Here is how the subject event looks in SolarWinds Event Manager:
Event Type: UserLogonFailure
<our-domain-name>"
DetectionIP: <Our-Exchange-hostname>.<our-domain-name>
ToolAlias: Windows Security
ProviderSID: Microsoft-Windows-Security-Auditing 4625
LogonProcess: NtLmSsp
InsertionTime: 2021-06-21 07:44:25
Manager: sem
DetectionTime: 2021-06-21 07:44:24
ExtraneousInfo: SourcePort: 62145; Call-ProcessName: -;
DestinationAccount: <my-username>@<our-domain-name>
DestinationMachine: <Our-Exchange-hostname>.<our-domain-name>
AuthPackage: NTLM
FailureCount: 1
LogonType: Windows: Network
Severity: 4
SourceLogonID: 0x0
FailureReason: Unknown user name or bad password.
InsertionIP: <Our-Exchange-hostname>.<our-domain-name>
ManagerTime: 2021-06-21 07:44:25
SourceMachine: 192.168.2.198 <my workstation IP>