Skip to Content
Personal Insights
Author's profile photo Xavier DUPEYRAT

Run SAP best practices #6

Monitoring for Security Policy and Compliance Rules




Security monitoring is the automated process of collecting and analyzing indicators of potential security threats. SAP Solution Manager executes configuration validation reports to compare the current configuration of one or more systems with a reference system.

The reference system can be either a real, existing system or a virtual target system containing user-defined configuration criteria.


Tools Demo
Configuration validation delivers  4 areas of Predefined configuration elements for security:

  • User Authentication: Maintain account and identity management. (Standard Users with default password, Insufficient password policy, …)
  • Authorizations: Check who is allowed to do what. (Users with full authorizations for S_RFC, Users with SAP_ALL, …)
  • System Security: Code security, RFC, network and interfaces. (Missing security Notes, Trusted RFC, ..)
  • Auditing and Logging :Security audit log is properly activated.

Configuration Validation



Go to next chapter

Assigned Tags

      Be the first to leave a comment
      You must be Logged on to comment or reply to a post.