Ansicht
Dokumentation

RSAU_READ_LOG - Evaluate Security Audit Log

RSAU_READ_LOG - Evaluate Security Audit Log

BAL Application Log Documentation   PERFORM Short Reference  
This documentation is copyright by SAP AG.
SAP E-Book

Purpose

This report is used to evaluate the security audit logs in a system, both as part of a regular audit and as a forensic check on any irregularities in the use of the system.

Integration

Prerequisites

Features

Selection

Use the selection type to restrict the expected amount of hits for the case in question.

Selection Screen

Selection by user group

Note that the selection by user group always respects the existing assignment of a user to a user group at the time of evaluation. This also applies when the selection is made using a user group filter.

Data source selection

The event logs are saved in the file system or the local database depending on how the security audit logs are configured. In the default setting, log data is searched for in both data sources. If just one data source is enough for statistical purposes, this option can be employed to improve performance significantly.

The source directory should only be specified manually in exceptional cases where files were already moved.

Display options

The option "Statistical data only" is recommended in statistical checks since it reduces resource usage when data is displayed and makes it possible to process large amounts of log data.

Output

Activities

You can find more information about the security audit log in SAP Note 2191612.






TXBHW - Original Tax Base Amount in Local Currency   PERFORM Short Reference  
This documentation is copyright by SAP AG.

Length: 1679 Date: 20240520 Time: 131047     sap01-206 ( 31 ms )