<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Audit Log in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-audit-log/m-p/2020886#M413544</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Zeeshan,&lt;/P&gt;&lt;P&gt;A few inputs from my side..&lt;/P&gt;&lt;P&gt;We enable Security Audit logs only for System Administrators in PRD systems. ( He would anyways not have SPRO in PRD) and also its not activated on other systems like DEV or QTY as of now.&lt;/P&gt;&lt;P&gt;So our biggest concern is in PRD and we avoid giving any Cistomizing or Dev transactions to any of the users in PRD.&lt;/P&gt;&lt;P&gt;In case of any special situtaions we give them EXTRA authorizations and activate the Log via SM19. I am sure they would not be doing SPRO customization in PRD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in other views, we have looked at VIRSA firefighter ID's for complete logging mechanism which has a step more on User logging.&lt;/P&gt;&lt;P&gt;I also have learnt that a few stringent laws in some countries restrict from complete logging of users.You should not trace the users completely end to end of what activity they are doing in the system..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it Helps.&lt;/P&gt;&lt;P&gt;VBr,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;P&gt;Award points for helpful answers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Mar 2007 12:23:01 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-03-20T12:23:01Z</dc:date>
    <item>
      <title>Security Audit Log</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-audit-log/m-p/2020885#M413543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ALL,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One small question..  I have enabled &amp;#147;Security Audit Log&amp;#148; through SM19 after setting the profile parameters , every thing is working fine BUT when things come to SPRO the analysis report only shows SPRO Transaction, but I want to have further detail like in SPRO user accessed which transactions of customization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will it be done through audit log or there is some other way..i want maximum logging of user activities..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please reply and get poits SURELY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zeeshan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 06:29:29 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-audit-log/m-p/2020885#M413543</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-03-20T06:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Log</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-audit-log/m-p/2020886#M413544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Zeeshan,&lt;/P&gt;&lt;P&gt;A few inputs from my side..&lt;/P&gt;&lt;P&gt;We enable Security Audit logs only for System Administrators in PRD systems. ( He would anyways not have SPRO in PRD) and also its not activated on other systems like DEV or QTY as of now.&lt;/P&gt;&lt;P&gt;So our biggest concern is in PRD and we avoid giving any Cistomizing or Dev transactions to any of the users in PRD.&lt;/P&gt;&lt;P&gt;In case of any special situtaions we give them EXTRA authorizations and activate the Log via SM19. I am sure they would not be doing SPRO customization in PRD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in other views, we have looked at VIRSA firefighter ID's for complete logging mechanism which has a step more on User logging.&lt;/P&gt;&lt;P&gt;I also have learnt that a few stringent laws in some countries restrict from complete logging of users.You should not trace the users completely end to end of what activity they are doing in the system..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it Helps.&lt;/P&gt;&lt;P&gt;VBr,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;P&gt;Award points for helpful answers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 12:23:01 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-audit-log/m-p/2020886#M413544</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-03-20T12:23:01Z</dc:date>
    </item>
  </channel>
</rss>

