Use logs to secure your SAP S/4HANA system!

Logging for SAP S/4HANA Security

written by
$29.99

Available

E-Bite
107 pages, E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2308-4
Logs are useful for more than just record-keeping. Learn how to analyze, use, and manage logs to improve your SAP S/4HANA security with this E-Bite! Start by accessing your logs, whether you’re running SAP S/4HANA on-premise or in the cloud. Then configure key tools like UI data protection logging and SAP Enterprise Threat Detection to use your logs for security. Protect your logs against threats with tips and best practices!
  • Work with system logs in SAP S/4HANA, on-premise and in the cloud
  • Secure SAP S/4HANA with tools like UI data protection logging
  • Manage, protect, and maintain logs
Contents

Your web browser does not support this website feature!

Your browser is outdated and is not compatible with the latest online technologies.
Here are instructions on how to upgrade to a modern web browser.

Sandip Dholakia works as a principal security architect at SAP in the Global Security Group. He’s an information security professional with experience in various security domains and industries, from manufacturing to high-tech.

more >

You may also like:

  • Cover of Authorizations in SAP S/4HANA and SAP Fiori

    Authorizations in SAP S/4HANA and SAP Fiori

    Alessandro Banzer, Alexander Sambill

    625 pages, hardcover

    Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the main transactions you’ll use for configuration. Then learn to create roles with Transaction More about the book

    from $84.99

    Available

    E-book | Print edition | Bundle
  • Cover of Implementing SAP Fiori 3 Security

    Implementing SAP Fiori 3 Security

    Neha Gulati, Shreya Gulati

    104 pages

    Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods More about the book

    $29.99

    Available

    E-Bite
  • Cover of Security and Authorizations for SAP Business Technology Platform

    Security and Authorizations for SAP Business Technology Platform

    Martin Koch, Siegfried Zeilinger

    355 pages, hardcover

    Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to More about the book

    from $84.99

    Available

    E-book | Print edition | Bundle