Windows Event ID 4887 represents a critical component of the Windows security auditing framework, specifically designed to track object handle requests across the operating system. When any process attempts to obtain a handle to a system object—whether it's a file, registry key, process, thread, or other kernel object—Windows generates this audit event to provide a comprehensive trail of object access activities.
The event structure includes essential forensic data: the Security Identifier (SID) of the requesting user account, detailed process information including Process ID and executable path, the target object's name and type, and the specific access rights being requested. This granular level of detail makes Event ID 4887 invaluable for security investigations, compliance auditing, and behavioral analysis of system interactions.
In Windows Server 2025 and Windows 11 24H2, Microsoft enhanced the event's performance impact and filtering capabilities, reducing the overhead associated with high-volume object access monitoring. The event integrates with Advanced Threat Analytics and Microsoft Defender for Endpoint, providing automated correlation with suspicious activity patterns and known attack vectors.
Understanding Event ID 4887 is crucial for security professionals implementing zero-trust architectures, as it provides the foundation for monitoring and validating all object access requests within the Windows environment.