How to get the most out of using the SAP Security Audit Log – from configuration to monitoring- Virtual 2020

SAP customers know they need to monitor and report on system user activities and events, but they don’t always know which types of activities to monitor or which features provide the best auditing capabilities. This session introduces the key features of the SAP security audit log, which records security-related system information such as unsuccessful logon attempts, changes to user master records, and remote function calls (RFCs). The SAP security audit log keeps a record of these activities for your review and investigation. By attending this session, you will gain a comprehensive overview of what the SAP security audit log is, how to configure it, and how best to use it. You will:

• Walk through the configuration steps for setting up the SAP security audit log and understand the best ways to report and monitor the events
• Gain an understanding on what types of activities can and should be monitored: unsuccessful transaction starts, RFC calls to function modules, unsuccessful RFC logon attempts, and unsuccessful logon attempts
• Learn what filters you can place on the logs to get the best result: client, user names, RFC calls, and transaction starts
• Discover the best ways of selling the use of the SAP security audit log to senior management

logo

SAPinsider | 50 Congress Street | Boston MA 02109
Privacy Policy | Terms and Conditions