How to Get the Most out of Using the Security Audit Log — From configuration to monitoring

The Security Audit Log in SAP records security-related system information such as unsuccessful logon attempts, changes to user master records, and RFC calls. The Security Audit Log keeps a record of these activities for your review and investigation. Attend this session to gain a comprehensive overview of what the Security Audit Log is, how to configure and set up the Security Audit Log, and how best to use it.
In this session, you will:
- Walk through the configuration steps for setting up the Security Audit Log and understand the best ways to report and monitor the events
- Gain an understanding on what types of activities can and should be monitored, including unsuccessful transaction starts, RFC calls to function modules, unsuccessful RFC logon attempts, and unsuccessful logon attempts
- Discover the best ways of selling the use of the Security Audit Log to senior management

This content is available to SAPinsider Premium Members.
Please click below to log in or create an account

Login Now »

Create Acount»


Bill Oliver Oliver Advisory Group
Read More

Bill has over 20 years’ experience in the field of SAP Information Security and auditing which includes large scale Security and GRC implementations as well as managerial roles in external audit, advisory, and assurance services. Bill holds a Master’s Degree in Information Technology from Boston University and is a Certified Information Systems Auditor (CISA). Bill has been a regular presenter on SAP Security and CyberSecurity for SAPinsider since 2015.