Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
Showing results for 
Search instead for 
Did you mean: 
With SAP’s new offer customers can evaluate SAP Enterprise Threat Detection based on Cloud Appliance Library (CAL) within a one day workshop together with one of our highly experienced SAP Security consultants. This experience workshop is free of additional costs.

SAP Enterprise Threat Detection provided in the Cloud Appliance Library is a quick and very easy way to consume the SAP Enterprise Threat Detection solution in the cloud. You will receive a preconfigured and ready-to-use SAP Enterprise Threat Detection solution bundle. This solution bundle and the demo scenarios included can be used to quickly explore the capabilities of SAP Enterprise Threat Detection.

Kick-start your SAP Enterprise Threat Detection projects – within only few hours!

Within this one-day workshop companies can evaluate the SAP Enterprise Threat Detection solution on a Cloud Appliance Library, connecting one of their own SAP ERP or SAP S/4HANA systems (on premise or private cloud) to SAP Enterprise Threat Detection. No additional hardware or software installation is required. With this one-day experience together with one of our highly experienced SAP security consultants, our customers can get all the information they need to find the optimal solution tailored to their organization needs.

General information on CAL is available here: SAP Cloud Appliance Library (CAL).


The one-day workshop is free of additional cost:

  • No hardware costs

  • No CAL subscription fee

  • No SAP license costs

  • No consulting fees


For a real customer experience, customers can connect one own SAP ERP or SAP S/4HANA system (on premise or private cloud) to the CAL instance. Within the preparation phase we will provide the Port and the related IP address that must be maintained within the system landscape.

How to access the solution?

The Solution contains an S/4 HANA ERP demo system an SAP Enterprsie Threat Detection demo system.

  • Enterprise Threat Detection can be accessed via browser.

  • The Demo SAP S/4 HANA can be accessed via SAP GUI.

What demo scenarios are included?

Using this demo edition, you can use SAP Enterprise Threat Detection to analyze and monitor suspicious activity in the package-included SAP S/4HANA system and the package-included SAP HANA database.

Alternatively, to the usage of package-included systems and additionally SAP generated test data, you can connect your own SAP ERP or SAP S/4HANA systems (on premise or private cloud) to the Cloud Appliance Library.

Providing Logs from SAP S/4 HANA

Automated SAP S/4HANA processes and manual activities in SAP ERP (for example, calling a transaction, changing user authorizations, debugging, logon, HTTP requests) result in logs. These logs are transferred to SAP Enterprise Threat Detection, where they are visible as events. To manually simulate suspicious access or attacks, which you can analyze afterwards using SAP Enterprise Threat Detection, use the pre-configured SAP Logon on the frontend server for connecting to SAP S/4HANA.

Providing Logs from SAP HANA SAP

Enterprise Threat Detection can consume audit trails from SAP HANA. In this demo environment HANA Audit Trail is configured to protocol all logons and as an example accesses to a database table. These logs are transferred to SAP Enterprise Threat Detection, where they are visible as events and can be further analyzed. You can even extend the logging by extending the HANA Audit Trail configuration. Build your individual scenarios and learn how you can monitor access to critical assets such as critical database tables and by that be alerted and have the time to react in case suspicious activities are being performed on your critical assets.

SAP ETD Test Events Generation

In this demo environment test events can be created to generate noise in the system for demo purposes. Browse through the data and build your individual charts and dashboards within SAP ETD.

Analyze Events and Alerts with SAP Enterprise Threat Detection

This demo edition enables you to explore SAP Enterprise Threat Detection. You can analyze and monitor suspicious activities in the SAP S/4HANA system or SAP HANA database, create Attack Detection Patterns, process alerts or you can train the system to learn a new log source by making use of the log learning application.

If you are interested in that offer, please contact your SAP key Account Manager.

SAP reserves the right to withdraw the offer at any time.

As there might be a high interest on that offer, a dedicated date for the one-day experience on SAP Enterprise Threat Detection must be scheduled.