Event ID 4660 represents a fundamental component of Windows security auditing infrastructure, specifically designed to track object deletion activities across Active Directory domains and local systems. When Windows processes an object deletion request, the system first validates permissions, performs the deletion operation, and then generates this audit event to create a permanent record of the action.
The event contains detailed metadata including the Security Identifier (SID) of the deleted object, the distinguished name (DN) if applicable, the user account that initiated the deletion, the process responsible for the operation, and precise timestamp information. This granular detail enables forensic analysis and helps administrators understand the context surrounding object deletions.
Modern Windows environments in 2026 have enhanced this event with additional context fields, including correlation identifiers that link related audit events and improved object classification data. The event integrates seamlessly with Microsoft Sentinel, Azure Monitor, and third-party SIEM solutions for centralized security monitoring.
Organizations typically see Event ID 4660 during routine administrative tasks like user account cleanup, organizational restructuring, or automated provisioning system operations. However, unexpected occurrences may indicate unauthorized access, privilege escalation attempts, or malicious insider activity requiring immediate investigation.