The security audit log is designed for auditors who need to take a detailed look at what occurs in the SAP system. By activating the audit log, you keep a record of those activities you consider relevant for auditing. You can then access this information for evaluation in an audit analysis report.
The audit log’s main objective is to record:
· Security-related changes to the SAP system environment (for example, changes to user master records)
· Information that provides a higher level of transparency (for example, successful and unsuccessful logon attempts)
· Information that enables the reconstruction of a series of events (for example, successful or unsuccessful transaction starts)
Specifically, you can record the following information in the security audit log:
· . Successful and unsuccessful dialog logon attempts
· . Successful and unsuccessful RFC logon attempts
· . Remote function calls (RFCs) to function modules
· . Successful and unsuccessful transaction starts
· . Successful and unsuccessful report starts
· . Changes to user master records
· . Changes to the audit configuration
No comments:
Post a Comment