I actually ended up trying that and it worked for some additional rules I created. I ended up creating 3 rules - one for when an administrative account we use gets enabled or disabled for some reason, and the 3rd should track other changes to the users (for example, a password reset). I also fixed the regular expressions a bit to accommodate usernames that have capital letters at the end.
Here's the updated rules:
<rule id="100021" level="12">
<if_sid>60110</if_sid>
<field name="win.eventdata.targetUserName" type="pcre2">^.+[dDsSwW][aA]$</field>
<description>IT administrative user account value changed.</description>
</rule>
<rule id="100022" level="12">
<if_sid>60103</if_sid>
<field name="win.system.eventID">^630$|^629$|^4725$|^4726$</field>
<field name="win.eventdata.targetUserName" type="pcre2">^.+[dDsSwW][aA]$</field>
<description>IT administrative user disabled or deleted.</description>
</rule>
<rule id="100023" level="12">
<if_sid>60103</if_sid>
<field name="win.system.eventID">^624$|^626$|^4720$|^4722$</field>
<field name="win.eventdata.targetUserName" type="pcre2">^.+[dDsSwW][aA]$</field>
<description>IT administrative account enabled or created.</description>
</rule>
100022 and 100023 work, will create duplicate logs (which is OK), but I ultimately wanted to do if_sid for 60109 and 60111 for these so they get triggered by the existing rules. To make them I just copied the rules off github and added in the field for my regex.
Here's an example of a log that I need to trigger 10021:
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4738","version":"0","level":"0","task":"13824","opcode":"0","keywords":"0x8020000000000000","systemTime":"2022-10-12T17:48:12.311765300Z","eventRecordID":"781999188","processID":"632","threadID":"7020","channel":"Security","computer":"DOMAIN_CONTROLLER","severityValue":"AUDIT_SUCCESS","message":"\"A user account was changed.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-21-683610258-3400582236-3141874177-3656199\r\n\tAccount Name:\t\tcmurphyWA\r\n\tAccount Domain:\t\tDOMAIN_NAME\r\n\tLogon ID:\t\t0x180D1CD5F\r\n\r\nTarget Account:\r\n\tSecurity ID:\t\tS-1-5-21-683610258-3400582236-3141874177-3655050\r\n\tAccount Name:\t\tctestingwa\r\n\tAccount Domain:\t\tDOMAIN_NAME\r\n\r\nChanged Attributes:\r\n\tSAM Account Name:\t-\r\n\tDisplay Name:\t\t-\r\n\tUser Principal Name:\t-\r\n\tHome Directory:\t\t-\r\n\tHome Drive:\t\t-\r\n\tScript Path:\t\t-\r\n\tProfile Path:\t\t-\r\n\tUser Workstations:\t-\r\n\tPassword Last Set:\t-\r\n\tAccount Expires:\t\t-\r\n\tPrimary Group ID:\t-\r\n\tAllowedToDelegateTo:\t-\r\n\tOld UAC Value:\t\t0x10\r\n\tNew UAC Value:\t\t0x11\r\n\tUser Account Control:\t\r\n\t\tAccount Disabled\r\n\tUser Parameters:\t-\r\n\tSID History:\t\t-\r\n\tLogon Hours:\t\t-\r\n\r\nAdditional Information:\r\n\tPrivileges:\t\t-\""},"eventdata":{"targetUserName":"ctestingwa","targetDomainName":"DOMAIN_NAME","targetSid":"S-1-5-21-683610258-3400582236-3141874177-3655050","subjectUserSid":"S-1-5-21-683610258-3400582236-3141874177-3656199","subjectUserName":"cmurphyWA","subjectDomainName":"DOMAIN_NAME","subjectLogonId":"0x180d1cd5f","oldUacValue":"0x10","newUacValue":"0x11","userAccountControl":" %%2080"}}}
Thanks again for your help!
Colin