1 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Free Download
Download the latest issue of Computer Weekly and subscribe to receive future issues
Download
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to
having your personal data transferred to and processed in the United States. Privacy
Login
Become a member
RSS
Part of the TechTarget network
SearchSAP.com
News
Latest Headlines
Recycling SAP
licenses can mean
big savings for the
well-prepared
Coke bottler turns
to advisory panel
for SAP mobile
direction
Harman listening
to SAP EIM for
supplier, materials
data management
View All News
SAP
Topics
Topics
SAP mgmt
SAP implementation and upgrades, SAP outsourcing and implementation partners, SAP Solution Manager,
SAP support and maintenance, SAP training and certification strategy, Compliance, Buying SAP-ERP
software, Evaluating ERP for small business and the midmarket, SAP ROI and TCO, SAP trends and market
projections
03/07/2012 17:39
2 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Modules
SAP All-in-One, SAP Business ByDesign, SAP Business One, SAP CRM software, SAP ERP software, SAP
HR management, SAP MM, SAP PLM software, SAP PM, SAP SCM software, SAP SD, SAP financial
management, SAP industry-specific software, SAP mobile technology, SAP supplier relationship management
software, SAP xApps
BI/data mgmt
Business Objects and SAP business intelligence, SAP CPM software, SAP MDM software, SAP and GRC,
SAP BW, Data archiving
Integration/NetWeaver
SAP Business Process Management, SAP Duet, SAP NetWeaver Enterprise Portal, SAP PI-XI, SAP and
enterprise service oriented architecture, SAP application integration
Admin
SAP Basis administration and NetWeaver administration, SAP security administration, SAPscript and Smart
Forms
Development
SAP ABAP, SAP Java and J2EE, SAP Web applications, SAP interface technologies, SAP Workflow
Infrastructure
SAP mgmt
Modules
Integration/NetWeaver
Tutorials
Advice & Tutorials
03/07/2012 17:39
3 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
White Papers
Business Webcasts
Downloads
Powered by Bitpipe.com
Product Demos
SearchSAP Partners
Blogs
Blogs
SAP Watch
Powered by
ITKnowledgeExchange.com
Search this site
Home
Topics
SAP administration
SAP security administration
03/07/2012 17:39
4 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
When you register, you will start receiving targeted emails from my award-winning team of editorial writers.
Our goal is to keep you informed on the hottest topics and biggest challenges faced by SAP professionals today.
E-mail Address:
03/07/2012 17:39
5 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
for evaluation in the form of an audit analysis report. Statistical information can easily be retrieved on transactions and reports.
Although it was not designed for this purpose, the information it generates is invaluable when estimating the number of resources
needed for the next upgrade project and when you want to know to which transactions or reports most attention and effort should go
to.
The following information can be recorded in the Security Audit Log:
03/07/2012 17:39
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Time Cat No Cl. User Transaction code Terminal MNo Text 12:00:38 DIA 0 100 I004567 SM19 PCIT0012 AU3 Transaction
6 de 14
03/07/2012 17:39
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Articles
Microsoft highlights security in Web services development pack
Using SAP standard reports to track changes in SAP HR
2. How do you set up and use system auditing of transactions?
Trick for producing a list of users and the transactions they have accessed
Implementing security audit in SQL Server 2008
Me gusta
Share
Comments
1. Comment:
2.
Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other
enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot
guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your
7 de 14
03/07/2012 17:39
8 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
reliance on any questions, answers, information or other materials received through this Web site is at your own risk.
Back to top
You May Also Be Interested In...
More Background
1.
2.
3.
Not a member? We'll activate your FREE membership with your subscription.
Ads by Google
Active Directory RestoreReal-time change monitor & recovery
03/07/2012 17:39
9 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Recycling SAP
licenses can mean
big savings for the
well-prepared
Coke bottler turns
to advisory panel
for SAP mobile
direction
Harman listening
to SAP EIM for
supplier, materials
data management
View All News
SAP
Topics
Topics
SAP mgmt
SAP implementation and upgrades, SAP outsourcing and implementation partners, SAP Solution Manager,
SAP support and maintenance, SAP training and certification strategy, Compliance, Buying SAP-ERP
software, Evaluating ERP for small business and the midmarket, SAP ROI and TCO, SAP trends and market
projections
Modules
SAP All-in-One, SAP Business ByDesign, SAP Business One, SAP CRM software, SAP ERP software, SAP
HR management, SAP MM, SAP PLM software, SAP PM, SAP SCM software, SAP SD, SAP financial
management, SAP industry-specific software, SAP mobile technology, SAP supplier relationship management
software, SAP xApps
BI/data mgmt
Business Objects and SAP business intelligence, SAP CPM software, SAP MDM software, SAP and GRC,
SAP BW, Data archiving
Integration/NetWeaver
SAP Business Process Management, SAP Duet, SAP NetWeaver Enterprise Portal, SAP PI-XI, SAP and
enterprise service oriented architecture, SAP application integration
Admin
SAP Basis administration and NetWeaver administration, SAP security administration, SAPscript and Smart
03/07/2012 17:39
10 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Forms
Development
SAP ABAP, SAP Java and J2EE, SAP Web applications, SAP interface technologies, SAP Workflow
Infrastructure
SAP mgmt
Modules
Integration/NetWeaver
Tutorials
Advice & Tutorials
03/07/2012 17:39
11 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
White Papers
Business Webcasts
Downloads
Powered by Bitpipe.com
Product Demos
SearchSAP Partners
Blogs
Blogs
SAP Watch
Powered by
ITKnowledgeExchange.com
Search this site
Manufacturing ERP
Oracle
Data Management
Data Management UK
Business Analytics
CRM
Content Management
Financial Applications
Manufacturing ERP
Can't afford BI? Try the BI analytics tools in everyday software
Experts say much of what is called analytics and BI can be done by using everyday software in an analytical way.
03/07/2012 17:39
12 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Long used for business-to-business data transfer and automation, EDI software finds new roles in supply chain
visibility and demand planning.
Automated carbon monitoring works best with close industry fit, integration
Integrated carbon monitoring software is becoming a higher priority in more organizations enterprise architectures.
Two experts show how to find tools for specific regulatory and messaging strategies.
Oracle
More best practices for Oracle User Productivity Kit (UPK)
An Oracle Applications Users Group (OAUG) member explains her company's best practices around Oracle User
Productivity Kit (UPK).
Best practices for Oracle User Productivity Kit (UPK)
An Oracle Applications Users Group (OAUG) director explains her company's best practices for Oracle User
Productivity Kit, also known as Oracle UPK.
Improve JD Edwards ERP user adoption with Oracle UPK
An Infosys expert lays out four major ways to increase JD Edwards ERP adoption using the Oracle User Productivity
Kit.
Data Management
Top-to-bottom data quality plan starts with selling execs on need
To win approval from corporate executives for a data quality improvement program that involves business users, IT
managers should draw a connection between data quality and the bottom line.
Embrace 'big data' now or fall behind the competition, analyst warns
Wikibon.org analyst Jeff Kelly has a dire message for organizations that think they can ignore "big data": Your rivals
might leave you in the dust.
Decision makers plan to spend big on 'big data' projects
Two surveys found that many companies are moving to become more data-driven and that "big data" initiatives are
among the items on their to-do lists.
DataManagement UK
03/07/2012 17:39
13 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Goalkeepers have relied purely on gut instinct to save spot kicks, but theyre increasingly relying on penalty data
analytics to give them an edge in the pressure cooker environment of a shoot out.
'Big data' MDM processes key to finding business value in new info
Big data MDM projects encounter a green field in the form of social media. And all big data is enterprise data, by
definition. Business leaders will look to IT to derive serious business value.
Data management, infosecurity disconnect reveals two tribes
Infosecurity and data management are failing to harmonise in complex corporate organisations, say data experts.
Business value is the common ground that can bridge the divide.
Business Analytics
Businesses begin transition from defining 'big data' to analyzing it
"Big data" is still going strong, but conversations about it have changed compared to a year ago as businesses focus less
on what it is and more on what to do with all the data they're collecting.
As tag clouds die off, businesses seek new ways to visualize text
Tag clouds are dead, according to the presenters at the eighth annual Text Analytics Summit who made a case for
advanced text visualization techniques.
Speaker details 5 developments in the text analytics industry
Text analytics consultant Seth Grimes opened the Text Analytics Summit by delving into what has been big this year in
text analytics and what the future holds.
CRM
Revenue performance management touted as key to e-commerce
Integrating sales and marketing and pursuing customer leads to the end make for successful new revenue cycle, the
CEO of Marketo said at the Enterprise 2.0 conference.
Oracle ties social, CRM, analytics products to customer experience
Oracle is bringing together its many social, analytic and CRM acquisitions under a new customer experience
management product strategy.
Adobe stresses personalization at digital marketing conference
Experts recommend taking time and making the most of data to market digitally.
Content Management
Successful enterprise collaboration starts with key business drivers
Enterprise collaboration initiatives should begin with understanding the business issues that need to be addressed, as
explained in an excerpt from The Collaborative Organization by Jacob Morgan.
Microsoft buys Yammer, solidifies SharePoint enterprise social chops
03/07/2012 17:39
14 de 14
http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup
Microsofts purchase of Yammer gives products like SharePoint enterprise social media capabilities that customers have
requested and purchased from ISVs, industry watchers say.
Dispersed organizations test mettle of SharePoint 2010 infrastructure
Combine basic SharePoint 2010 infrastructure management with end-user monitoring and third-party tools to
effectively manage SharePoint for a dispersed organization, says consultant Shawn Shell.
Financial Applications
Operational risk management technology emerges as CFO priority
Plentiful metrics, predictive analytics and GRC tools leave organizations few excuses for failing to measure the
numerous risks to their bottom lines.
Corporate performance management helps turn crisis into opportunity
Driven to the forefront by the Great Recession, CPM tools are fast evolving to take advantage of 'big data,' social media
and mobile.
Talent analytics gaining a foothold in the industry
Companies are looking to talent analytics for improving decision making around recruitment, retention and succession
planning.
All Rights Reserved, Copyright 2000 - 2012, TechTarget
About us
Contact us
Site index
Privacy policy
Advertisers
Business partners
Events
Media kit
TechTarget corporate site
Reprints
Site map
03/07/2012 17:39