SM19/SM20 Security Audit Log

I would like to ask if we need to restart the server once we activated the Static Profile in SM19? I have 3 application servers and only 1 application server's audit log is running. When I try to activate the security audit log for the other two servers, I don't see the audit log updating after I clicked the Activate button. Profile parameter rsau/enable is already set to 1. space for audit files is sufficient. Is there anywhere else I can check why the audit log is not running?
Thanks!

If you set the dynamic filters, then you do not need to restart the server.
If you set static filters, then you do need to restart the server for them to take effect.
This may have changed, but in some releases if you display the dynamic filters and then return to the static filter tab, what you will be looking at on the screen will still be the dynamic filter settings. This can be confusing.

Similar Messages

  • Security Audit Log SM19 and Log Management external tool

    Hi all,
    we are connecting a SAP ECC system with a third part product for log management.
    Our SAP system is composed by many application servers.
    We have connected the external tool with the SAP central system.
    The external product gathers data from SAP Security Audit Log (SM19/SM20).
    The problem is that we see, in the external tool,  only the data available in the central system.
    The mandatory parameters have been activated and the system has been restarted.
    The strategy of SAP Security Audit Log is to create many audit log file for each application server. Probably, only when SM20 is started, all audit files from all application servers are read and collected.
    In our scenario, we do not use SM20 since we want read the collected data in the external tool.
    Is there a job to be scheduled (or something else) in order to have all Security Audit Log available (from all application servers) in the central instance ?
    Thanks in advance.
    Andrea Cavalleri

    I am always amazed at these questions...
    For one, SAP provides an example report ( RSAU_READ_AUDITLOG_EXTERNAL ) to use BAPIs for alerts from the audit log yet 3rd party solutions seem to be alergic to using APIs for some reason.
    However, mainly I do not understand why people don't use the CCMS (tcode RZ20) security templates and monitor the log centrally from SolMan. You can do a million cool things in SolMan... but no...
    Cheers,
    Julius

  • How to schedule a batch job to generate security audit log (SM20)

    May be this is a repeat question for this forum. Apologize, if it is. Is there a way to schedule a batch job to generate security audit log (SM20) automatically and possibly send a message to SAP Inbox or generate a spool request? Release is 4.6C.
    Regards
    Nirmal

    > May be this is a repeat question for this forum. Apologize, if it is.
    You don't need to apologize. You only need to do a very simple search...
    > Total Questions:  18 (16 unresolved) 
    Perhaps 16 of those 18 questions you have not followed up on could have been spared as well?
    Please do the needfull.
    Cheers,
    Julius

  • Blank Security Audit Log in SM20

    Dear Experts,
    The rec/client parameter is set 'OFF'. So no security audit log is generated in SAP. but still if as Security audit log is required is there any way to get the log from SAP from any of the standard report, program or table.
    << Moderator message - Everyone's problem is important. But the answers in the forum are provided by volunteers. Please do not ask for help quickly. >>
    thanks in advance,
    Rahul
    Edited by: Rob Burbank on Jan 14, 2011 4:44 PM

    Table logging and Security audit log are two different things. if rec/client parameter is disable then table logging will not possible. but if you need audit log then you have to enable it through SM19.
    Regards,
    Subhash

  • SM19 - Security Audit Log

    Hello,
    I have activated Security Audit Log through SM19.
    When I check the Parameters, I can see
    rsau/max_diskspace/local                           = 20M
    (Maximum space for security audit file)
    1. My question is if the collective size of security Audit files exceeds 20M, which file will SAP delete? or rather what is the exact course of action that SAP would take?
    2. In my system, Parameter rsau/enable = 0 (Enable Security Audit)
    But still the audit logs are getting generated.
    So does '0' signify Enabled?
    Thanks.

    I think your answer can be found in [this thread|Re: Security Audit Log FULL. What happens??;
    Kind regards,
    Lodewijk

  • "logon time" between USR41 and security audit log

    Dear colleagues,
    I got a following question from customer for security audit reason.
    > 'Logon date' and 'Logon time' values stored in table  USR41 are exactly same as
    > logon history of Security Audit Log(Tr-cd:SM20)?
    Table:USR41 saves 'logon date' and 'logon time' when user logs on to SAP System from SAP GUI.
    And the Security Audit Log(Tr-cd:SM20) can save user's logon history;
    at the time when user logged on, the security audit log is recorded .
    I tried to check SAP GUI logon program:SAPMSYST several ways, however,
    I could not check it because the program is protected even for read access.
    I want to know about specification of "logon time" between USR41 and security audit log,
    or about how to look into the program:SAPMSYST and debug it.
    Thank you.
    Best Regards.

    Hi,
    If you configure Security Audit you can achieve your goals...
    1-Audit the employees how access the screens, tables, data...etc
    Answer : Option 1 & 3
    2-Audit all changes by all users to the data
    Answer : Option 1 & 3
    3-Keep the data up to one month
    Answer: No such settings, but you can define maximum log size.
    4-Log retention period can be defined.
    Answer: No !.. but you can define maximum log size.
    SM19/SM20 Options:
    1-Dialog logon
    You can check how many users logged in and at what time
    2-RFC login/call
    Same as above you can check RFC logins
    3-Transaction/report start
    You can see which report or transaction are executed and at what time
    (It will help you to analyise unauthorized data change. Transactions/report can give you an idea, what data has been changed. So you can see who changed the data)
    4-User master change
    (You can see user master changes log with this option)
    5-System/Other events
    (System error can be logged using this option)
    Hope, it clear the things...
    Regards.
    Rajesh Narkhede

  • CCMS and Security Audit log

    I have seen a huge number of companies who do not use SM19/SM20 or RZ20. It is not configured. example I worked for 3 clients(user base 14000, 16000,1000) and none of them have this configuration.
    Do you know why is it so if it is not configured at your place.
    Thanks
    Edited by: Pankaj Jain on Sep 26, 2009 7:02 PM

    Performance impact is dependent on the Hardware sizing and the daily monitoring activities together with the back up schedule by the BASIS team.
    My experience is: I have seen maximum of clients using this for logging activities of ALL users in the system. In other few cases, it is restricted to Super and Special users.
    Please go through the document: [Security Audit Log|http://www.sdn.sap.com/irj/scn/index?rid=/library/uuid/2088d9d4-e011-2a10-bba9-90548dbc2d6a&overridelayout=true] (it's a bit Old)
    Try searching Community with SM20 / SM19 / Security Audit Log search strings.
    Regards,
    Dipanjan

  • Security Audit Log - Different Files

    Hello gurus,
    I configured the security audit log of the AS java in our portal system.
    But i want a dynamic configuration like SM20 - SM19 in R/3 systems. I want to have audit<the date>.log file format. For
    example audit041608.log for 04.16.2008
                 audit041708.log for 04.17.2008
    Is this possible?
    <removed_by_moderator>
    Best regards
    Tolga
    Edited by: Julius Bussche on Apr 16, 2008 2:43 PM

    Thanks for your answer.
    I think I am misunderstood or I am misunderstanding
    Let me explain a little bit more;
    I am trying to configure secaudit in our portal system and configure it in  such a way that the logs will
    be stored in secaudit log files day by day.
    I configured secaudit as a seperate file but after the size limit,
    it clears the logfile and starts to write on the same logfile.
    We could do this by adding a profile parameter;
    "FN_AUDIT = <SID>_<Instance_No>_audit_++++++++.AUD" in R/3 system.
    But how can i do this in a portal system if it is possible?
    Best regards
    Tolga
    Edited by: Tolga Akinci on Apr 17, 2008 4:24 PM

  • Monitoring Users (Trace or security-Audit-Log)

    Hi,
    we have 2 extrernal Users in our system and want to know, what they are "doing" in
    our Sytem (Tcode, Reports etc.).
    Is the best way to use security-Audit-Log (SM19/SM20) or to us etraces (ST01/ST05/ST11).
    Thanks for Help.
    regards, Dieter

    Hi Thomas,
    thanks for your answer. I try as you has mentioned.
    Regards, Dieter

  • Weu0092d like to get Custom reports. The base of reports is Security Audit Log

    We’d like to get Custom reports. The base of reports is Security Audit Log files. This is files for SM20.
    What does the file structure look like? What is field of it?
    Thanks!

    Hello Marina
    The data written to the security audit log correspond to the DDIC structures RSLGENTR (up to release 4.6) and RSAUENTR2 (in newer releases). DDIC structures can be viewed using TA SE11 (data type).
    As I can see you have already opened a thread regarding this. Please don't duplicate the threads, as this only widespreads the information.
    Regards,
    Désiré

  • Security audit log for the last 30 days?

    Hi,
    My current settings for the security audit log is 20 MB (by default).  I dont want to control it with file size limitation, but by the no. of days the audit is recorded (max 30 days).
    What are the parameters that I would need to maintain?
    Or any additinal config is required?
    Thanks,
    Abdul

    Hi,
    My current configuration is like this:
    Name                Description                                           Current value                                            System default value
    FN_AUDIT     Name of security audit file          audit_++++++++
    DIR_AUDIT     Directory for security audit files     /usr/sap/GSP/DVEBMGS00/log     /usr/sap/GSP/D00/log
    rsau/enable     Enable Security Audit          0
    rsau/max_diskspace/local     Maximum space for security audit file     300M     20M
    rsau/max_diskspace/per_day     Maximum size of all security audit files per day          0
    rsau/max_diskspace/per_file     Maximum size of one single security audit file          0
    rsau/selection_slots     Number of selection slots for security audit          2
    rsau/user_selection     Defines the user selection method used inside kernel functions          0
    I have just activated the audit, and in just 30 minutes, I can see that the file is about 45MB.  If this is the growth rate, the 300MB allocated for audit will completely used in just a day.
    My requirement is - I want to track users and their activities for the last 30 days (or 45 days).  No log should be overwritten unless it is atleast 30 days old.
    In SM20, when I give selection from 1.1.10 to 31.1.10, it should show me all the activities during this period, without any breaks.
    Other doubts: Do I have to start auditing manually every day?  Or will it keep writing logs until it reaches 300 MB which can spread upto multiple days.
    Regards
    Abdul
    Edited by: Abdul Rahim Shaik on Feb 4, 2010 11:17 AM

  • Need details of people logged on when the Security audit log was deactive

    Respected Guru's,
    Security audit log was deactivated, i have activated it recently in sm19.
    Now, i should get the details of people logged on when the audit log was deactive.
    What are the posibilities of Security audit being deactivated.
    Regards,
    Daya.

    Dear Alex,
    Please let me know how to check in ST03N.
    Further, how to retrive user logon data which is not recorded in the audit files.
    Edited by: Dayananadan Anandan on Nov 12, 2009 10:03 AM

  • Regd. Security Audit log

    Hi,
    We have a requirement from business to activate Security audit log for all Business users. We have around 160 Business users but in SM19 I am able to set filters for only 10 users maximum.
    Also I tried creating 16 profiles and maintained 10 users each but still I was able to activate only one profile at a time.
    If I put * in the user tab then system starts logging for all users including our ESS users. But we don't want to log for ESS users as there are 1000+ ESS users which will affect the growth of the security log as well the performance.
    Please suggest is there any way to enable security log only for around 160 users using SM19.
    Regards,
    Nalla.

    > Thanks for the update. But rsau/user_selection will not help us because our user ids are similar to our employee ids and we cant use wild card option like RFC* or ESS*.
    I thought it worth mentioning, to consider for next time...
    > Also in detailed selection option in SM19, i tried removing the RFC related options but still when our ESS users login, it is getting logged.
    Possibly it is logging the RFC call and not the RFC authentication. Try the other way around and filter out the successfull logins in SM20N.
    > Is there any way we can restrict using user group or licensing type?
    No, not to my knowledge.
    > Will it be a minor development if I ask our ABAPER to create a Z Tcode similar to SU19 by including user group or is there any user exit which can help us to put restriciton on user group wise.
    You can make the screen program glow in the dark in a Z-tcode, but the location where the log is written is not accessible to you and that is where the music is.
    The best option is to set a carefully chosen and tested filter in SM19 which covers your requirement without stopping the log, and then use SM20N to filter a subset of that.
    You can also define the selection methods and reaction methods in transaction RZ21 and then activate them in a monitoring template in RZ20. This way you are faster and will only see what you want.
    You can also do the same in Solution Manager for the managed systems and have a central monitoring and reaction from there. Then you are on the right track in my opinion.
    Cheers,
    Julius

  • Getting the name of the program or the FM called from security audit log

    Dears,
    Is there a way to get the name of the ABAP program called through transaction SE38, or the FM called through transaction SE37, from the security audit log ?
    What is available is only : RSABAPPROGRAM for transaction SE38, and RSFUNCTIONBUILDER for transaction SE37
    Thanks.
    Reda

    I had always assumed this log to be in the SUBMIT statement, but never used it.
    If I remember correctly this is recorded it the runtime submit, so it should be there.
    Perhaps it is only in selected reports? I will check in my system.
    Please compare with sm20n and run the report from sa38. The submits are different in sa38 etc compared to se38.
    The FM will only be recorded it it has a destination extention in the source system which is mostly remote. Local fm calls are not recorded for sure.
    Cheers,
    Julius
    Edited by: Julius Bussche on Jul 26, 2011 11:32 PM

  • Security Audit Log for XI IB

    Hello,
    on the ABAP Stack it is possible to activate the security audit log, to log activities on certain objects/functions. Is there also a possibilty to do this for the JAVA-Stack.
    We have for legal reasons to log, want users are doing on the productive XI system. E.g. we wanna log if someone is changing the value mapping or configurating the adapter.
    Regards, Werner

    Hi,
    chk out these links
    Audit Log
    http://help.sap.com/saphelp_me21sp2/helpdata/en/23/c9833b3bb1780fe10000000a11402f/content.htm
    regards
    jithesh

Maybe you are looking for

  • How does one set a password a start-up?

    My mac book pro with retina display is operating on OS X Version 10.9.2 and it was built in 12/2012.  How do I set a password at start-up?  The answers I find on line are for older mac book pros and haven't helped me.  Thanks in advance.

  • How to find the Transport request for table entry

    Hi , There was certain entry made in the SAP std table and which got transported to subsequent system. I want to find the Transport Request Number which was containign that table entry and which gor transported. Please suggest how can I find that tra

  • Problem synching 8320 calendar with Outlook calendar

    Hello, I am new to this forum and I am really hoping someone can help me.  When I synch my 8320 all items from my Outlook calendar synch except for the ones that I enter myself.  I can see them on Outlook but they don't show up on my BlackBerry.  Can

  • Problems With 4K at 60fps & a High-End Graphics Card

    I'm having major problems editing footage shot at 3840x2160 @ 59.94. The video will play back fine initially, but after a few seconds, the video starts chugging along until I get less than 1fps. I have the same problem using adaptive resolution durin

  • IPhone5 not recognized in iTunes

    I received my new iPhone 5 via mail.  Before I activated it I upgraded my iPhone4 to iOS6 and my mac to 10.8.2 so everything would be up to date.  My iPhone5 never showed on iTunes in my device list. My iPad2 and old iPhone4 continued to show in the