Symptom
- For audit, troubleshooting, or compliance purposes, the security audit logs need to be collected from the SAP system.
- The logs must be accessed through transaction SMICM, and the steps to retrieve them are required.
"Image/data in this KBA is from SAP internal systems, sample data, or demo systems. Any resemblance to real data is purely coincidental."
Read more...
Environment
- SAP NetWeaver
Product
SAP NetWeaver all versions
Keywords
SMICM logs, audit logs , KBA , BC-SEC-SAL , Security Audit Log , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview