Anda di halaman 1dari 14

SAP security audit log setup

1 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Free Download

Download the latest issue of Computer Weekly and subscribe to receive future issues
Download

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to
having your personal data transferred to and processed in the United States. Privacy
Login
Become a member
RSS
Part of the TechTarget network
SearchSAP.com
News
Latest Headlines

Recycling SAP
licenses can mean
big savings for the
well-prepared
Coke bottler turns
to advisory panel
for SAP mobile
direction
Harman listening
to SAP EIM for
supplier, materials
data management
View All News
SAP
Topics
Topics
SAP mgmt

SAP implementation and upgrades, SAP outsourcing and implementation partners, SAP Solution Manager,
SAP support and maintenance, SAP training and certification strategy, Compliance, Buying SAP-ERP
software, Evaluating ERP for small business and the midmarket, SAP ROI and TCO, SAP trends and market
projections

03/07/2012 17:39

SAP security audit log setup

2 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Modules

SAP All-in-One, SAP Business ByDesign, SAP Business One, SAP CRM software, SAP ERP software, SAP
HR management, SAP MM, SAP PLM software, SAP PM, SAP SCM software, SAP SD, SAP financial
management, SAP industry-specific software, SAP mobile technology, SAP supplier relationship management
software, SAP xApps
BI/data mgmt

Business Objects and SAP business intelligence, SAP CPM software, SAP MDM software, SAP and GRC,
SAP BW, Data archiving
Integration/NetWeaver

SAP Business Process Management, SAP Duet, SAP NetWeaver Enterprise Portal, SAP PI-XI, SAP and
enterprise service oriented architecture, SAP application integration
Admin

SAP Basis administration and NetWeaver administration, SAP security administration, SAPscript and Smart
Forms
Development

SAP ABAP, SAP Java and J2EE, SAP Web applications, SAP interface technologies, SAP Workflow
Infrastructure

Hardware for SAP, SAP hosting, SAP virtualization, SaaS management


Hot Topics

SAP mgmt
Modules
Integration/NetWeaver
Tutorials
Advice & Tutorials

SAP NetWeaver training tutorial


SAP Process Integration (PI) training tutorial
SAP HR and HCM training tutorial
SAP BW training tutorial
SAP security guide
SAP Basis training tutorial
Technology Dictionary

Find definitions and links to technical resources


Powered by WhatIs.com
Expert
Advice
Tips

Java administration in SAP: Three tips for Basis administrators

03/07/2012 17:39

SAP security audit log setup

3 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Solving SAP print problems


How to better leverage the new SAP ABAP debugger
View All Tips
Answers

When is the right time to upgrade to SAP SCM 7.0?


Where can I find SAP FI/CO certification questions to prepare for the exam?
Changing time zones in SAP ECC 6.0
View All Answers
Ask a Question

Pose a question to the SearchSAP.com Experts


Get help from our technical community
Powered by ITKnowledgeExchange.com
White
Papers
Research Library

White Papers
Business Webcasts
Downloads
Powered by Bitpipe.com
Product Demos

Try out software demos


Powered by 2020Software.com
Resource Centers

View All Resource Centers


Partners

SearchSAP Partners
Blogs
Blogs

SAP Watch
Powered by
ITKnowledgeExchange.com
Search this site

Home
Topics
SAP administration
SAP security administration

03/07/2012 17:39

SAP security audit log setup

4 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

SAP security audit log setup

SAP security audit log setup


Bert Vanstechelman
E-mail
Print
A
AA
AAA
LinkedIn
Facebook
Twitter
Share This
RSS
Reprints
Introduction
The Security Audit Log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP system. By
activating the audit log, you keep record of those activities you consider relevant for auditing. This information is recorded on a
daily basis in an audit file on each application server. You can then access this information

Requires Free Membership to View


Login

When you register, you will start receiving targeted emails from my award-winning team of editorial writers.
Our goal is to keep you informed on the hottest topics and biggest challenges faced by SAP professionals today.

E-mail Address:

Hannah Smalltree, Editorial Director


By submitting your registration information to SearchSAP.com you agree to receive email communications from TechTarget
and TechTarget partners. We encourage you to read our Privacy Policy which contains important disclosures about how we
collect and use your registration and other information. If you reside outside of the United States, by submitting this
registration information you consent to having your personal data transferred to and processed in the United States. Your use
of SearchSAP.com is governed by our Terms of Use. You may contact us at webmaster@TechTarget.com.
Technical tips. Hot trends. Expert advice. Software guides. And more! Chat
with our editors about it all. Follow us on Twitter!

03/07/2012 17:39

SAP security audit log setup

5 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

for evaluation in the form of an audit analysis report. Statistical information can easily be retrieved on transactions and reports.
Although it was not designed for this purpose, the information it generates is invaluable when estimating the number of resources
needed for the next upgrade project and when you want to know to which transactions or reports most attention and effort should go
to.
The following information can be recorded in the Security Audit Log:

Successful and unsuccessful dialog and RFC logon attempts


RFC calls to function modules
Successful and unsuccessful transaction and report starts

03/07/2012 17:39

SAP security audit log setup

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Activating the audit log


The following instance profiles must be set in order to activate audit logging (use transaction RZ10 to do so).
rsau/enable: Set to 1 to activates audit logging
rsau/local/file: Name and location of the audit log file
rsau/max_diskspace/local: Max. space of the audit file. If maximum size is reached auditing stops.
rsau/selection_slots: Max. number of filters
The settings are activated after the instance has been restarted.
Defining Filters
To access the Security Audit Log configuration screen from the SAP standard menu, choose:
Tools-> Administration->Monitor->Security Audit Log->Configuration (or transaction SM19).
Filters define what needs to be recorded. The following information can be specified:
Which User(s), Client(s) (wildcards can be used)
Audit class (for example, dialog or RFC attempt, start of transaction, report...)
Importance of the event (critical, important...)
Filters can be static (permanently) or dynamic (temporarily):
Static filters are stored inside the database. All application servers use the same filter for determining which events should be
recorded in the audit log. After saving (Save) and activating (Profile->Activate) the static profile, it will be loaded at the next
restart of the application server.
Dynamically created profiles, on the contrary, can be activated at any time to filter for selected events. They are automatically
distributed to all active application servers (after saving and distributing them by selecting Configuration->Distribute
Configuration).

Transaction SM19 - Administer Audit Profile


Analyzing the Audit Log
The Security Audit Log produces an audit analysis report that contains the audited activities. By using the audit analysis
report you can analyze events that have occurred and have been recorded on a local server, a remote server, or all of the
servers in the SAP System.
To access the Security Audit Log Analysis screen from the SAP standard menu, choose:
Tools->Administration->Monitor->Security Audit Log->Analysis (or transaction SM20). The Audit Log can be scanned for a
period of time, user, transaction, report, ect.

Transaction SM20 - Analyzing the Audit Log


Example report:

Time Cat No Cl. User Transaction code Terminal MNo Text 12:00:38 DIA 0 100 I004567 SM19 PCIT0012 AU3 Transaction

Reorganizing the Audit Log


The Security Audit Log saves its audits to a corresponding audit file on a daily basis. Depending on the size of your SAP
System and the filters specified, you may be faced with an enormous quantity of data within a short period of time.
Old audit log files can be deleted via Tools->Administration->Monitor ->Security Audit Log->Configuration (or transaction
SM18).

More News and Tutorials

6 de 14

03/07/2012 17:39

SAP security audit log setup

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Articles
Microsoft highlights security in Web services development pack
Using SAP standard reports to track changes in SAP HR
2. How do you set up and use system auditing of transactions?
Trick for producing a list of users and the transactions they have accessed
Implementing security audit in SQL Server 2008

This was first published in July 2006


Join the conversationComment
Share
Tweet

Me gusta

Share

Comments

1. There are currently no responses.


Be the first to tell us what you think.
Results
Contribute to the conversation
All fields are required. Comments will appear at the bottom of the article.

1. Comment:
2.
Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other
enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot
guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your

7 de 14

03/07/2012 17:39

SAP security audit log setup

8 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

reliance on any questions, answers, information or other materials received through this Web site is at your own risk.
Back to top
You May Also Be Interested In...
More Background

SAP enables utility transformation


On The Spot: Mario Linkies on SAP security
More Details

Granting user access to cost centers through SAP authorization objects


How to stop SAP users from displaying SAP HR tables content

Vendor Resources More


Presentation Transcript - Key Database Trends for 2012:... (Presentation Transcript)
Demo: Distributed Database Security with Real-time... (Webcast)
Protecting Against Database Attacks and Insider Threats:... (White Paper)
Ponemon Study: 2011 Cost of a Data Breach (White Paper)
Get e-mail updates
Submit your e-mail below to receive SAP-related news, tech tips and more, delivered to your inbox.

1.
2.
3.

Supply Chain Management (SCM)


Virtualization
Basis and Administration

Not a member? We'll activate your FREE membership with your subscription.

Ads by Google
Active Directory RestoreReal-time change monitor & recovery

03/07/2012 17:39

SAP security audit log setup

9 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Bring users back online fastwww.blackbird-group.com/recovery


Network Security ScanScan your network for risks.
Free Online Network Security Scanwww.qualys.com/network-security
Discover Actual SAP UsageCheck Licenses Owned vs License Use
Reveal True SAP Needs In 24H Audit!LicenseAuditor.xpandion.com
CRM - Free for 3 UsersTry Our Online CRM Software.
Try Free 15-Day Trial!www.Zoho.com/CRM
News
Latest Headlines

Recycling SAP
licenses can mean
big savings for the
well-prepared
Coke bottler turns
to advisory panel
for SAP mobile
direction
Harman listening
to SAP EIM for
supplier, materials
data management
View All News
SAP
Topics
Topics
SAP mgmt

SAP implementation and upgrades, SAP outsourcing and implementation partners, SAP Solution Manager,
SAP support and maintenance, SAP training and certification strategy, Compliance, Buying SAP-ERP
software, Evaluating ERP for small business and the midmarket, SAP ROI and TCO, SAP trends and market
projections
Modules

SAP All-in-One, SAP Business ByDesign, SAP Business One, SAP CRM software, SAP ERP software, SAP
HR management, SAP MM, SAP PLM software, SAP PM, SAP SCM software, SAP SD, SAP financial
management, SAP industry-specific software, SAP mobile technology, SAP supplier relationship management
software, SAP xApps
BI/data mgmt

Business Objects and SAP business intelligence, SAP CPM software, SAP MDM software, SAP and GRC,
SAP BW, Data archiving
Integration/NetWeaver

SAP Business Process Management, SAP Duet, SAP NetWeaver Enterprise Portal, SAP PI-XI, SAP and
enterprise service oriented architecture, SAP application integration
Admin

SAP Basis administration and NetWeaver administration, SAP security administration, SAPscript and Smart

03/07/2012 17:39

SAP security audit log setup

10 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Forms
Development

SAP ABAP, SAP Java and J2EE, SAP Web applications, SAP interface technologies, SAP Workflow
Infrastructure

Hardware for SAP, SAP hosting, SAP virtualization, SaaS management


Hot Topics

SAP mgmt
Modules
Integration/NetWeaver
Tutorials
Advice & Tutorials

SAP NetWeaver training tutorial


SAP Process Integration (PI) training tutorial
SAP HR and HCM training tutorial
SAP BW training tutorial
SAP security guide
SAP Basis training tutorial
Technology Dictionary

Find definitions and links to technical resources


Powered by WhatIs.com
Expert
Advice
Tips

Java administration in SAP: Three tips for Basis administrators


Solving SAP print problems
How to better leverage the new SAP ABAP debugger
View All Tips
Answers

When is the right time to upgrade to SAP SCM 7.0?


Where can I find SAP FI/CO certification questions to prepare for the exam?
Changing time zones in SAP ECC 6.0
View All Answers
Ask a Question

Pose a question to the SearchSAP.com Experts


Get help from our technical community
Powered by ITKnowledgeExchange.com
White
Papers
Research Library

03/07/2012 17:39

SAP security audit log setup

11 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

White Papers
Business Webcasts
Downloads
Powered by Bitpipe.com
Product Demos

Try out software demos


Powered by 2020Software.com
Resource Centers

View All Resource Centers


Partners

SearchSAP Partners
Blogs
Blogs

SAP Watch
Powered by
ITKnowledgeExchange.com
Search this site

More from Related TechTarget Sites

Manufacturing ERP
Oracle
Data Management
Data Management UK
Business Analytics
CRM
Content Management
Financial Applications
Manufacturing ERP
Can't afford BI? Try the BI analytics tools in everyday software

Experts say much of what is called analytics and BI can be done by using everyday software in an analytical way.

03/07/2012 17:39

SAP security audit log setup

12 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Electronic data interchange of little use without right workflow

Long used for business-to-business data transfer and automation, EDI software finds new roles in supply chain
visibility and demand planning.

Automated carbon monitoring works best with close industry fit, integration

Integrated carbon monitoring software is becoming a higher priority in more organizations enterprise architectures.
Two experts show how to find tools for specific regulatory and messaging strategies.

Oracle
More best practices for Oracle User Productivity Kit (UPK)

An Oracle Applications Users Group (OAUG) member explains her company's best practices around Oracle User
Productivity Kit (UPK).
Best practices for Oracle User Productivity Kit (UPK)

An Oracle Applications Users Group (OAUG) director explains her company's best practices for Oracle User
Productivity Kit, also known as Oracle UPK.
Improve JD Edwards ERP user adoption with Oracle UPK

An Infosys expert lays out four major ways to increase JD Edwards ERP adoption using the Oracle User Productivity
Kit.
Data Management
Top-to-bottom data quality plan starts with selling execs on need

To win approval from corporate executives for a data quality improvement program that involves business users, IT
managers should draw a connection between data quality and the bottom line.
Embrace 'big data' now or fall behind the competition, analyst warns

Wikibon.org analyst Jeff Kelly has a dire message for organizations that think they can ignore "big data": Your rivals
might leave you in the dust.
Decision makers plan to spend big on 'big data' projects

Two surveys found that many companies are moving to become more data-driven and that "big data" initiatives are
among the items on their to-do lists.
DataManagement UK

03/07/2012 17:39

SAP security audit log setup

13 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Data analytics could deliver victory in the Euros

Goalkeepers have relied purely on gut instinct to save spot kicks, but theyre increasingly relying on penalty data
analytics to give them an edge in the pressure cooker environment of a shoot out.
'Big data' MDM processes key to finding business value in new info

Big data MDM projects encounter a green field in the form of social media. And all big data is enterprise data, by
definition. Business leaders will look to IT to derive serious business value.
Data management, infosecurity disconnect reveals two tribes

Infosecurity and data management are failing to harmonise in complex corporate organisations, say data experts.
Business value is the common ground that can bridge the divide.
Business Analytics
Businesses begin transition from defining 'big data' to analyzing it

"Big data" is still going strong, but conversations about it have changed compared to a year ago as businesses focus less
on what it is and more on what to do with all the data they're collecting.
As tag clouds die off, businesses seek new ways to visualize text

Tag clouds are dead, according to the presenters at the eighth annual Text Analytics Summit who made a case for
advanced text visualization techniques.
Speaker details 5 developments in the text analytics industry

Text analytics consultant Seth Grimes opened the Text Analytics Summit by delving into what has been big this year in
text analytics and what the future holds.
CRM
Revenue performance management touted as key to e-commerce

Integrating sales and marketing and pursuing customer leads to the end make for successful new revenue cycle, the
CEO of Marketo said at the Enterprise 2.0 conference.
Oracle ties social, CRM, analytics products to customer experience

Oracle is bringing together its many social, analytic and CRM acquisitions under a new customer experience
management product strategy.
Adobe stresses personalization at digital marketing conference

Experts recommend taking time and making the most of data to market digitally.
Content Management
Successful enterprise collaboration starts with key business drivers

Enterprise collaboration initiatives should begin with understanding the business issues that need to be addressed, as
explained in an excerpt from The Collaborative Organization by Jacob Morgan.
Microsoft buys Yammer, solidifies SharePoint enterprise social chops

03/07/2012 17:39

SAP security audit log setup

14 de 14

http://searchsap.techtarget.com/tip/SAP-security-audit-log-setup

Microsofts purchase of Yammer gives products like SharePoint enterprise social media capabilities that customers have
requested and purchased from ISVs, industry watchers say.
Dispersed organizations test mettle of SharePoint 2010 infrastructure

Combine basic SharePoint 2010 infrastructure management with end-user monitoring and third-party tools to
effectively manage SharePoint for a dispersed organization, says consultant Shawn Shell.
Financial Applications
Operational risk management technology emerges as CFO priority

Plentiful metrics, predictive analytics and GRC tools leave organizations few excuses for failing to measure the
numerous risks to their bottom lines.
Corporate performance management helps turn crisis into opportunity

Driven to the forefront by the Great Recession, CPM tools are fast evolving to take advantage of 'big data,' social media
and mobile.
Talent analytics gaining a foothold in the industry

Companies are looking to talent analytics for improving decision making around recruitment, retention and succession
planning.
All Rights Reserved, Copyright 2000 - 2012, TechTarget
About us
Contact us
Site index
Privacy policy
Advertisers
Business partners
Events
Media kit
TechTarget corporate site
Reprints
Site map

03/07/2012 17:39

Anda mungkin juga menyukai