Logging for SAP S/4HANA Security
written by
Sandip Dholakia
107 pages, E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2308-4
ISBN 978-1-4932-2308-4
Logs are useful for more than just record-keeping. Learn how to analyze, use, and manage logs to improve your SAP S/4HANA security with this E-Bite! Start by accessing your logs, whether you’re running SAP S/4HANA on-premise or in the cloud. Then configure key tools like UI data protection logging and SAP Enterprise Threat Detection to use your logs for security. Protect your logs against threats with tips and best practices!
- Work with system logs in SAP S/4HANA, on-premise and in the cloud
- Secure SAP S/4HANA with tools like UI data protection logging
- Manage, protect, and maintain logs
Content Keywords:
SAP S/4HANA, logs, security, UI data protection, integration
‹
›
Your web browser does not support this website feature!
Your browser is outdated and is not compatible with the latest online technologies.
Here are instructions on
how to upgrade to a modern web browser.
You may also like:
-
Authorizations in SAP S/4HANA and SAP Fiori
625 pages, hardcover
Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the main transactions you’ll use for configuration. Then learn to create roles with Transaction … More about the bookfrom $84.99
Available
E-book | Print edition | Bundle -
Implementing SAP Fiori 3 Security
104 pages
Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods … More about the book$29.99
Available
E-Bite -
Security and Authorizations for SAP Business Technology Platform
355 pages, hardcover
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to … More about the bookfrom $84.99
Available
E-book | Print edition | Bundle