Event ID 4657 is generated by the Windows Security Auditing subsystem when a registry value is successfully modified. This event requires the 'Audit Object Access' policy to be enabled and specific registry keys to have auditing configured through their Security Access Control Lists (SACLs).
The event captures comprehensive details including the security identifier (SID) of the user or process making the change, the full registry path, the value name, the old and new values (when applicable), and the process information. This granular logging makes it invaluable for security investigations and compliance reporting.
In Windows 2025 and later versions, Microsoft enhanced this event with additional context fields including parent process information and improved value change tracking. The event integrates with Windows Defender Advanced Threat Protection (ATP) and Microsoft Sentinel for advanced security analytics.
Registry auditing can generate significant log volume in busy environments, so careful planning of which registry keys to audit is essential. Critical system areas like HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and security-related keys are commonly monitored to detect persistence mechanisms and configuration tampering.