How to Get the Most out of Using the Security Audit Log — From configuration to monitoring

How to Get the Most out of Using the Security Audit Log — From configuration to monitoring

Meet the Experts

The Security Audit Log in SAP records security-related system information such as unsuccessful logon attempts, changes to user master records, and RFC calls. The Security Audit Log keeps a record of these activities for your review and investigation. Attend this session to gain a comprehensive overview of what the Security Audit Log is, how to configure and set up the Security Audit Log, and how best to use it.
In this session, you will:
- Walk through the configuration steps for setting up the Security Audit Log and understand the best ways to report and monitor the events
- Gain an understanding on what types of activities can and should be monitored, including unsuccessful transaction starts, RFC calls to function modules, unsuccessful RFC logon attempts, and unsuccessful logon attempts
- Discover the best ways of selling the use of the Security Audit Log to senior management

This content is for SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.
Log In Join Now

More Resources

See All Related Content