Connect this data source on your own, using the Hunters platform.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
SAP Security Audit Logs | ✅ | ✅ | sap_security_audit_logs | CEF | S3 | ||
S/4HANA Security Audit Logs | ✅ | ✅ | sap_s4hana_security_audit_logs | NDJSON | API |
Overview
SAP is a global leader in enterprise software, known for its solutions that help businesses manage various operations such as finance, logistics, human resources, and supply chain management.
The company's flagship product, SAP S/4HANA, is an integrated enterprise resource planning (ERP) system that uses in-memory computing to process large volumes of data quickly. SAP's software is widely used across industries to improve efficiency, gain insights, and drive digital transformation.
Supported data types
SAP Security Audit Logs
Table name: sap_security_audit_logs
The security audit log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP system. By activating the audit log, you keep a record of those activities you consider relevant for auditing. You can then access this information for evaluation in the form of an audit analysis report.
The main objective of the audit log is to record the following:
Security-related changes to the SAP system environment (for example, changes to user master records).
Information that provides a higher level of transparency (for example, successful and unsuccessful logon attempts).
Information that enables the reconstruction of a series of events (for example, successful or unsuccessful transaction starts).
Send data to Hunters
Hunters supports the ingestion of SAP Security Audit logs via an intermediary AWS S3 bucket.
To connect SAP Security Audit logs:
Export your logs from SAP to an AWS S3 bucket.
Once the export is completed and the logs are collected to S3, follow the steps in this section.
Expected format
Logs are expected in CEF format.
MAI 21 02:20:27 example-server_AAS_04 CEF:1|Security|SAL|1.0|1|SAL|1|XMILOGMID=AAA SLGDATTIM=2024052102072200 MANDT=001 SYSID=AAS SLGINSTANCE=example-server_AAS_04 SLGTC= SLGREPNA=AAASSY1 SLGLTRM2=example-server.ads-aaaa SLGUSER=JaneDoh MESSAGE=Example message about accessing /example/path with activity 03 MSGV1=/SAAAPO/ASAS1 MSGV2=03 MSGV3= MSGV4=
S/4HANA Security Audit Logs
Table name: sap_s4hana_security_audit_logs
SAP S/4HANA Security Audit Logs are essential tools for tracking and monitoring system activities within the SAP environment, ensuring compliance and enhancing security. They capture detailed records of critical actions, such as user logins, changes to system configurations, and access to sensitive data, allowing administrators to detect suspicious activities or unauthorized access. These logs support audit readiness and help safeguard the integrity of business processes by providing real-time insights into potential security breaches or policy violations.
Send data to Hunters
Hunters supports the ingestion of SAP S/4HANA Security Audit logs via API connection.
💡Before you begin
Make sure you’ve created a Service Binding, under Service and Subscriptions in your SAP BTP Cockpit. Learn more here.
Step 1: Obtain the required information from SAP
After obtaining the .pfx
file and credentials from the server, you need to extract the private key and certificate for use in SAP S/4HANA. Ensure you have the openssl
package installed before proceeding.
Step 1: Extracting the Private Key
📘Note
In the commands below, the <password> should be surrounded with ' '
Example:
.....-nodes -passin pass:'1234'
openssl pkcs12 -in <pfx_file_path> -nocerts -out <local_key_path> -nodes -passin pass:'<password>'
Replace
<pfx_file_path>
with the path to your PFX file.Replace
<local_key_path>
with the desired path for the private key file.Replace
<password>
with the password for the PFX file.
Step 2: Extracting the Certificate
To extract the certificate from the PFX file, run the following command:
openssl pkcs12 -in <pfx_file_path> -nokeys -out <local_cert_path> -passin pass:'<password>'
Replace
<pfx_file_path>
with the path to your PFX file.Replace
<local_cert_path>
with the desired path for the certificate file.Replace
<password>
with the password for the PFX file.
Step 3: Using the Extracted Files
Copy all the content of the private key file and paste it in the SAP S/4HANA CLIENT PRIVATE KEY field.
Copy all the content of the certificate file and paste it in the SAP S/4HANA CLIENT CERTIFICATE field.
Step 2: Complete the process on the Hunters platform
Complete the process on the Hunters platform, following this guide.
Expected format
Logs are expected in JSON format.
{
"eventID": "AU1",
"log_tstmp": "2021-05-08T10:26:22.740611Z",
"slgmand": "100",
"sid": "ABC",
"counter": 0,
"terminal_name": "",
"user_fullname": "Example Administrator",
"slgtc": "S000",
"slgrepna": "RSBTCRTE",
"rsau_text": "Logon successful (type=B, method=A)",
"UserDescription": "Example Administrator"
},
{
"eventID": "AU1",
"log_tstmp": "2021-05-08T10:28:22.924215Z",
"slgmand": "100",
"sid": "ABC",
"counter": 0,
"terminal_name": "",
"user_fullname": "Example Administrator",
"slgtc": "S000",
"slgrepna": "RSBTCRTE",
"rsau_text": "Logon successful (type=B, method=A)",
"UserDescription": "Example Administrator"
},