Audit Kernel Object

This security policy setting allows you to audit attempts to access the system kernel, which include mutexes and semaphores. Only kernel objects with a matching system access control list (SACL) generate security audit events.
Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects.
The audits generated are usually only useful to developers.
Typically kernel objects are given SACLs only if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled.

Event volume: High if you have enabled one of the Global Object Access Auditing settings

If this policy setting is configured, the following events are generated. The events appear on computers running Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista.

  • 4659: A handle to an object was requested with intent to delete.
  • 4660: An object was deleted.
  • 4661: A handle to an object was requested.
  • 4663: An attempt was made to access an object.

Scope: 

Computer

Default: 

Not configured

Related content