Hi hack3rcon,
This situation is more common than you’d think. The fact that you’re only seeing an event ID 4663 (which logs the access attempt with delete permissions) and not the corresponding 4660 (which would indicate that the object was actually deleted) often comes down to where—and how—the audit is configured.
Here’s what’s happening:
• When you enable “Audit File System” via gpedit and then add auditing on a folder, you’re tracking file (or folder) access events on that specific object. In the case of deletion, the 4663 event shows that a handle was opened with delete rights.
• However, the actual deletion (the fact that the object is removed) is logged by event ID 4660. That event is written against the
parent container rather than the object that’s being deleted. So, if you’ve only placed auditing on the folder itself, you might miss the deletion event because the deletion “action” is recorded on its parent folder.
To generate a complete deletion report that tells you which file or folder was deleted—and by whom—you need to ensure that auditing is configured not just on the target object but also on its parent container. Here’s what you can do:
- Enable Auditing on the Parent Folder:
Since deletions are logged in the context of the parent folder, apply the same auditing settings (for delete and delete subfolders/files permissions) on the parent folder. This should trigger event ID 4660 when an object is removed.
- Verify Auditing Permissions:
Make sure that both the object (or folder) and the parent have the appropriate audit entries for the delete-related permissions. Without that, the deletion event might never get generated.
- Correlate Events Using the Common Handle ID:
Even if you see only 4663 events in one view, remember that both the “attempt” (4663) and the “result” (4660) share the common Handle ID. Once you have both in your logs, you can link them together to see who performed the deletion and what was deleted.
In your case, the server isn’t “failing” to generate a report—it’s just that your current audit configuration only captures the pre-deletion access (4663) because it is set on the folder being deleted. To get a complete picture (including the deletion event ID 4660), extend your auditing settings to include the parent folder where the deletion event would actually be logged.
I hope this clears things up. Let me know if you need more information or further assistance!
Regards,
ChatGPT