trace a user

2

Click here to load reader

Upload: nikolinapusara

Post on 04-Jul-2015

134 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Trace a user

Trace a User’s Activity

Creating a User Audit Profile

1. Log on to any client in the appropriate SAP system.

2. Go to transaction SM19.

3. From the top-most menu bar on the Security Audit: Administer AuditProfile screen, click Profile -> Create.

4. On the Create new profile popup, type in a new Profile name and clickthe green √ picture-icon.

5. On the Filter 1 tab of the Security Audit: Administer Audit Profilescreen, click the □ to the left of Filter active to place a √ in the box. In the Selection criteria section, select the Clients and User names tobe traced. In the Audit classes section, click “on” all the auditing functions you need for this profile. In the Events section, click the radio button to the left of the level of auditing you need. Once youhave entered all your trace information, click the Save picture-icon. You will receive an Audit profile saved in the status bar at the bottomof the screen.

6. Please note that while the user trace profile has been saved, it is notyet active. To activate the user trace, see the next section Activatinga User Audit Profile.

7. You may now leave the SM19 transaction.

Activating a User Audit Profile

1. Log on to any client in the appropriate SAP system.

2. Go to transaction SM19.

1

Page 2: Trace a user

3. On the Security Audit: Administer Audit Profile screen, select the auditprofile to be activated from the Profile dropdown. Click the lit match picture-icon to activate it. You will receive an Audit profile activated for next system start in the status bar at the bottom of the screen. The audit will not begin until after the SAP instance has been recycled.

4. You may now leave the SM19 transaction.

Viewing the Audit Analysis Report

1. Log on to any client in the appropriate SAP system.

2. Go to transaction SM20.

3. In the Selection, Audit classes, and Events to select sections of the Security Audit Log: Local Analysis screen, provide your information to filter the audit information. If you need to trace the activities of a specific user, be sure to include that user’s ID. Click the Re-read audit log button.

4. The resulting list is displayed. This list can be printed using the usualmethods.

5. You may now leave the SM20 transaction.

List Of SAP BASIS Tutorials

2