Skip to content

Commit 5b92b15

Browse files
authored
Merge pull request #121424 from oferInbar/patch-1
Update configure-audit.md to select all audit events
2 parents 3dbb6b1 + 747c340 commit 5b92b15

File tree

1 file changed

+2
-59
lines changed

1 file changed

+2
-59
lines changed

articles/sentinel/sap/configure-audit.md

Lines changed: 2 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -90,72 +90,15 @@ Track your SAP solution deployment journey through this series of articles:
9090

9191
1. Under **Event Selection**, choose **Classic event selection** and select all the event types in the list.
9292

93-
Alternatively, choose **Detail event selection**, review the list of message IDs listed in the [Recommended audit categories](#recommended-audit-categories) section of this article, and configure them in **Detail event selection**.
94-
9593
1. Select **Save**.
9694

9795
![Screenshot showing Static profile settings.](./media/configure-audit/create-profile-settings.png)
9896

9997
1. You'll see that the **Static Configuration** section displays the newly created profile. Right-click the profile and select **Activate**.
10098

10199
1. In the confirmation window select **Yes** to activate the newly created profile.
102-
103-
### Recommended audit categories
104-
105-
The following table lists Message IDs used by the Microsoft Sentinel solution for SAP® applications. In order for analytics rules to detect events properly, we strongly recommend configuring an audit policy that includes the message IDs listed below as a minimum.
106-
107-
| Message ID | Message text | Category name | Event Weighting | Class Used in Rules |
108-
| - | - | - | - | - |
109-
| AU1 | Logon successful (type=&A, method=&C) | Logon | Severe | Used |
110-
| AU2 | Logon failed (reason=&B, type=&A, method=&C) | Logon | Critical | Used |
111-
| AU3 | Transaction &A started. | Transaction Start | Non-Critical | Used |
112-
| AU5 | RFC/CPIC logon successful (type=&A, method=&C) | RFC Login | Non-Critical | Used |
113-
| AU6 | RFC/CPIC logon failed, reason=&B, type=&A, method=&C | RFC Login | Critical | Used |
114-
| AU7 | User &A created. | User Master Record Change | Critical | Used |
115-
| AU8 | User &A deleted. | User Master Record Change | Severe | Used |
116-
| AU9 | User &A locked. | User Master Record Change | Severe | Used |
117-
| AUA | User &A unlocked. | User Master Record Change | Severe | Used |
118-
| AUB | Authorizations for user &A changed. | User Master Record Change | Severe | Used |
119-
| AUD | User master record &A changed. | User Master Record Change | Severe | Used |
120-
| AUE | Audit configuration changed | System | Critical | Used |
121-
| AUF | Audit: Slot &A: Class &B, Severity &C, User &D, Client &E, &F | System | Critical | Used |
122-
| AUG | Application server started | System | Critical | Used |
123-
| AUI | Audit: Slot &A Inactive | System | Critical | Used |
124-
| AUJ | Audit: Active status set to &1 | System | Critical with Monitor Alert | Used |
125-
| AUK | Successful RFC call &C (function group = &A) | RFC Start | Non-Critical | Used |
126-
| AUM | User &B locked in client &A after errors in password checks | Logon | Critical with Monitor Alert | Used |
127-
| AUO | Logon failed (reason = &B, type = &A) | Logon | Severe | Used |
128-
| AUP | Transaction &A locked | Transaction Start | Severe | Used |
129-
| AUQ | Transaction &A unlocked | Transaction Start | Severe | Used |
130-
| AUR | &A &B created | User Master Record Change | Severe | Used |
131-
| AUT | &A &B changed | User Master Record Change | Severe | Used |
132-
| AUW | Report &A started | Report Start | Non-Critical | Used |
133-
| AUY | Download &A Bytes to File &C | Other | Severe | Used |
134-
| BU1 | Password check failed for user &B in client &A | Other | Critical with Monitor Alert | Used |
135-
| BU2 | Password changed for user &B in client &A | User Master Record Change | Non-Critical | Used |
136-
| BU4 | Dynamic ABAP code: Event &A, event type &B, check total &C | Other | Non-Critical | Used |
137-
| BUG | HTTP Security Session Management was deactivated for client &A. | Other | Critical with Monitor Alert | Used |
138-
| BUI | SPNego replay attack detected (UPN=&A) | Logon | Critical | Used |
139-
| BUV | Invalid hash value &A. The context contains &B. | User Master Record Change | Critical | Used |
140-
| BUW | A refresh token issued to client &A was used by client &B. | User Master Record Change | Critical | Used |
141-
| CUK | C debugging activated | Other | Critical | Used |
142-
| CUL | Field content in debugger changed by user &A: &B (&C) | Other | Critical | Used |
143-
| CUM | Jump to ABAP Debugger by user &A: &B (&C) | Other | Critical | Used |
144-
| CUN | A process was stopped from the debugger by user &A (&C) | Other | Critical | Used |
145-
| CUO | Explicit database operation in debugger by user &A: &B (&C) | Other | Critical | Used |
146-
| CUP | Non-exclusive debugging session started by user &A (&C) | Other | Critical | Used |
147-
| CUS | Logical file name &B is not a valid alias for logical file name &A | Other | Severe | Used |
148-
| CUZ | Generic table access by RFC to &A with activity &B | RFC Start | Critical | Used |
149-
| DU1 | FTP server allowlist is empty | RFC Start | Severe | Used |
150-
| DU2 | FTP server allowlist is non-secure due to use of placeholders | RFC Start | Severe | Used |
151-
| DU8 | FTP connection request for server &A successful | RFC Start | Non-Critical | Used |
152-
| DU9 | Generic table access call to &A with activity &B (auth. check: &C ) | Transaction Start | Non-Critical | Used |
153-
| DUH | OAuth 2.0: Token declared invalid (OAuth client=&A, user=&B, token type=&C) | User Master Record Change | Severe with Monitor Alert | Used |
154-
| EU1 | System change options changed ( &A to &B ) | System | Critical | Used |
155-
| EU2 | Client &A settings changed ( &B ) | System | Critical | Used |
156-
| EUF | Could not call RFC function module &A | RFC Start | Non-Critical | Used |
157-
| FU0 | Exclusive security audit log medium changed (new status &A) | System | Critical | Used |
158-
| FU1 | RFC function &B with dynamic destination &C was called in program &A | RFC Start | Non-Critical | Used |
100+
> [!NOTE]
101+
> Static configuration only takes effect after a system restart. For an immediate setup, create an additional dynamic filter with the same properties, by right clicking the newly created static profile and selecting "apply to dynamic configuration".
159102
160103
## Next steps
161104

0 commit comments

Comments
 (0)