6 pages
English

Security Audit Log (BC-SEC)

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
6 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

Security Audit Log (BC-SEC)Release 4.6CHELP.BCSECAUDLOGSecurity Audit Log (BC-SEC) SAP AGCopyright© Copyright 2001 SAP AG. All rights reserved.No part of this publication may be reproduced or transmitted in any form or for any purposewithout the express permission of SAP AG. The information contained herein may be changedwithout prior notice.Some software products marketed by SAP AG and its distributors contain proprietary softwarecomponents of other software vendors.® ® ® ® ® ® ®Microsoft , WINDOWS , NT , EXCEL , Word , PowerPoint and SQL Server are registeredtrademarks ofMicrosoft Corporation.® ® ® ® ® ® ® ® ®IBM , DB2 , OS/2 , DB2/6000 , Parallel Sysplex , MVS/ESA , RS/6000 , AIX , S/390 ,® ® ®AS/400 , OS/390 , and OS/400 are registered trademarks of IBM Corporation.®ORACLE is a registered trademark of ORACLE Corporation.TM® ®INFORMIX -OnLine for SAP and Informix Dynamic Server are registered trademarks ofInformix Software Incorporated.® ® ® ®UNIX , X/Open , OSF/1 , and Motif are registered trademarks of the Open Group.®HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C , World WideWeb Consortium,Massachusetts Institute of Technology. ®JAVA is a registered trademark of Sun Microsystems, Inc. ®JAVASCRIPT is a registered trademark of Sun Microsystems, Inc., used under license fortechnology invented and implemented by Netscape. SAP, SAP Logo, R/2, RIVA, R/3, ABAP, SAP ArchiveLink, SAP Business Workflow, WebFlow,SAP ...

Informations

Publié par
Nombre de lectures 51
Langue English

Extrait

Security Audit Log (BC-SEC)
R e l e a s e4 . 6 C
Security Audit Log (BC-SEC)
Copyright
© Copyright 2001 SAP AG. All rights reserved.
SAP AG
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors.
® ®® ®® ®® Microsoft ,WINDOWS ,NT ,EXCEL ,Word ,PowerPoint andSQL Serverare registered trademarks of Microsoft Corporation.
® ®® ®® ®® ®® IBM ,DB2 ,OS/2 ,DB2/6000 ,Parallel Sysplex, MVS/ESA, RS/6000, AIX, S/390, ® ®® AS/400 ,OS/390 ,and OS/400are registered trademarks of IBM Corporation.
® ORACLE isa registered trademark of ORACLE Corporation.
TM ® ® INFORMIX -OnLinefor SAP and InformixDynamic Serverare registered trademarks of Informix Software Incorporated.
® ®® ® UNIX ,X/Open ,OSF/1 ,and Motifare registered trademarks of the Open Group.
® HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology.
® JAVA isa registered trademark of Sun Microsystems, Inc.
® JAVASCRIPT isa registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape.
SAP, SAP Logo, R/2, RIVA, R/3, ABAP, SAP ArchiveLink, SAP Business Workflow, WebFlow, SAP EarlyWatch, BAPI, SAPPHIRE, Management Cockpit, mySAP.com Logo and mySAP.com are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other products mentioned are trademarks or registered trademarks of their respective companies.
2
April 2001
SAP AG
Icons
Icon
April 2001
Meaning Caution Example
Note Recommendation Syntax
Tip
Security Audit Log (BC-SEC)
3
Security Audit Log (BC-SEC)
Contents
SAP AG
Security Audit Log (BC-SEC)........................................................................................ 5
4
April 2001
SAP AG
Security Audit Log (BC-SEC)
Security Audit Log (BC-SEC)
Security Audit Log (BC-SEC) Purpose The Security Audit Log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP System. By activating the audit log, you keep a record of those activities you consider relevant for auditing. You can then access this information for evaluation in the form of an audit analysis report. The audit log's main objective is to record: Security-related changes to the SAP System environment (for example, changes to user master records) Information that provides a higher level of transparency (for example, successful and unsuccessful logon attempts) Information that enables the reconstruction of a series of events (for example, successful or unsuccessful transaction starts) Specifically, you can record the following information in the Security Audit Log: Successful and unsuccessful dialog logon attempts Successful and unsuccessful RFC logon attempts RFC calls to function modules Successful and unsuccessful transaction starts Successful and unsuccessful report starts Changes to user master records Changes to the audit configuration Implementation Considerations
The Security Audit Log contains personal information that may be protected by data protection regulations. Before using the Security Audit Log, make sure that you adhere to the data protection laws that apply to your area of application! Integration With the Security Audit Log, SAP Systems keep records of all activities corresponding to designated filters. For a detailed description on the technical aspects of the audit log, seeThe Design of the Security Audit Log [Ext.]. The Security Audit Log complements the system log; however, the Security Audit Log has a slightly different purpose and a different audience (seeComparing the Security Audit Log and the System Log [Ext.]).
April 2001
5
Security Audit Log (BC-SEC)SAP AG Security Audit Log (BC-SEC) Activities For more information about the various activities that you need to perform when using the Security Audit Log, see: Defining Filters [Ext.]to enable auditing and configure the information you wish to audit. Displaying the Audit Analysis Report [Ext.]for a detailed description on how to specify your audit analysis report. You can view the recorded information as desired. You can view everything that you have logged, or you can select a sub-group (for example, certain transactions or certain users). Deleting Old Audit Files [Ext.]for information on archiving and deleting your audit files.
6
April 2001
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text