Hello!!!
We are asked to generate a report/collect data on users
concurrently accessed to the system and what operations
they performed with their concurrent access. Apart from
they want info on the duration of thier concurrent/normal
session (date, time etc).
Can anyone help us to know any particular transactions (as
of our knowledge STAT & STAD can render certain segment of
data), reports available with SAP to collect the above
requested info.
Answer Posted / hasnul_amrie
SAP offer STAT and STAD (STAT no longer available in ECC6).
The problem with this is if there is lots of activities, the
oldest data will be deleted automatically. Basically All WP
share the same buffer, where records are stored in the
buffer based on time occurs. When the buffer full it will
write to a file in the file system. Each app server has
their own files. The number of max files can be created
control by profile parameter stat/max_files. So if system is
heavy, by 2-3 days the oldest files will be deleted.
One of the way is to create customize table where all these
entries will be kept. But you have to maintain the table
growth cause the databse might be burden with this actvt
which is why SAP did not do it in the first place ):
Another way we can look at it is by activating your Security
audit log (sm19/sm20). Again you cannot open it too long
cause it might slow down your database.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Can you explain secure store and forward?
Which transaction code is used to display the user buffer?
What is the use of tmssup* rfc destinations?
User is not there in User master record. Then how to trace the user?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is Sap security t-codes?
What is the difference between authorization object and authorization object class?
when performing client copies what steps you need to take from CUA point of view?
Differentiate between usobx_c and usobt_c
Can you explain transport system-level security?
How to run the daily background job s for virsa violations ? thabks in advance
how we do CUA configuration in Quality system
Can you explain document transfer-level security?
what is authorization object and authorization object class?