Cybersecurity2020: How to get the most out of using the SAP Security Audit Log
SAPinsider are taking their August Cybersecurity2020 conference online, and Winterhawk’s Head of Technology Bill Oliver is going to be one of the speakers.
Bill is among 150+ SAP Technology experts speaking across the 4-day event which explores the latest trends, biggest challenges, customer case studies, and best practices for securing your SAP platforms, products, deployments, processes, and business applications.
“How to get the most out of using the SAP Security Audit Log – from configuration to monitoring” will provide an overview of what the SAP security audit log is, how to configure it, and how best to use it.
The log records security-related system information such as unsuccessful logon attempts, changes to user master records, and remote function calls (RFCs) for review and investigation. By attending this session, you will:
- Walk through the configuration steps for setting up the SAP security audit log and understand the best ways to report and monitor the events
- Gain an understanding of the types of activities that can and should be monitored
- Learn what filters you can place on the logs to get the best result
- Discover the best ways of “selling” the use of the SAP security audit log to senior management
Find out what else is on the SAPinsider’s Virtual Conference agenda (18-21 August 2020) here.