Quantcast
Channel: SCN : All Content - Security
Viewing all articles
Browse latest Browse all 2858

Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)

$
0
0

This document was generated from the following discussion: Recommended Settings for the Security Audit Log (SM19 / SM20)

 

This blog had started to give recommendations about settings for the Security Audit Log, but in the meantime it had evolved to show tips & tricks in general.

Another sound source for information is the FAQ note 539404 - FAQ: Answers to questions about the Security Audit Log.

 

Contents

 

 

Profile Parameters / Kernel Parameters

 

rsau/enable = 1

rsau/selection_slots = 10

rsau/user_selection = 1

 

As of release SAP_BASIS 7.3 you can use the so-called "Kernel Parameters" instead of the listed Profile Parameters. You find them on a new tab in transaction SM19. See chapter Preparing the Security Audit Log in the Online Documentation. You can set them dynamically and once set they overwrite the values of the profile parameters.

 

Filter settings in SM19

 

1. Filter: Activate everything which is critical for all users '*' in all clients  '*'.

  • You may deactivate the messages of class “User master record change (32)” because you get change documents for users in transaction SUIM anyway.
  • Consider to add messages AUO, AUZ, BU5, BU6, BU7, BU9, BUA, BUB BUC, BUH, AUP, AUQ
  • If you maintain logical file names using transaction FILE (see note 1497003) than add messages CUQ, CUR, CUS, CUT
  • If you maintain an Access Control List for RFC callback (see note 2128095) than add messages DUI, DUJ, DUK

 

 

2. Filter: Activate everything for special user SAP* in all clients '*'

You cannot use a filter 'SAP*' because this would include the virtual user SAPSYS because of profile parameter rsau/user_selection = 1. This virtual user SAPSYS performs many house-keeping activities triggered by the system itself. You do not want to log these events.

 

However, you can use the special filter value 'SAP#*' instead.

 

You can use this special filter value 'SAP#*'in transaction SM20 or report RSAU_SELECT_EVENTS as well to show log entries in for user SAP* only.

 

 

3+4. Filter: Activate everything for other support and emergency users, e.g. 'SAPSUPPORT*' (SAP Support users) respective 'FF*' (FireFighter) in all clients '*'.

 

 

5. Filter: Activate all events for the dialog activities 'logon' and 'transaction' for user 'DDIC' in all clients '*'. This user should not be used in dialog mode. It's only required for specific activities while applying support packages or while importing transports (however in this case you can use another background user as well).

 

 

6. Filter: Activate everything for client '066'. This client is not used anymore and can be deleted (see  http://scn.sap.com/community/security/blog/2013/06/06/how-to-remove-unused-clients-including-client-001-and-066 ).

 

 

7. Filter: Activate RFC events (AUL, AUK, AU6, AU5) for a short time for selected users to identity RFC connection problems easily (see http://scn.sap.com/community/security/blog/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free ).

 

 

8.-10. Filter: free for other project specific purpose

 

Using the print function (command PRINT) in transaction SM19 or using report RSAU_INFO_SYAG you can show an overview about the current settings.

 

List of events

 

If you miss some of the events described in this document then search for notes of application component BC-SEC-SAL.

 

Using note 1970644 you can get report RSAU_INFO_SYAG which shows all events of the Security Audit Log including the current status of activation. The detail view allows you to create an HTML-based event definition print list including the full documentation.

 

Events ordered by selected topics and security optimization projects:

 

Topic KeywordDescription and referencesMessage
BACK

RFC callback (note 2128095)

Project: "Secure RFC Callback"

DUI DUJ DUK
CCM_TOOLSET_STARTERBUX
CUSTOMCustom specific events using function module RSAU_WRITE_CUSTOMER_EVTS (note 1941526)DUX DUY DUZ
DEBUGDebugging (change mode)CUL CU_M (BUZ)
EHS-SADM(note 1792047)DUA DUB DUC DUD DUE DUF DUG
FILE

Directory Traversal (note 1497003)

Project: "Secure File access"

CUQ CUR CUS CUT
OAUTHOAuth 2.0(AU2) BUV BUW DUH
PAYLOADCUU CUX
RALRead Access Logging (note 1902280)BU0 CU0
RBAMRole Based Access Management in SAP Business ByDesign system (note 948275)BUI BUJ
REPORT

Report start

Project: "Avoid SA38 by using custom report transactions"

AUW AUX
RFC-TABLE

Generic table access via RFC using functions like RFC_READ_TABLE (note 1539105)

Project: "Secure standard table access (authorization object S_TABU_RFC)"

CUZ
SACF

Switchable authorization scenarios, transaction SACF (note 2078596)

Project: "Secure RFC functions"

DUO DUP DUQ DUU DUV
SAMLSAML Authentication, transaction SRTUTIL (note 1570266)(AU2) BUK BUL BUM BUN BUO BUP CUA CUB CUC CUD CUE CUF CUG CUH
SAP FTP

FTP server whitelist using table SAPFTP_SERVERS(note 1605054)

Project: "Secure SAP FTP"

DU1 DU2 DU3 DU4 DU5 DU6 DU7 DU8
SE16

Generic table access using transactions like SE16, SE16N, SM30, SM31, SM34, or SQV (note 2041892)

Project: "Secure standard table access (authorization object S_TABU_DIS, S_TABU_NAM)"

DU9
SLDWGeneric whitelistsDUL DUM DUN
SNC

SNC Client Encryption (note 2104732)

Project: "Encrypt SAPGUI comminication"

BUJ
TCODETransactionsAU3 AU4 AUP AUQ
USERChange user master data (not required as you get change documents anyway)BU2 AU8 AU7 AU9 AUA AUB AUD AUR AUS AUT AUU
WEB-SERVICEWeb service calls (note 1620477)CUV CUW
XSRFXSRF attacks (note 1619912)BUS

 

List of events from table TSL1D

 

Audit ClassEvent classAREA+SUBIDMessage
Dialog LogonNon-Crit.AUCUser Logoff
Dialog LogonNon-Crit.BUEWS: Delayed logon successful (type &B, WP &C). Refer to Web service log &A.
Dialog LogonNon-Crit.BUK&A Assertion Used
Dialog LogonNon-Crit.BUL&A: &B
Dialog LogonNon-Crit.BUMName ID of a subject
Dialog LogonNon-Crit.BUNAttribute
Dialog LogonNon-Crit.BUOAuthentication Assertion
Dialog LogonNon-Crit.BUP&A
Dialog LogonNon-Crit.BUQSigned LogoutRequest accepted
Dialog LogonNon-Crit.BURUnsigned LogoutRequest accepted
Dialog LogonNon-Crit.CU1Test message CU1
Dialog LogonImportantAU1Logon Successful (Type=&A)
Dialog LogonImportantAUOLogon Failed (Reason = &B, Type = &A)
Dialog LogonImportantCUARejected Assertion
Dialog LogonImportantCUB&A: &B
Dialog LogonImportantCUC&A
Dialog LogonImportantCUDName ID of a subject
Dialog LogonImportantCUEAttribute
Dialog LogonImportantCUFAuthentication Assertion
Dialog LogonImportantCUGSigned LogoutRequest rejected
Dialog LogonImportantCUHUnsigned LogoutRequest rejected
Dialog LogonCriticalAU2Logon Failed (Reason = &B, Type = &A)
Dialog LogonCriticalAUMUser &B Locked in Client &A After Erroneous Password Checks
Dialog LogonCriticalAUNUser &B in Client &A Unlocked After Being Locked Due to Inval.Password Entered
Dialog LogonCriticalBUDWS: Delayed logon failed (type &B, WP &C). Refer to Web service log &A.
Dialog LogonCriticalBUISPNego replay attack detected (UPN=&A)
RFC/CPIC LogonNon-Crit.AU5RFC/CPIC Logon Successful (Type = &A)
RFC/CPIC LogonCriticalAU6RFC/CPIC Logon Failed, Reason = &B, Type = &A
RFC Function CallNon-Crit.AUKSuccessful RFC Call &C (Function Group = &A)
RFC Function CallNon-Crit.CUVSuccessful WS Call (service = &A, operation &B)
RFC Function CallNon-Crit.DU6Validation for &A successful
RFC Function CallNon-Crit.DU8FTP connection request for server &A successful
RFC Function CallNon-Crit.DUIRFC-Callback executed (Destination &A, Called &B, Callback &C)
RFC Function CallNon-Crit.DURJSON RFC call of function module &A succeeded
RFC Function CallNon-Crit.DUSJSON RFC call of function module &A failed
RFC Function CallImportantDU1FTP server whitelist is empty
RFC Function CallImportantDU2FTP server whitelist is non-secure due to use of placeholders
RFC Function CallImportantDUJRFC-Callback executed (Destination &A, Called&B, Callback &C)
RFC Function CallCriticalAULFailed RFC Call &C (Function Group = &A)
RFC Function CallCriticalCUWFailed Web service call (service = &A, operation = &B, reason = &C)
RFC Function CallCriticalCUZGeneric table access by RFC to &A with activity &B
RFC Function CallCriticalDU3Server &A is not contained in the whitelist
RFC Function CallCriticalDU4Connection to server &A failed
RFC Function CallCriticalDU5There is no logical file name for path &A
RFC Function CallCriticalDU7Validation for &A failed
RFC Function CallCriticalDUKRFC-Callback executed (Destination &A, Called&B, Callback &C)
RFC Function CallCriticalDUTCritical JSON RPC call of function module &A (S_RFC * authorization)
Transaction StartNon-Crit.AU3Transaction &A Started
Transaction StartImportantAUPTransaction &A Locked
Transaction StartImportantAUQTransaction &A Unlocked
Transaction StartCriticalAU4Start of transaction &A failed (Reason=&B)
Report StartNon-Crit.AUWReport &A Started
Report StartImportantAUXStart Report &A Failed (Reason = &B)
User Master ChangeNon-Crit.BU2Password changed for user &B in client &A
User Master ChangeImportantAU8User &A Deleted
User Master ChangeImportantAU9User &A Locked
User Master ChangeImportantAUAUser &A Unlocked
User Master ChangeImportantAUBAuthorizations for User &A Changed
User Master ChangeImportantAUDUser Master Record &A Changed
User Master ChangeImportantAUR&A &B Created
User Master ChangeImportantAUS&A &B Deleted
User Master ChangeImportantAUT&A &B Changed
User Master ChangeCriticalAU7User &A Created
User Master ChangeCriticalAUU&A &B Activated
SystemCriticalAUEAudit Configuration Changed
SystemCriticalAUFAudit: Slot &A: Class &B, Severity &C, User &D, Client &E, &F
SystemCriticalAUGApplication Server Started
SystemCriticalAUHApplication Server Stopped
SystemCriticalAUIAudit: Slot &A Inactive
SystemCriticalAUJAudit: Active Status Set to &1
Other EventsNon-Crit.AU0Audit - Test. Text: &A
Other EventsNon-Crit.BUFHTTP Security Session Management was activated for client &A.
Other EventsNon-Crit.CUUPayload of PI/WS message &A was read &B
Other EventsNon-Crit.DULCheck &A against whitelist &B passed
Other EventsNon-Crit.DUOAuthority check against object &A in scenario &B passed
Other EventsNon-Crit.DUPAuthority check against object &A in scenario &B failed
Other EventsImportantAUYDownload &A Bytes to File &C
Other EventsImportantAUZDigital Signature (Reason = &A, ID = &B)
Other EventsImportantBU5ICF recorder entry executed for user &A (Activity: &B)
Other EventsImportantBU6ICF Recorder entry executed by user &A (&B,&C) (activity: &D).
Other EventsImportantBU7Administration setting was changed for ICF Recorder (Activity: &A)
Other EventsImportantBU9Virus Scan Interface: Error ""&C"" occurred in profile &A (step &B)
Other EventsImportantBUAWS: Signature check error (reason &B, WP &C). Refer to Web service log &A.
Other EventsImportantBUBWS: Signature insufficient (WP &C). Refer to Web service log &A.
Other EventsImportantBUCWS: Time stamp is invalid. Refer to Web service log &A.
Other EventsImportantBUHHTTP Security Session of user &A (client &B) was hard exited
Other EventsImportantCUQLogical file name &A not configured. Physical file name &B not checked.
Other EventsImportantCURPhysical file name &B does not fulfill requirements from logical file name &A
Other EventsImportantCUSLogical file name &B is not a valid alias for logical file name &A
Other EventsImportantCUTValidation for logical file name &A is not active
Other EventsImportantDUMCheck &A against whitelist &B failed
Other EventsCriticalAUVDigital Signature Error (Reason = &A, ID = &B)
Other EventsCriticalBU0RAL Configuration Access: Action: &A, Type: &B, Name &C
Other EventsCriticalBU1Password check failed for user &B in client &A
Other EventsCriticalBU3not used: Change Security Check During Export: Old Value &A, New Value &B
Other EventsCriticalBU4

not used: Transport Request &A Contains Security-Critical Source Objects

new: Dynamic ABAP Coding: Event &A Event Type: &B Checksum: &C"

Other EventsCriticalBU8Virus Scan Interface: Virus ""&C"" found by profile &A (step &B)
Other EventsCriticalBUGHTTP Security Session Management was deactivated for client &A.
Other EventsCriticalBUJUnencrypetd &A-Communication (&B)
Other EventsCriticalBUS&A: Request without sufficient security characteristic of address &B.
Other EventsCriticalBUYField contents changed: &5&9&9&9&9&9
Other EventsCriticalBUZ> in program &A, line &B, event &C
Other EventsCriticalCU0RAL Log Access: Action: &A
Other EventsCriticalCUKC debugging activated
Other EventsCriticalCULField content changed: &A
Other EventsCritical***Jump to ABAP Debugger: &A
Other EventsCriticalCUNA manually caught process was stopped from within the Debugger (&A)
Other EventsCriticalCUOExplicit database commit or rollback from debugger &A
Other EventsCriticalCUPNon-exclusive debugging session started
Other EventsCriticalCUY> &A
Other EventsCriticalDUNActive whitelist &A was changed ( &B )
Other EventsCriticalDUQActive scenario &A was changed ( &B )

 

File format

Use report RSAU_SELECT_EVENTSto analyze the file format.

 

The audit files have a structured but variable record layout in unicode text format.

 

The administrative information is fixed, however, there exist 2 record formats depending on the existence of the additional field SLGLTRM2.

The data part, field SLGDATA, containing 64 characters has a variable sub-structure containing several parameter values. Often these values are separated by '&' matching to the message variables &A, &B, etc. of the message definition. If you don't find an '&' than you will have fixed length parameter values matching to the message variables &n (n is a number describing the count of characters) within the message definition.

 

Relevant DDIC structures:

RSLGENTR SysLog entry

RSAUENTR2 Security Audit Log Entry Version 2 with Long Terminal Names

 

Example of an entry in a .aud file:

 

2AU520130409010803000505200009D9a234ba.pDOKUSTAR                        SAPMSSY1                              0201R&0                                                             h020co.pt.com     


This leads to the following file format:

 

FieldSub-fieldLengthDescription
SLGTYPESysLog: LIKE structure RSLGETYP
SLGFTYP1Entry type
AREA2Message area
SUBID1Message name
SLGDATTIMTime stamp (CHAR 16)
DATE8Date in format YYYYMMDD
TIME6Time in format hhmmss
DUMMY2not used
SLGPROCSysLog: LIKE RSLGPID structure
UNIXPID5Process ID
TASKTNO5Task
SLGTTYP2Process type (short form)
SLGLTRM8Terminal name (truncated)
SLGUSER12User name
SLGTC20Transaction
SLGREPNA40Program
SLGMAND3Client
SLGMODE1External mode of an SAP dialog
SLGDATA64Variable message data
SLGLTRM220Terminal name (continued)

 

You see,

  • the format of the variable message data
  • the message class (logon, transaction start, report start, RFC logon, user master record change, RFC start, miscellaneous, and system)
  • the severity (critical, important, non-critical)
  • and the monitoring alert settings (with, without)

are not visible within the file, but only in the message definition (the key fields are AREA and SUBID).

 

Terminal ID versus IP Address

The Security Audit Log normally logs the terminal id if it's available; otherwise the IP address is logged. You can set the (undocumented) profile parameter rsau/ip_only to the value 1 to log the IP address instead (if available). See note 1497445 for details.

 

Use the following options to get the terminal id and the IP address of active users:

 

  • Transaction SM04 shows the IP address of the GUI client as well if you change the layout. (Limited to currently active users.)
  • Table USR41 containing the last logon date shows both terminal id and the IP address in field TERMINAL. Maybe it's possible to activate table logging using SE13 to get the history, too. Than you could merge this data with the log entries.
  • Maybe you can try to use user exit SUSR0001 to log IP address (from function TH_USER_INFO and/or table USR41) in a custom table or via creating additional Security Audit Log entries for message AU1 (sucessful logon) for which you e.g. set the parameter &A or a new parameter &B with the IP address. See function RSAU_WRITE_TRAC_AUDIT_LOG to understand how to create such entries. (Limited to dialog logon only.)

 

There exist strong limitations of logging terminal ID and IP address in ABAP. A malicious user could spoof the terminal ID easily. The IP address can be problematic, too. For example if a reverse proxy (e.g. web dispatcher) for HTTP access is used, then all users will have the same IP address.

 

(German) Data Protection

Would the German Data protection authorities have an issue with activating this level of logging?

 

From a general point of view I would start with following assumptions:

 

1. Filter: Activate everything which is critical for all users '*' in all clients  '*'.

➙ mostly ok, details should be confirmed

 

2. Filter: Activate everything for users 'SAP*' in all clients '*'

➙ ok

 

3. Filter: Activate everything for other support and emergency users, e.g. 'FF*' (FireFighter) in all clients '*'

➙ ok (assuming that you already have agreed on using GRC Super User Management)

 

4. Filter: Activate all events for the dialog activities 'logon' and 'transaction' for user 'DDIC' in all clients.

➙ ok

 

5. Filter: Activate everything for client '066'. This client is not used anymore and can be deleted.

➙ ok

 

6. Filter: Activate RFC events (AUL, AUK, AU6, AU5) for a short time for selected users to identity RFC connection problems easily

➙ you have to confirm this

 

7.-10. Filter: free for other project specific purpose

➙ you have to confirm this

 

Keep in mind that you have to discuss (among others) log creation, consolidation, archiving as well as retention periods and deletion.

 

Example from a German project (2010/2011) which was cleared through German, Austrian, French & Belgian data controllers:

 

Logging everything was OK as there is are legitimate reasons for it.  The following additional controls were required:

 

  • Access to logs limited to Basis & Security team
  • Acceptable use (of logs) policy circulated to everyone with access
  • Data had to be summarized before use (e.g. could not be easily attributable to an individual.  Obviously difficult to achieve if someone is in a team of 1...)
  • Distribution of data outside security team had to be approved by local data controller (local to the people who's data it was).
  • Detailed records existing outside the system had to be deleted after the summation work had been completed

 

Exceptions to these included:

  • legitimate use of data in event of security breach (agreed by local counsel and data controllers)
  • use of data with written approval of user (we used this a lot when redesigning access based on patterns of 'model' users).

 

I just found an additional recommendation about the protection of the files in a recent note:

In general, files of the Security Audit Log must not be accessed by other ABAP programs than the Security Audit Log application itself. Protect the files by assigning the appropriate S_DATASET authorizations to your users and by using S_PATH protection as described in note 177702. For this purpose, use an own dedicated folder for Security Audit Log files. Enter this directory into the SPTH table and enable the flags FS_NOWRITE and FS_NOREAD, thus disabling any read or write access from ABAP to this directory. Configure the Security Audit Log (parameter DIR_AUDIT) to use this directory.

 

GRC Fire Fighter logging

The application GRC Access Control Super User Management (aka FireFighter) consolidates logs from various sources:

  • Transaction Log: Captures transaction execution from transaction STAD
  • Change Log: Captures change log from change document objects (tables CDPOS and CDHDR)
  • System Log: Captures Debug & Replace information from transaction SM21
  • Security Audit Log: Captures Security Audit Log from transaction SM20
  • OS Command Log: Captures changes to OS commands from transaction SM49

Because of this we recommend to define a filter in the Security Audit Log which records all events for fire fighter users.

 

Performance

Q: Is there a significant performance impact (or any impact at all) if we enable the security audit log with the recommended settings? We've had resistance from some clients as they were worried that it will impact on the end user experience / slow down the system.

 

Unfortunately the FAQ note 539404 does not talk much about performance.

Well, the general rule is simple: There is no performance impact, not in time nor in space, if you log unsuccessful (=critical) events as these events happens rarely.

As soon as you start logging successful events you might look to space - the growing size of the audit files - but still not to time, as the Security Audit Log is optimized for speed.

 

How to create customer-specific events

Using notes 1941526 and 1941568 you can utilize the custom messages DUX, DUY and DUZ in SAP_BASIS release as of 7.30. Call function RSAU_WRITE_CUSTOMER_EVTS to create these messages.

 

You can "reuse" other codes, i.e. CUY if you ensure that you still will be able to distinguish the messages. Nevertheless, you should interpret it as a (logical) modification of the SAP Standard.

 

in addition there exist other options to log custom specific events:

- Application Log in ABAP

- CCMS Alerts

- Alerts send to the SAP Solution Manager

 

How to read the long texts of events

You can view the long text of Security Audit Log event messages using transaction SE92 (or in transaction SE61 if you choose the document class SL (Syslog).

Using note 1970644 you can get report RSAU_INFO_SYAG which shows all events of the Security Audit Log including the current status of activation. The detail view allows you to create an HTML-based event definition print list including the full documentation.

 

How to log critical debugger events

Using the debugger in general might already be seen as critical but using debug-replace is considered as very critical by all auditors. The corresponding Security Audit Log messages for changing field content and for jumping within the code

  • Other Events, Critical, CUL Field content changed: &A
  • Other Events, Critical, CU_M Jump to ABAP Debugger: &A

are already covered by the 1st filter "Activate everything which is critical for all users in all clients" as proposed above.

These both messages are extended by another message to add more details describing the event:

  • Other Events, Critical, BUZ> in program &A, line &B, event &C

 

The messages CUK, CUN, CUO, and CUP are related to the debugger as well.

 

How to track changes on the settings

Dynamic settings

The effective (dynamic) settings get logged in the Security Audit Log itself.

If you create - as recommended - a filter for "all clients, all users, all audit classes with severity 'critical'" than you already get the corresponding events of audit class "System":

 

System

Critical

AU

E

Audit Configuration Changed

System

Critical

AU

F

Audit: Slot &A: Class &B, Severity &C, User &D, Client &E, &F

System

Critical

AU

G

Application Server Started

System

Critical

AU

H

Application Server Stopped

System

Critical

AU

I

Audit: Slot &A Inactive

System

Critical

AU

J

Audit: Active Status Set to &1

 

Static settings

The static settings are stored in table RSAUPROF. The system create table logs for any changes which you can view, i.e using report RSTBHIST.

 

The name of the active profile which is used while starting an application server is stored in field CURRPROF of the entry with PROFNAME = $CURPROF.

 

You can transport static profiles using a workbench transport which get transport entries for R3TR TABU RSAUPROF with table key PROFNAME=<profile name> SLOTNO=*. (You can transport the entry for $CURPROF as well, but I recommend to choose the active profile in the target system manually.)

 

The filters are stored in the entries having field SLOTNO> 0.

 

Field STATUS shows if a filter is active.

 

Field CLASSES shows the active audit classes. This is a bit-field summing up the values for the different audit classes (see include RSAUCONSTANTS):

CONSTANTS: RSAU_CLASS_OTHER(4)    TYPE x VALUE 1,
           RSAU_CLASS_LOGIN(4)    TYPE x VALUE 2,
           RSAU_CLASS_TASTART(4)  TYPE x VALUE 4,
           RSAU_CLASS_REPORT(4)   TYPE x VALUE 8,
           RSAU_CLASS_RFCLOGIN(4) TYPE x VALUE 16,
           RSAU_CLASS_USER(4)     TYPE x VALUE 32,
           rsau_class_system(4)   type x value 64,
           RSAU_CLASS_RFCCALL(4)  TYPE x VALUE 128.

 

The audit class "System" is implicitly active and is not added, therefore you get the value CLASSES = 191 = 128 + 32+16+8+4+2+1 if you activate all audit classes.

 

Field SEVERITY shows the severity (see include RSAUCONSTANTS):

CONSTANTS: RSAU_SEVE_LOW      TYPE I VALUE 2,
           RSAU_SEVE_MED      TYPE I VALUE 5,
           RSAU_SEVE_HIGH     TYPE I VALUE 9.

 

If you have selected the detail settings, then field SELVAR contains the constant 01 (and field CLASSES = 0 and SEVERITY = 0). Field MSGVECT defines active events. (In this case you can deactivate "System" events.)

 

Active events are identified using individual bits at specific positions within field MSGVECT. The position is calculated using the alphanumerical order 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ of the events according to the SUBID. The event area (AUBUCU) defines the bit which is added to the value on that position: AU = 80 (hex), BU = 40 (hex), CU = 20 (hex).

(Only the first 36 positions of field MSGVECT are used.)

Every position holds two bytes therefore you see two hexadecimal characters per position.

 

Example showing active system events only (AUEAUFAUGAUHAUIAUJ):

MSGVECT  000000000000000000000000000080808080808000000000000000000000000000000000...

Position  0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Position -1-2-3-4-5-6-7-8-9--11--13--15--17--19--21--23--25--27--29--31--33--35--...

 

Change Reporting in the SAP Solution Manager

In addition to the local table logs of table RSAUPROF you can use the applications Change Reporting and Configuration Validation in the SAP Solution Manager to analyse changed settings. Use the configuration store AUDIT_CONFIGURATION. Be aware that the extractor gets a snapshot of the dynamic settings daily. Changes between two executions of the extractor are not cached. The configuration store does not show the user account who triggered the change. Therefore I recommend to use Change Reporting or Configuration Validation as a trigger for deeper analysis of the local table logs.

 

see: Configuration Validation Home

http://wiki.scn.sap.com/wiki/display/TechOps/ConfVal_Home

Content of CCDB for a Technical System of type ABAP

http://wiki.scn.sap.com/wiki/display/TechOps/ConfVal_ABAP_Content#ConfVal_ABAP_Content-AUDIT_CONFIGURATION

 

What is the meaning of message BU4?

Question: I our productive environment am getting many times the message BU4 "Dynamic ABAP Coding: Event &A Event Type: &B Checksum: &C" but according to your post (and my old screen capture) the BU4 message should be for "Transport Request &A Contains Security-Critical Source Objects".

I searched but could not find anything about this issue...what do you recommend beside good luck :-)?

 

Answer: The definition of the message BU4in transaction SE92 might be still wrong depending on the release of the system. According to note 539404 recording the events to transport security-relevant objects (BU3, BU4) is not yet implemented.

The Kernel creates message BU4"Dynamic ABAP Coding: Event &A Event Type: &B Checksum: &C" to flag usage of

  • 'I' for INSERT REPORT
  • 'G' for GENERATE SUBROUTINE POOL
  • 'D' for DELETE REPORT

if setting in SM19 at 'Other entries' for 'Audit of generated dynamic ABAP' is active.

(In addition entries in the db tables DYNABAPHDR and DYNABAPSRC are written if profile parameter abap/dyn_abap_log is set to the value "on".)

 

How can I read events using BAPIs?

The security alerts are also available to external programs using BAPIs (Business Application Programming Interfaces). The report RSAU_READ_AUDITLOG_EXTERNAL is a sample SAP program that you can use as a template for accessing the security alerts using BAPIs.


Viewing all articles
Browse latest Browse all 2858

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>