For the Windows use case, it’s required to enable RDP on the victim endpoint before running the attack.
You can use the following
resource to enable it if you didn't.
If you are using a Windows version other than Windows 11 or 10, in order to track user logon activities, you'll need to enable windows 7 audit logon events.
Kindly follow
this link to perform this in that case.
After that, restart the wazuh agent and perform the brute force attack. The alerts should appear on your dashboard.
I hope this helps you!