Event ID 4963 is generated by the Windows Security Auditing subsystem when object access auditing policies are disabled. Object access auditing is a critical security feature that logs attempts to access files, folders, registry keys, and other Windows objects that have been configured with System Access Control Lists (SACLs).
When this event fires, it indicates that one or more audit subcategories under the Object Access category have been turned off. These subcategories include File System auditing, Registry auditing, Kernel Object auditing, SAM auditing, Certification Services auditing, Application Generated auditing, Handle Manipulation auditing, File Share auditing, Filtering Platform Packet Drop auditing, Filtering Platform Connection auditing, and Other Object Access Events auditing.
The event provides forensic value by creating an audit trail of when security monitoring was reduced. This is particularly important in environments where compliance regulations require continuous monitoring of sensitive data access. The event helps security teams identify potential gaps in their monitoring coverage and investigate whether audit policy changes were authorized.
In enterprise environments, this event often correlates with Group Policy changes, system maintenance activities, or security configuration modifications. Understanding when and why object access auditing was disabled helps maintain the integrity of security monitoring programs and ensures that appropriate compensating controls are in place during periods of reduced auditing.