WinSecWiki > Security Settings > Local Policies > Audit Policy > Object Access > Registry

Registry

This category allows you to track access to registry keys and values. To configure this on Server 2008 and Vista you must use auditpol. Windows 7 and Server 2008 R2 and later can use Group Policy.

Coverage on events generated by this category are currently in the Security Log Encyclopedia:

Event IDTitle
4656 A handle to an object was requested
4657 A registry value was modified
4658 The handle to an object was closed
4660 An object was deleted
4663 An attempt was made to access an object

Back to top

 

Upcoming Webinars
  • Identity as the Kill Chain: Stopping Lateral Movement Across AD, Cloud, and AI
  • Patching 3rd Party Apps on PCs Managed by Intune
Additional Resources
    Object Access
    •Detailed File Share
    •Removable Storage Devices
    •File System
    •Registry
    •Kernal Object
    •SAM
    •Certification Services
    •Application Generated
    •Handle Manipulation
    •File Share
    •Filtering Platform Packet Drop
    •Filtering Platform Connection
    •Other Object Access

     
     
    User name:
    Password:
      / Forgot?
      Register
    March 2026
    Patch Tuesday
    "Patch Tuesday - Two Zero-Days for the Month " - sponsored by LOGbinder
    .
    Tweet
    Follow @randyfsmith
    About | Newsletter | Contact Ultimate IT Security is a division of Monterey Technology Group, Inc. ©2006-2026 Monterey Technology Group, Inc. All rights reserved.
    Disclaimer: We do our best to provide quality information and expert commentary but use all information at your own risk. For complaints, please contact abuse@ultimatewindowssecurity.com.
    Terms of Use | Privacy |
    Cookies help us deliver the best experience on our website. By using our website, you agree to the use of cookies.