Hello there,
How are you generating these failed logins? (e.g. RDP fails, ADFS integration, ...)
Confirm member server and domain controller are both set to log failed logons.
Audit filtering settings can limit which events are logged. Ensure that there are no filtering settings in place that might exclude certain logon events. Audit filtering can be configured through the Group Policy Object Editor.
Open "Group Policy Management" (gpedit.msc).
Navigate to "Computer Configuration" > "Windows Settings" > "Security Settings" > "Advanced Audit Policy Configuration" > "Detailed Tracking."
Review the audit settings here to make sure they don't exclude event 4625.
Hope this resolves your Query !!
--If the reply is helpful, please Upvote and Accept it as an answer–