Logs available in SAP S/4HANA can be used to improve security and compliance. For example:
Read Access Logs and Security Audit Logs
These logs provide lots of valuable information to the security professional. To use logs for security and compliance, you need to determine the following:
Please refer to the e-bite, “Logging for SAP S/4HANA Security” by SAP Press. The e-bite dives deeper into what data should be logged, how these logs should be accessed, and what to look for in the log.
For the latest updates