Windows Event ID 4662 — Operation Performed on Active Directory Object
Logged when an operation is performed on an Active Directory object — such as a user, computer, or the domain partition itself. The critical event for detecting DCSync attacks and unauthorized AD replication.
MITRE ATT&CK
T1003.006 · DCSync
Credential Access
Why It Matters
Attackers with sufficient privileges use DCSync (via Mimikatz or Impacket's secretsdump) to impersonate a domain controller and request password hashes for any account — including krbtgt and domain admins — without ever touching the DC filesystem. Event ID 4662 with replication-related access rights is the primary detection signal. A non-DC account requesting DS-Replication-Get-Changes-All is almost never legitimate.
Key Fields
Investigation Tips
- 1.Filter for Subject Account Name that does NOT end in $ — legitimate replication is always performed by computer accounts (DCs), not user accounts.
- 2.Look for GUID 1131f6ad (DS-Replication-Get-Changes-All) — this right is required to dump password hashes and is rarely granted to non-DCs.
- 3.Correlate with 4624 logon events for the same account immediately before — Impacket secretsdump authenticates then immediately replicates.
- 4.Check if the source machine is a known DC using your CMDB or the computer account list in AD. An unknown host requesting replication rights is a confirmed DCSync.
- 5.Is this always malicious? No — legitimate backup tools (Veeam, Azure AD Connect) also trigger 4662 with replication rights. Verify the account and source host before escalating.
- 6.Enable 'Audit Directory Service Access' under Advanced Audit Policy to generate 4662 — it is off by default on many DCs.
Related Event IDs
Full Detection Guide Available
This event ID has a full detection guide with investigation steps, remediation advice, and example log entries.
View full guide for Event ID 4662 →See Event ID 4662 in your logs
Upload a Windows Event Log (.evtx) file — EventPeeker automatically detects operation performed on active directory object patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Analyze EVTX Logs Free →