I was able to resolve this with TAC. The problem was with our Group Policy settings for auditing.
In Server 2012 Advanced Auditing was made available and apparently one of our admins turned that feature on and did not have it check for login/logoff.
That policy overrides the basic audit policy and effectively disabled the auditing.
So I was seeing login events on the Domain Controller but they were specifically Kerberos ticket requests which is not the event ID that the software looks for.
I do not believe that it is documented anywhere but the FireSight Agent looks for events 4624 and 4634.
TAC was actually very helpful in assisting me.