SAP Security Audit Log Setup
SAP Security Audit Log Setup
1. Introduction The Security Audit Log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP system. By activating the audit log, you keep record of those activities you consider relevant for auditing. This information is recorded on a daily basis in an audit file on each application server. You can then access this information for evaluation in the form of an audit analysis report. Statistical information can easily be retrieved on transactions and reports. Although it was not designed for this purpose, the information it generates is invaluable when estimating the number of resources needed for the next upgrade project and when you want to know to which transactions or reports most attention and effort should go to. The following information can be recorded in the Security Audit Log:
y y y
Successful and unsuccessful dialog and RFC logon attempts RFC calls to function modules Successful and unsuccessful transaction and report starts
2. Activating the audit log The following instance profiles must be set in order to activate audit logging (use transaction RZ10 to do so). rsau/enable: Set to 1 to activates audit logging rsau/local/file: Name and location of the audit log file rsau/max_diskspace/local: Max. space of the audit file. If maximum size is reached auditing stops. rsau/selection_slots: Max. number of filters The settings are activated after the instance has been restarted. 3. Defining Filters To access the Security Audit Log configuration screen from the SAP standard menu, choose: Tools-> Administration->Monitor->Security Audit Log->Configuration (or transaction SM19).
Filters define what needs to be recorded. The following information can be specified:
y y y
Which User(s), Client(s) (wildcards can be used) Audit class (for example, dialog or RFC attempt, start of transaction, report...) Importance of the event (critical, important...)
Static filters are stored inside the database. All application servers use the same filter for determining which events should be recorded in the audit log. After saving (Save) and activating (Profile->Activate) the static profile, it will be loaded at the next restart of the application server. Dynamically created profiles, on the contrary, can be activated at any time to filter for selected events. They are automatically distributed to all active application servers (after saving and distributing them by selecting Configuration->Distribute Configuration).
Transaction SM19 - Administer Audit Profile 4. Analyzing the Audit Log The Security Audit Log produces an audit analysis report that contains the audited activities. By using the audit analysis report you can analyze events that have occurred and have been recorded on a local server, a remote server, or all of the servers in the SAP System. To access the Security Audit Log Analysis screen from the SAP standard menu, choose:
Tools->Administration->Monitor->Security Audit Log->Analysis (or transaction SM20). The Audit Log can be scanned for a period of time, user, transaction, report, ect.
S t a t i s t i c s Number of entries
VA01 VA02 SE71 SE16N ZV01 SM19 SE38 SA38 MB51 CO03 VT03N SE37 SE91 LX03 VA01 SE09 SM18 CO02 BMBC R e p o r t Report entries RSBTCRTE ZFIN01 SAPMSSY4 ZCO03 ZFIN09 SAPLSMTR_NAVIGATION RSRZLLG0 RSDSLAN1 CSM_LOAD_APPSRV_DATA SAPMSSY8 RSDSBUFF RSDSOSCO RSDSFSYS RSDSUSER RSDS_DBMEMBER RSDSDEFLOAD RSALSUP5 RSRZLST0 RSALSUP2 RSUVM018 RSDSSPTI CCUMEAS RSRFCDMN RSDSSPNR RSDS_BP_FREEWP RS_UPDATE_STATUS RK_SE16N
17 13 13 12 9 9 8 7 7 5 5 4 4 4 3 3 3 2 2
5% 4% 4% 3% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1% 1%
5. Reorganizing the Audit Log The Security Audit Log saves its audits to a corresponding audit file on a daily
basis. Depending on the size of your SAP System and the filters specified, you may be faced with an enormous quantity of data within a short period of time. Old audit log files can be deleted via Tools->Administration->Monitor >Security Audit Log->Configuration (or transaction SM18).
2. How do you set up and use system auditing of transactions? a) Enter the filter criteria in sm19 and activate the trace. Read results with sm20. b) Use SQLplus to query the history table and select data based on user ID. c) Use pa20 to get the personnel number of an employee and then search usr01 for transactional history. d) You must install the ST-PI add on software to allow transactional auditing. ANSWER: A Transaction sm19 allows criteria for filtering your audit of transactional information by users and transactions. This does impose overhead on your system. The audit log location is also defined in this transaction and can be read and monitored in transaction sm20.