How to Get the Most out of Using the Security Audit Log — From configuration to monitoring

How to Get the Most out of Using the Security Audit Log — From configuration to monitoring

The Security Audit Log in SAP records security-related system information such as unsuccessful logon attempts, changes to user master records, and RFC calls. The Security Audit Log keeps a record of these activities for your review and investigation. Attend this session to gain a comprehensive overview of what the Security Audit Log is, how to configure and set up the Security Audit Log, and how best to use it.
In this session, you will:
– Walk through the configuration steps for setting up the Security Audit Log and understand the best ways to report and monitor the events
– Gain an understanding on what types of activities can and should be monitored, including unsuccessful transaction starts, RFC calls to function modules, unsuccessful RFC logon attempts, and unsuccessful logon attempts
– Discover the best ways of selling the use of the Security Audit Log to senior management

Mastering SAP Premium Access Membership Required

You must be a Mastering SAP Premium Access member to access this content.

Join Now

Explore related questions

Already a member? Log in here

More Resources

See All Related Content