Object Access Event: 4663

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on his Active Directory. This helps him identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Object Access Event: 4663

Event ID 4663 – An Attempt Was Made To Access An Object

Event ID 4663
Category Object Access: File System; Kernel Object; Registry; Removable Storage
Type Success Audit
Description An attempt was made to access an object.

Event 4663 is logged when a particular operation is performed on an object. This object could be of any type, such as, file system, kernel, registry object, or a file system object that resides on a removable storage device. The object's SACL needs to enabled ACE to handle access right use for this event to be logged.

Event 4663 is different from event 4656 in that 4663 doesn't have failure events and shows that the access right was used, instead of just showing that it was requested.

This log data provides the following information:

  • Security ID
  • Account Name
  • Account Domain
  • Logon ID
  • Object Server
  • Object Type
  • Object Name
  • Handle ID
  • Resource Attributes
  • Process ID
  • Process Name
  • Accesses
  • Access Mask

Why does event ID 4663 need to be monitored?

  • To monitor the access attempts to critical file system objects, and objects which have a sensitive or critical key
  • To monitor Access Request Information, such as WriteData, AppendData, WriteEA, DeleteChild, WriteAttributes, DELETE, WRITE_DAC, and WRITE_OWNER
  • To prevent privilege abuse
  • To detect abnormal and potentially malicious activity
  • To ensure compliance with regulatory mandates

Pro Tip:

ADAudit Plus provides real-time pre-configured reports and auditing of the changes along with alerts within a Domain & OU. The advanced Group Policy settings real-time audit reports provide detailed information about object related events.

Event 4663 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10

Corresponding event in Windows 2003 and before: 567

Explore Active Directory auditing and reporting with ADAudit Plus.

  • Enter your email id
    Please enter a valid email id
  • Enter your phone number
  • Select demo date
  •  
  • By clicking 'Schedule a personalized demo', you agree to processing of personal data according to the Privacy Policy. You can unsubscribe from our mails at anytime.
Account Management Auditing
Active Directory Auditing
Windows Server Auditing