Successful events you might look to space-the growing size of the auditįiles-but still not to time, as the Security Audit Log is optimized for speed.” Unsuccessful (=critical) events as these events happens rarely. It primarily depends on customer requirements to enable all successful and non-successfulĬontinues: “There is no performance impact, not in time nor in space, if you log The detail view allows you to create a HTML-based eventĭefinition print list including the full documentation.” RSAU_INFO_SYAG which shows all the events of the Security Audit Log including theĬurrent status of activation. SE92 (or in transaction SE61 if you choose the document class SL (Syslog). “You can view the long text of the Security Audit Log event messages using transaction Table: Old and New functions of Transactions and reports related to the Security Audit Log Click Reread Audit log to get the configured audit log for your system. Netweaver version (see the following table), and give the required selection criteria as System: Convert the static profile to a dynamic profile and activate it.Ĭall transaction SM20/SM20N, or its equivalent transaction depending on your SAP The static profile, restart the system to make them effective. If you have made changes to the profile parameters or All clients ( *), all users ( *): Record all events except AUW, AU5, AUK, CUV, DUR,Īnd EUE (deactivate via Detailed Display).įinally, check the configuration.Client 066, all users ( *): Record all events.All clients ( *), user *: Record all events.All clients ( *), user SAP#*: Record all events. ![]() To set up filters, perform the following steps:Ĭall transaction SM19 or RSAU_CONFIG. Setting up appropriate filter configurations Note: When you use the Kernel parameters in the Security Audit Log configuration (stepġB or 1C), existing settings with the same name in the system’s profile are ignored.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |