Sap Audit Log Table

Posted on  by 



Could not execute 'EXPORT 'PUBLIC'.' AUDITLOG' INTO '/tmp/' SAP DBTech JDBC: 7: feature not supported: Exporting object PUBLIC objects owned by SYS user is not allowed.: line 1 c. SAP Knowledge Base Article - Preview. 2684434-How to export HANA audit log when audit trail target is internal database table. Cannot export audit log. The Security Audit Log normally logs the terminal id if it’s available; otherwise the IP address is logged. You can set the (undocumented) profile parameter rsau/iponly to the value 1 to log the IP address instead (if available). See note 1497445 for details. Use the following options to get the terminal id and the IP address of active users.

SAP Audit tcodes regroups the main/ important SAP Transactions code for SAP ERP Management Audit.
Tags for SAP Audit Tcodes : sap audit management, sap audit program, sap auditing, sap security, audit, auditing sap, sap auditor, audit software, sap it audit , erp audit

Usefull SAP Audit Tcodes

Table
SAP Audit Tcodes Description
0REP Start of program etc. from IMG
AL11 Display SAP Directories
BD64 Maintenance of Distribution Model
DB03 Parameter Changes in Database
DB12 DBA Backup Logs
FB01 Post Document
FILE Cross-Client File Names/Paths
OS03 O/S Parameter changes
PE01 HR: Maintain Payroll Schemas
PE02 HR: Maintain Calculation Rules
PFCG Role Maintenance
PFUD User Master Data Reconciliation
RSGWLST Accessible Gateways
RSPFPAR Display profile parameter
RSRFCCHK RFC destinations with logon data
RSTBHIST Table history
RSUSR003 Check standard user passwords
RSUSR200 List of Users per Login Date
RZ01 Job Scheduling Monitor
RZ03 Presentation & Control SAP Instances
RZ04 Maintain SAP Instances
RZ10 Maintain Profile Parameters
RZ11 Profile Parameter Maintenance
RZ20 CCMS Monitoring
RZ27_SECURITY MiniApp CCMS Alerts Security
SAINT Add-On Installation Tool
SAMT ABAP Program Set Processing
SARA Archive Administration
SCC3 Client Copy Log
SCDN Change Documents: Number Ranges
SCDO Display Change Document Objects
SCU0 Customizing Cross-System Viewer
SCUL Central User Administration Log
SCUM Central User Administration
SD11 Data Modeler
SE03 Transport Organizer Tools
SE06 Set Up Transport Organizer
SE09 Transport Organizer
SE10 Transport Organizer
SE12 ABAP Dictionary Display
SE13 Maintain Technical Settings (Tables)
SE15 ABAP/4 Repository Information System
SE16 Data Browser
SE16_RFCDESSECU Data Browser RFCDESSECU
SE16_T000 Data Browser T000
SE16_TXCOMSECU Data Browser TXCOMSECU
SE16_USR40 Data Browser USR40
SE16_USRACL Data Browser USRACL
SE16_USRACLEXT Data Browser USRACLEXT
SE16_V_T599R Data Browser V_T599R
SE16_W3TREES Data Browser W3TREES
SE16_WWWFUNC Data Browser WWWFUNC
SE16_WWWREPS Data Browser WWWREPS
SE84 Repository Information System
SECR Obsolete: Audit Information System
SEPS SAP Electronic Parcel Service
SESS Session Manager Menu Tree Display
SESSION_MANAGER Session Manager Menu Tree Display
SH01 Online help: F1 Help server
SICK Installation Check
SLG1 Application Log: Display Logs
SM01 Lock Transactions
SM13 Administrate Update Records
SM20 Analysis of Security Audit Log
SM21 Online System Log Analysis
SM30 Call View Maintenance
SM30_TVARV Call SM30 for Table TVARV
SM30_VSNCSYSACL Call Up SM30 for Table VSNCSYSACL
SM30_V_BRG Call SM30 for View V_BRG
SM30_V_DDAT Call SM30 for View V_DDAT
SM34 Viewcluster maintenance call
SM35 Batch Input Monitoring
SM37 Overview of job selection
SM50 Work Process Overview
SM51 List of SAP Systems
SM54 TXCOM Maintenance
SM58 Asynchronous RFC Error Log
SM59 RFC Destinations (Display/Maintain)
SM63 Display/Maintain Operating Mode Sets
SM66 Systemwide Work Process Overview
SM69 Maintain External OS Commands
SMEN Session Manager Menu Tree Display
SMGW Gateway Monitor
SMT1 Trusted-Trusting Connections
SMT2 Trusted-Trusting Connections
SMW0 SAP Audit Tcodes : SAP Web Repository
SO70 Hypertext: Display/Maint. Structure
SP01 Output Controller
SPAD Spool Administration
SPAM Support Package Manager
SPAT Spool Administration (Test)
ST01 System Trace
ST07 Application monitor
ST10 Table Call Statistics
ST22 ABAP Dump Analysis
STMS Transport Management System
SU22 Maintain Authorization Defaults(SAP)
SU24 Maintain Authorization Defaults
SU26 Upgrade Tool for Profile Generator
SU3 Maintain Users Own Data
SU53 Evaluate Authorization Check
SU56 Analyze User Buffer
SUIM User Information System
SUPC SAP Audit Tcodes :Role Profiles
SWEL Display Event Trace
SWI5 Workload Analysis
SWU2 Workflow RFC Monitor
SWU3 Automatic Workflow Customizing
SWU9 Display Workflow Trace
SWUD SAP Audit Tcodes :Workflow Diagnosis
S_BIE_59000197 Report cross-system information
S_BIE_59000198 Report cross-system information
S_BIE_59000199 Report cross-system information
S_PH0_48000151 Maintain log
TU02 Parameter Changes on this Instance
USMM Customer Measurement
WE21 Port definition

SAP Audit Tcodes S_ALR_*

The following list is for SAP Audit Transaction/ Program starting with S_ALR_*

Sap Sm20 Transaction Audit Log Table

SAP Audit Tcodes Description
S_ALR_87014082 Log of Report Starts
S_ALR_87101193 Hardcoded SAP*
S_ALR_87101194 Check standard user passwords
S_ALR_87101195 Rules for Logging on
S_ALR_87101196 Where-Used List: Authorization Objct
S_ALR_87101198 All Authorizations
S_ALR_87101199 Number of User Master Records
S_ALR_87101200 List Users
S_ALR_87101201 Currently Active Users
S_ALR_87101202 Users with Initial Password
S_ALR_87101203 Not logged on for 30 Days
S_ALR_87101204 Unchanged for 180 Days
S_ALR_87101205 Users who can call OS Commands
S_ALR_87101206 Users with ABAP Authorization
S_ALR_87101207 Users who can use CTS
S_ALR_87101208 Update Accounting Periods
S_ALR_87101209 Update Company Codes
S_ALR_87101210 Update Chart of Accounts
S_ALR_87101211 Users who can Execute RFC Function
S_ALR_87101212 List of Internet users
S_ALR_87101213 Profile Generator
S_ALR_87101219 Check Table Logging
S_ALR_87101220 Display
S_ALR_87101223 Table Recording
S_ALR_87101225 Cust. Tables without Log
S_ALR_87101226 Standard Variant
S_ALR_87101228 AIS Financial Accounting
S_ALR_87101235 AIS Accounting
S_ALR_87101236 SAP Audit Tcodes :AIS Finances
S_ALR_87101237 Table Access Statistics
S_ALR_87101238 Display Change Documents
S_ALR_87101239 Display Change Documents
S_ALR_87101247 Call System
S_ALR_87101248 Parameters for External Tools
S_ALR_87101249 System Overview
S_ALR_87101250SAP Audit Tcodes :SAP Gateway
S_ALR_87101252 Installation Check for R/3 Spool
S_ALR_87101253 Spool Parameters
S_ALR_87101254 SNC Status
S_ALR_87101256 TMS: Display Configuration
S_ALR_87101257 Import Overview
S_ALR_87101258 System Overview
S_ALR_87101259 TMS: Alert Viewer
S_ALR_87101260 Verbose
S_ALR_87101261 Transport Monitor ALOG
S_ALR_87101262 Transport Monitor SLOG
S_ALR_87101263 Search for Objects in Requests/Tasks
S_ALR_87101265 Requests with USR Tables
S_ALR_87101266 Requests with PA Tables
S_ALR_87101267 Analyze Objects in Requests/Tasks
S_ALR_87101268 RSWBOSSR
S_ALR_87101269 Set System Change Option
S_ALR_87101270 Syslog parameters
S_ALR_87101271 Performance Analysis
S_ALR_87101272 Performance analysis
S_ALR_87101273 Workload Statistics
S_ALR_87101274 Statistical Evaluations
S_ALR_87101275 Consistency Check
S_ALR_87101276 IDoc List
S_ALR_87101277 RFC Statistics
S_ALR_87101278 Remote Function Call
S_ALR_87101279 RFC Trace
S_ALR_87101281 Customer Exits
S_ALR_87101282 Objects in Customer Namespace
S_ALR_87101283 Audit Info System: Locked/Unlocked
S_ALR_87101284 Authorization Group Transfer
S_ALR_87101285 Authorization Groups
S_ALR_87101286 Maintain/Restore Authorization Grps
S_ALR_87101287 Program Analysis

SAP Audit Tcode S_BCE_*

List of SAP Audit management Tcodes starting with S_BCE_*

Table
SAP Audit Tcodes Description
S_BCE_68001393 Users by address data
S_BCE_68001394 Users According to Complex Criteria
S_BCE_68001395 Users According to Complex Criteria
S_BCE_68001396 Users According to Complex Criteria
S_BCE_68001397 Users According to Complex Criteria
S_BCE_68001398 Users According to Complex Criteria
S_BCE_68001399 Users According to Complex Criteria
S_BCE_68001400 Users According to Complex Criteria
S_BCE_68001401 Critical Combinations of Auth.
S_BCE_68001402 With Unsuccessful Logons
S_BCE_68001403 With Critical Authorizations
S_BCE_68001404 Profiles by Contained Profiles
S_BCE_68001405 Profiles by Authorization Name
S_BCE_68001406 SAP Audit Tcodes :Profiles by Values
S_BCE_68001407 Profiles by Changes
S_BCE_68001408 SAP Audit Tcodes :Profiles by Roles
S_BCE_68001409 Profiles According to Complex Crit.
S_BCE_68001410 Auth. Objects According to Complex
S_BCE_68001411 Auth. Objects According to Complex
S_BCE_68001412 Auth. Objects According to Complex
S_BCE_68001413 Auth. Objects According to Complex
S_BCE_68001414 Auth. According to Complex Criteria
S_BCE_68001415 Authorizations by Values
S_BCE_68001416 Authorizations by Changes
S_BCE_68001417 Auth. According to Complex Criteria
S_BCE_68001418 Roles by Role Name
S_BCE_68001419 Roles by User Assignment
S_BCE_68001420 Roles by Transaction Assignment
S_BCE_68001421 Roles by Profile Assignment
S_BCE_68001422 Roles by Authorization Object
S_BCE_68001423 Roles by Authorization Values
S_BCE_68001424 Roles by Change Data
S_BCE_68001425 Roles by Complex Criteria
S_BCE_68001426 Transactions for User
S_BCE_68001427 Transactions for User
S_BCE_68001428 Transactions for User
S_BCE_68001429 Transactions for User
S_BCE_68001430 SAP Audit Tcodes :Compare Users
S_BCE_68001431 Compare Profiles
S_BCE_68001432 Compare Authorizations
S_BCE_68001433 SAP Audit Tcodes: Comparisons
S_BCE_68001434 Where-used lists
S_BCE_68001435 Where-used lists
S_BCE_68001436 Where-used lists
S_BCE_68001437 Where-used lists
S_BCE_68001438 Where-used lists
S_BCE_68001439 For user
S_BCE_68001440 For profiles
S_BCE_68001441 For authorizations

Tags for SAP Audit Tcodes? 😕sap audit management,?sap audit program,?sap auditing,?sap security, audit,?auditing sap,?sap auditor,?audit software,?sap it audit ,?erp audit

This post introduces SAP® Security Audit Log.

Overview

According toSAP:The Security Audit Log records “security-related system information such as changes touser master records or unsuccessful login attempts. This log is a tool designed forauditors who need to take a detailed look at what occurs in the AS ABAP system. Byactivating the audit log, [the SAP system keeps a record] of those activities that youspecify for your audit. [Customers] can then access this information for evaluation in theform of an audit analysis report.

“The Security Audit Log provides for a long-term data access. The audit files are retaineduntil you explicitly delete them. Currently, the Security Audit Log does not support theautomatic archiving of the log files; however, you can manually archive them at any time.

“You can record the following information in the Security Audit Log:

  • Successful and unsuccessful dialog login attempts
  • Successful and unsuccessful RFC login attempts
  • RFC calls to function modules
  • Changes to user master records
  • Successful and unsuccessful transaction starts
  • Changes to the audit configuration”

According to Enterprise Threat Monitor:“SAP security audit log is the main location for the traces of events triggered by thesystem or by applications, which are related to security. [It is in the form of a table.]Based on the configuration which event types must be recorded, it saves the data to thedisk on the SAP application server instance.” Specify the audit files location by settingthe profile parameter, rsau/local/file, in the SAP system.

A SAP blogadds: “Since security audit logs are stored on the file system and not the database, they[do not impact performance]. The main consideration of the operations teams is the storagerequirements. Based on the activated event types (audit classes), the data volume [can vary].”

Configuration of Security Audit log

There are two configuration options in the security audit log:

  • Set Profile parameters
  • Use appropriate filter configuration using SM19 or RSAU_CONFIG

1. Profile parameters

Set profile parameters based on your release.

A) For releases earlier than 740: In the default profile, default.pfl, of the system,set the following profile parameters:

  • rsau/enable=1
  • rsau/user_selection=1
  • rsau/selection_slots=10 (or higher)
  • rsau/integrity=1 (if available - see SAP Notes 2033317 and 1810913)

B) For releases 740 to 751: Call transaction SM19. Activate the SecurityAudit Log by performing the following steps:

  1. Select the Security Audit active checkbox on the Kernel Parameters tab.
  2. Activate both Generic User Selection and Integrity Protection Format.
  3. Set the number of selection filters to at least 10.

C) For releases 752 and later: Call transaction RSAU_CONFIG. Activate the Security AuditLog by performing the following steps:

  1. Select the Static security audit active checkbox underSecurity Audit Log Configuration -> Parameters in the tree.
  2. Activate both Generic User Selection and Integrity protection format active.
  3. Set the Number of Filters per Profile to 10, which is the minimum requirement.

Note: When you use the Kernel parameters in the Security Audit Log configuration (step1B or 1C), existing settings with the same name in the system’s profile are ignored. Formore information, seeSAP Note 539404,answer 1a.

2. Setting up appropriate filter configurations

Sap Audit Log Table

To set up filters, perform the following steps:

  1. Call transaction SM19 or RSAU_CONFIG. Create a new profile.

  2. Create the following filters:

    • All clients (*), user SAP#*: Record all events. The character # serves to mask* as non-wildcard.
    • All clients (*), user <your emergency user IDs>*: Record all events.
    • Client 066, all users (*): Record all events.
    • All clients (*), all users (*): Record all events except AUW, AU5, AUK, CUV, DUR,and EUE (deactivate via Detailed Display).
  3. Save and activate the profile.

  4. Finally, check the configuration. If you have made changes to the profile parameters orthe static profile, restart the system to make them effective. Until you can restart thesystem: Convert the static profile to a dynamic profile and activate it.

Analysis of Security Audit log

Call transaction SM20/SM20N, or its equivalent transaction depending on your SAPNetweaver version (see the following table), and give the required selection criteria asinput. Click Reread Audit log to get the configured audit log for your system.

Table: Old and New functions of Transactions and reports related to the Security Audit Log

Table Source: https://blogs.sap.com/2014/12/11/analysis-and-recommended-settings-of-the-security-audit-log-sm19-sm20/#jive_content_id_Recommended_Settings_for_the_Security_Audit_Log_SM19__SM20

According to aSAP blog post:“You can view the long text of the Security Audit Log event messages using transactionSE92 (or in transaction SE61 if you choose the document class SL (Syslog). Usingnote 1970644, you can get reportRSAU_INFO_SYAG which shows all the events of the Security Audit Log including thecurrent status of activation. The detail view allows you to create a HTML-based eventdefinition print list including the full documentation.”

It primarily depends on customer requirements to enable all successful and non-successfulevents for all clients and users. TheSAP postcontinues: “There is no performance impact, not in time nor in space, if you logunsuccessful (=critical) events as these events happens rarely. As soon as you start loggingsuccessful events you might look to space—the growing size of the auditfiles—but still not to time, as the Security Audit Log is optimized for speed.”

SAP offers functionality to email Security Audit Logs with the help of reportsRSAU_SELECT_EVENTS or RSAU_READ_LOG. Schedule any of these reports as a backgroundjob to receive the audit log from the SAP system.

The following table gives an overview of the critical events messages store in the auditlog for different audit classes.

Sap Audit Log Table Pdf

Table: Critical events of Dialog, Transaction, RFC, and User audit classes

Table source: (https://blogs.sap.com/2014/12/11/analysis-and-recommended-settings-of-the-security-audit-log-sm19-sm20/#jive_content_id_Recommended_Settings_for_the_Security_Audit_Log_SM19__SM20)[https://blogs.sap.com/2014/12/11/analysis-and-recommended-settings-of-the-security-audit-log-sm19-sm20/#jive_content_id_Recommended_Settings_for_the_Security_Audit_Log_SM19__SM20]

Conclusion

Sap Audit Tcode

Switching on Security Audit log for all the clients and users is a crucial step in securityas it provides detailed information on the audit reports. Its benefits far outweigh itscosts and provide long term data access. I strongly recommended that you enable SecurityAudit log, especially in production environments.

Use the Feedback tab to make any comments or ask questions. You can also clickSales Chat to chat now and start the conversation.





Coments are closed