13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: Security AdministrationAudit ToolsThese are all the procedures for the Audit_Allstructure with a ZVUE view.ÃThe Security Audit Log records the security-related activities of users in the system. Theseactivities include successful and failed: Dialog logon attempts Report and transaction starts RFC/CPIC logonsOther events written into the log are: Locked transactions or users Changed or deleted: Authorizations Authorization profiles User master records Changes to the audit configurationThe log is created each day, and previous logs are neither deleted nor overwritten. The logfiles can become numerous and large, so we recommend that the logs be periodicallyarchived before being manually purged. An audit analysis report can be generated from theaudit logs. You can analyze a local server, a remote server, or all the servers in an R/3System.Based on certain criteria, the information in the security audit files can be manipulated totailor the audit analysis report.The report assists the administrator: Reconstruct or analyze incidents Improve security by recognizing inadequate measures11–44Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!