Event ID 4662 represents a cornerstone of Windows security auditing, providing detailed logging of object access operations across multiple subsystems. When this event fires, it indicates that a user or process has performed an operation on an audited object, whether that's a file, registry key, Active Directory object, or other securable resource.
The event structure includes critical fields such as the subject (who performed the action), the object (what was accessed), the operation type, and the access mask that defines the specific permissions used. This granular detail makes Event 4662 invaluable for security teams investigating potential breaches, compliance auditors tracking data access, and system administrators monitoring sensitive resource usage.
Windows generates this event through the Local Security Authority (LSA) subsystem, which intercepts access requests and compares them against configured audit policies. The event only appears when both object-level auditing is enabled and the specific object has a System Access Control List (SACL) configured to audit the attempted operation type.
In enterprise environments, Event 4662 can generate significant log volume, especially on file servers and domain controllers. Proper filtering and log management strategies are essential to extract meaningful security intelligence from these events without overwhelming your SIEM or log analysis tools.