Show TOC

Logging security relevant eventsLocate this document in the navigation structure

Security relevant information is stored in the log file if log severity is set to 16 (Debug Information). You can use the log file to help identify any potential unauthorized access to the system. The following events are logged for example:
  • successful and unsuccessful logon attempts
  • start time and end time of a session
  • missing authorization for BW data or objects
  • type of Web Service URL to BusinessObjects Business Intelligence / BusinessObjects Enterprise
Note Access to person-related data is not logged in Analysis. You cannot track who accessed person-related data on the client. If required, we recommend using the relevant modelling tools in SAP NetWeaver BW instead.