The Security Audit Log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP system. By activating the audit log, you keep record of those activities you consider relevant for auditing. This information is recorded on a daily basis in an audit file on each application server. You can then access this information for evaluation in the form of an audit analysis report. Statistical information can easily be retrieved on transactions and reports. Although it was not designed for this purpose, the information it generates is invaluable when estimating the number of resources needed for the next upgrade project and when you want to know to which transactions or reports most attention and effort should go to.
The following information can be recorded in the Security Audit Log:
Successful and unsuccessful dialog and RFC logon attempts
RFC calls to function modules
Successful and unsuccessful transaction and report starts
2.Activating the audit log
The following instance profiles must be set in order to activate audit logging (use transaction RZ10 to do so).
rsau/enable: Set to 1 to activates audit logging
rsau/local/file: Name and location of the audit log file
rsau/max_diskspace/local: Max. space of the audit file. If maximum size is reached auditing stops.
rsau/selection_slots: Max. number of filters
The settings are activated after the instance has been restarted.
To access the Security Audit Log configuration screen from the SAP standard menu, choose:
Tools-> Administration->Monitor->Security Audit Log->Configuration (or transaction SM19).
Filters define what needs to be recorded. The following information can be specified:
Which User(s), Client(s) (wildcards can be used)
Audit class (for example, dialog or RFC attempt, start of transaction, report...)
Importance of the event (critical, important...)
Filters can be static (permanently) or dynamic (temporarily):
Static filters are stored inside the database. All application servers use the same filter for determining which events should be recorded in the audit log. After saving (Save) and activating (Profile->Activate) the static profile, it will be loaded at the next restart of the application server.
Dynamically created profiles, on the contrary, can be activated at any time to filter for selected events.They are automatically distributed to all active application servers (after saving and distributing them by selecting Configuration->Distribute Configuration).
Transaction SM19 - Administer Audit Profile
4.Analyzing the Audit Log
The Security Audit Log produces an audit analysis report that contains the audited activities.
By using the audit analysis report you can analyze events that have occurred and have been recorded on a local server, a remote server, or all of the servers in the SAP System.
To access the Security Audit Log Analysis screen from the SAP standard menu, choose:
Tools->Administration->Monitor->Security Audit Log->Analysis (or transaction SM20).
The Audit Log can be scanned for a period of time, user, transaction, report, etc.
Transaction SM20 - Analyzing the Audit Log
5.Reorganizing the Audit Log
The Security Audit Log saves its audits to a corresponding audit file on a daily basis.
Depending on the size of your SAP System and the filters specified, you may be faced with an enormous quantity of data within a short period of time.
Old audit log files can be deleted via Tools->Administration->Monitor ->Security Audit Log-> Configuration (or transaction SM18).