<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Transactions sm20 and sm21 in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582144#M590535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dixie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SM21 ( SAP System Log ) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SAP System logs all system errors, warnings, user locks due to failed logon attempts from known users, and process messages in the system log.These can be helpful when analyzing issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SM20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the Security Audit Log to record security-related system information such as changes to user master records or unsuccessful logon attempts. This log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP System. By activating the audit log, you keep a record of those activities that you specify for your audit. You can then access this information for evaluation in the form of an audit analysis report. The Security Audit Log provides for long-term data access. The audit files are retained until you explicitly delete them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link for more details&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04s/helpdata/en/c7/69bcbaf36611d3a6510000e835363f/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04s/helpdata/en/c7/69bcbaf36611d3a6510000e835363f/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main disadvantages of activating audit logsare the performance and disk space usage. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prince Jose&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Aug 2007 13:09:39 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-08-03T13:09:39Z</dc:date>
    <item>
      <title>Transactions sm20 and sm21</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582143#M590534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone pls tell me the difference in the logs of 'security audit'-sm20 and 'sytem '-sm21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also would want to know  about activating the security audit-sm19 and the consequences of activating it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2007 11:03:33 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582143#M590534</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-03T11:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Transactions sm20 and sm21</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582144#M590535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dixie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SM21 ( SAP System Log ) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SAP System logs all system errors, warnings, user locks due to failed logon attempts from known users, and process messages in the system log.These can be helpful when analyzing issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SM20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the Security Audit Log to record security-related system information such as changes to user master records or unsuccessful logon attempts. This log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP System. By activating the audit log, you keep a record of those activities that you specify for your audit. You can then access this information for evaluation in the form of an audit analysis report. The Security Audit Log provides for long-term data access. The audit files are retained until you explicitly delete them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link for more details&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04s/helpdata/en/c7/69bcbaf36611d3a6510000e835363f/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04s/helpdata/en/c7/69bcbaf36611d3a6510000e835363f/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main disadvantages of activating audit logsare the performance and disk space usage. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prince Jose&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2007 13:09:39 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582144#M590535</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-03T13:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: Transactions sm20 and sm21</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582145#M590536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jose&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2007 06:48:39 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/transactions-sm20-and-sm21/m-p/2582145#M590536</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-07T06:48:39Z</dc:date>
    </item>
  </channel>
</rss>

