Skip to Content
author's profile photo Former Member
Former Member

Audit Logs

Is it required to activate the audit log in production? If not, are there other tools/reports that can provide similar data? BTW, I'm using ECC6.

If I were to activate this, what things should I be aware of in configuring SM19? Are there any parameters that need to be changed? What should I do with the logs? Should I be checking the logs everyday? Do these logs take a lot of space? Can these logs be deleted?

I know I still have a lot to learn being a newbie to this so I really appreciate all your replies.

Add a comment
10|10000 characters needed characters exceeded

Assigned Tags

Related questions

2 Answers

  • author's profile photo Former Member
    Former Member
    Posted on Jun 18, 2008 at 08:25 AM

    Hi

    check these links

    http://help.sap.com/saphelp_nw04/helpdata/en/2c/c59d37d373243de10000009b38f8cf/frameset.htm

    FAQ: Answers to questions about the Security Audit Log SAP Note Number: 539404

    Add a comment
    10|10000 characters needed characters exceeded

  • Posted on Jun 18, 2008 at 08:32 AM

    Hi Bliss,

    if you use the search function in this Forum (for instance use 'Audit Log' as search item), you will find the answers to your questions....

    😉

    b.rgds, Bernhard

    Add a comment
    10|10000 characters needed characters exceeded

    • Former Member

      Hi ,

      you need to refer to documentation for optimum performance

      This note - 451960 will give AIS role concept and Installation recommendation

      and just for information following profile parameters need to be set to activate the AIS.

      Profile Parameter Description

      rsau/local/file This parameter defines names and locations of the audit files. (This was an optional parameter starting with 4.6C. It no longer exists in Web Application Server 6.30.)

      rsau/max_diskspace/local This parameter defines the maximum space to allocate for the audit files.

      rsau/selection_slots This parameter defines the number of filters to allow for the security audit log.

      still you have to refer to full documentation

      thanks

      santosh kumar

Before answering

You should only submit an answer when you are proposing a solution to the poster's problem. If you want the poster to clarify the question or provide more information, please leave a comment instead, requesting additional details. When answering, please include specifics, such as step-by-step instructions, context for the solution, and links to useful resources. Also, please make sure that you answer complies with our Rules of Engagement.
You must be Logged in to submit an answer.

Up to 10 attachments (including images) can be used with a maximum of 1.0 MB each and 10.5 MB total.