Audit Other Object Access Events

This security policy setting determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
For scheduler jobs, the following are audited:

  • Job created.
  • Job deleted.
  • Job enabled.
  • Job disabled.
  • Job updated.


For COM+ objects, the following are audited:

  • Catalog object added.
  • Catalog object updated.
  • Catalog object deleted.


Event volume: Low

If this policy setting is configured, the following events are generated. The events appear on computers running Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista, unless otherwise noted.

  • 4671: An application attempted to access a blocked ordinal through the TBS.
  • 4691: Indirect access to an object was requested.
  • 4698: A scheduled task was created.
  • 4699: A scheduled task was deleted.
  • 4700: A scheduled task was enabled.
  • 4701: A scheduled task was disabled.
  • 4702: A scheduled task was updated.
  • 5148: The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. (Note: This event is logged only on computers running Windows Server 2008 R2 or Windows 7.)
  • 5149: The DoS attack has subsided and normal processing is being resumed. (Note: This event is logged only on computers running Windows Server 2008 R2 or Windows 7.)
  • 5888: An object in the COM+ Catalog was modified.
  • 5889: An object was deleted from the COM+ Catalog.
  • 5890: An object was added to the COM+ Catalog.

Scope: 

Computer

Default: 

Not configured

Related content