Windows Event ID 5139 represents a security audit event that documents registry value deletion operations within the Windows operating system. This event generates when the Windows Security Reference Monitor detects that a registry value has been successfully removed from the Windows Registry database. The event requires object access auditing to be enabled through Group Policy or local security policy configuration.
The event structure includes comprehensive details about the deletion operation, including the full registry path of the deleted value, the security identifier (SID) of the user account that performed the action, the process name and ID responsible for the deletion, and timestamp information. This granular logging capability makes Event ID 5139 particularly valuable for security monitoring, compliance auditing, and forensic analysis scenarios.
In Windows Server 2025 and Windows 11 24H2 environments, Microsoft has enhanced the event logging to include additional context about the deletion source and improved correlation capabilities with other security events. The event integrates with Windows Defender Advanced Threat Protection (ATP) and Microsoft Sentinel for advanced threat detection scenarios, where registry value deletions might indicate persistence mechanism removal or anti-forensics activities by threat actors.
Organizations implementing zero-trust security models particularly benefit from monitoring Event ID 5139, as registry modifications often represent privilege escalation attempts or system configuration changes that could impact security posture. The event also plays a crucial role in change management processes, providing audit trails for administrative actions and software lifecycle management activities.