How to use RSAU_CONFIG - Configure Security Audit Log


SAP Transaction Code - Details

  • Transaction Code: RSAU_CONFIG

    Description: Configure Security Audit Log

    Release: S/4HANA and ECC 6

    Menu Path:

    • Tools > Administration > Monitor > Security Audit Log > Configuration
  • Show technical details Hide technical details
    • Program: RSAU_CONFIG_MAINT

      Screen: 1000

      Authorization Object:

    • Development Package: SECU

      Package Description:

      Parent Package:

    • Module/Component:

      Description:


Smart SAP Assistant

  • SAP Tcode: RSAU_CONFIG - Configure Security Audit Log
    ging
    
    Overview: 
    RSAU_CONFIG is a SAP transaction code used to configure security audit logging. It is used to enable or disable the logging of security-relevant activities in the system. This transaction code is part of the Security Audit Logging (SAL) feature, which is used to monitor and log user activities in the system. 
    
    Functionality: 
    RSAU_CONFIG allows users to configure the logging of security-relevant activities in the system. It enables users to enable or disable the logging of activities such as user logon/logoff, user authorization changes, and system configuration changes. The logging of these activities can be configured at a global level or at an individual user level. 
    
    Step-by-step How to Use: 
    1. Access the transaction code RSAU_CONFIG by entering it into the command field in the SAP GUI. 
    2. Select the “Global Settings” tab to configure global settings for security audit logging. 
    3. Select the “User Settings” tab to configure individual user settings for security audit logging. 
    4. Select the “Logging Settings” tab to configure specific settings for security audit logging, such as which activities should be logged and how long logs should be kept for. 
    5. Select the “Save” button to save your changes and activate security audit logging in the system. 
    
    Other Recommendations: 
    It is recommended that users regularly review their security audit logs to ensure that all security-relevant activities are being logged correctly and that no suspicious activity is taking place in the system. Additionally, users should ensure that their security audit logs are regularly backed up and stored in a secure location in case they need to be reviewed at a later date.
    • Do you have any question about this t-code?


      Upgrade now to chat with this t-code.

Related SAP Transaction Codes

Click the links below to see the following related SAP tcodes:

Rating
ERPlingo's SAP support assistant is amazing. Saves me countless hours trying to solve complex SAP issues myself. It's a real game changer!
Rate 1
Thomas Michael
SAP Consultant, Author & Speaker