Security Audit Log
The Design of the Security Audit Log
Comparing the Security Audit Log and the System Log
Maintaining Static Profiles
Changing Filters Dynamically
Defining Filters
Displaying the Audit Analysis Report
Reading the Audit Analysis Report
Deleting Old Audit Files
Security Alerts in the CCMS Alert Monitor
Viewing Security Alerts
Reading Security Alerts Using BAPIs
The Audit Log Display Options
Example Filters