Security Audit Log
   The Design of the Security Audit Log
   Comparing the Security Audit Log and the System Log
   Maintaining Static Profiles
   Changing Filters Dynamically
   Defining Filters
   Displaying the Audit Analysis Report
   Reading the Audit Analysis Report
   Deleting Old Audit Files
   Security Alerts in the CCMS Alert Monitor
      Viewing Security Alerts
      Reading Security Alerts Using BAPIs
   The Audit Log Display Options
   Example Filters