Security relevant information is stored in the log
file if log severity is set to
16 (Debug
Information). You can use the log file to help identify any potential
unauthorized access to the system. The following events are logged for example:
- successful and unsuccessful logon attempts
- start time and end time of a session
- missing authorization for BW data or objects
- type of Web Service URL to BusinessObjects
Business Intelligence / BusinessObjects Enterprise
Note Access to person-related data is not logged in
Analysis. You cannot track who
accessed person-related data on the client. If required, we recommend using the
relevant modelling tools in SAP NetWeaver BW instead.