version, meta_username,

   --- Generic
   calendar_time, counter, epoch, host_identifier, numerics
   osquery_action, unix_time,

   -- Data Lake
   customer_id, endpoint_id, upload_size

FROM xdr_data
WHERE query_name = 'windows_event_audit_policy_changed'

Can someone test this for me?