Ansicht
Dokumentation
RSAU_READ_LOG - Evaluate Security Audit Log
BAL Application Log Documentation PERFORM Short ReferenceThis documentation is copyright by SAP AG.
Purpose
This report is used to evaluate the security audit logs in a system, both as part of a regular audit and as a forensic check on any irregularities in the use of the system.
Integration
Prerequisites
Features
Selection
Use the selection type to restrict the expected amount of hits for the case in question.
Selection Screen
Selection by user group
Note that the selection by user group always respects the existing assignment of a user to a user group at the time of evaluation. This also applies when the selection is made using a user group filter.
Data source selection
The event logs are saved in the file system or the local database depending on how the security audit logs are configured. In the default setting, log data is searched for in both data sources. If just one data source is enough for statistical purposes, this option can be employed to improve performance significantly.
The source directory should only be specified manually in exceptional cases where files were already moved.
Display options
The option "Statistical data only" is recommended in statistical checks since it reduces resource usage when data is displayed and makes it possible to process large amounts of log data.
Output
Activities
You can find more information about the security audit log in SAP Note 2191612.
TXBHW - Original Tax Base Amount in Local Currency PERFORM Short Reference
This documentation is copyright by SAP AG.
Length: 1679 Date: 20240520 Time: 131047 sap01-206 ( 31 ms )