Microsoft's instructions for configuring Windows Event Forwarding from event source computers to an event collector server that isn't in the same domain with the sources seems wildly problematic from a security standpoint (https://docs.microsoft.com/en-us/windows/win32/wec/setting-up-a-source-initiated-subscription#setting-up-a-source-initiated-subscription-where-the-event-sources-are-not-in-the-same-domain-as-the-event-collector-computer). The instructions walk you through enabling certificate-based authentication for WinRM (Windows Remote Management) on the event collector server, then mapping the client certificates presented by the event source computer to a "local administrator account" on the event collector server. This strikes me as ridiculously insecure and unwise, especially when what I'm trying to do is get non-domain hosts in a DMZ to send events to a domain server on an internal network. I saw someone else describe this as "handing out a root login on a syslog server to a syslog source."
Is there a less irresponsible way to set this up?