DevOps and System Administration Forum
cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Security audit log for user specific and table

former_member850355
Discoverer
0 Likes
3,106

Hi,

I would like to activate the security audit log for a set of tables user specific. Is it possible in SM19? If yes, which option i would need to select.

Does it capture the changes in DBTABLOG or any other table available?

4 REPLIES 4
Read only

Neeraj_Jain1
Active Contributor
0 Likes
2,739

Hello cravisap,

Please check transaction AUT10 if it's works for you.

Regards,

Neeraj Jain

Best Regards,
Neeraj Jain
Read only

0 Likes
2,739

Please refer below SAP help link if it works:

https://help.sap.com/docs/SAP_NETWEAVER_740/56bf1265a92e4b4d9a72448c579887af/6c57bf393b57ac22e100000...

Best Regards,
Neeraj Jain
Read only

former_member850355
Discoverer
0 Likes
2,739

Hi Neeraj,

Thank you for sharing the information. I do not have AUT10 tcode in my system. I am using SAP BW on oracle system.

I tried to check the data in SCU3 which would display all the data logs especially what data has been changed.

I want to capture the log data for a user specific for a list of tables. For instance, i have 100 users with 1000 tables.

I want to capture USER10 manual activity on TABLE05 data. I dont want to capture all the users information. How to configure it.

Read only

marco_hammel2
Participant
2,739

Hi @cravisap ,

What you want to achieve is not possible by security audit log (standard) events only. I'd either require:

1. A correlation of security audit log events with events recorded in DBTablog (Table change log - requires the table to be activated for logging). For example: SAL Event -> User starts SE16N and subsequentially DU9 event for the loaded table and susequential record edits for the table. This is one of many possible use cases with different possible event sources.

2. Implement BAdIs and user exists where necessary to log custom SAL events as per note 1941568.

3. Adressing such events on the user's endpoints for example with EDR tooling

4. A combination of 1 too 3

Certain SAP security solution and service providers (like us at NO MONKEY ) provide consultancy and training for such detection scenarios and can guide through the process of implementing such capabilities.

As a general advice: Start with understanding and model your threats and attack surface first to decide on a meaningful prioritization to implement detection capabilities.

BR

Marco