Windows Security Log Event ID 4666

Operating Systems Windows 2008 R2 and 7
Windows 2012 R2 and 8.1
Windows 2016 and 10
Windows Server 2019 and 2022
Category
 • Subcategory
Object Access
 • Application Generated
Type Success
Corresponding events
in Windows 2003
and before
 

4666: An application attempted an operation

On this page

Free Security Log Resources by Randy

Description Fields in 4666

Subject:

  •    Client Name:  %5
  •    Client Domain:  %6
  •    Client Context ID: %7

Object:

  •    Object Name:  %3
  •    Scope Names:  %4

Application Information:

  •    Application Name: %1
  •    Application Instance ID: %2

Access Request Information:

  •    Role:   %8
  •    Groups:   %9
  •    Operation Name: %10 (%11)

Supercharger Free Edition


Supercharger's built-in Xpath filters leave the noise behind.

Free.

 

Examples of 4666

An application attempted an operation:
 

Subject:
  Client Name: Administrator
  Client Domain: MOM
  Client Context ID: 615654731

Object:
  Object Name: GetConnectorsByCriteria
  Scope Names: d5f04262-5efe-43cf-914c-3c1ea37a6529

Application Information:
  Application Name: Microsoft Operations Manager
  Application Instance ID: 302660

Access Request Information:
  Role: Role
  Groups: Group
  Operation Name: Connector__Get (14)

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection

 

Additional Resources