![SAP Security Audit Log Retention and Storage | SAP security | Enterprise threat detection for SAP | ETD | realtime SAP monitoring | ETM | SAP Splunk | SAP HP ArcSight SAP Security Audit Log Retention and Storage | SAP security | Enterprise threat detection for SAP | ETD | realtime SAP monitoring | ETM | SAP Splunk | SAP HP ArcSight](https://www.enterprise-threat-monitor.com/wp-content/uploads/SAP-Log-Archiving-and-Retention.png)
SAP Security Audit Log Retention and Storage | SAP security | Enterprise threat detection for SAP | ETD | realtime SAP monitoring | ETM | SAP Splunk | SAP HP ArcSight
![Analysis and Recommended Settings of the Security Audit Log (SM19 / RSAU_CONFIG, SM20 / RSAU_READ_LOG) | SAP Blogs Analysis and Recommended Settings of the Security Audit Log (SM19 / RSAU_CONFIG, SM20 / RSAU_READ_LOG) | SAP Blogs](https://blogs.sap.com/wp-content/uploads/2014/12/SAL-RAL-2.png)
Analysis and Recommended Settings of the Security Audit Log (SM19 / RSAU_CONFIG, SM20 / RSAU_READ_LOG) | SAP Blogs
![SAP Security Audit Logs: Which event types should I enable? There are 90 of them! And how much disk space do I need? | SAP Blogs SAP Security Audit Logs: Which event types should I enable? There are 90 of them! And how much disk space do I need? | SAP Blogs](https://blogs.sap.com/wp-content/uploads/2016/05/enterprise_threat_monitor___sap_security_audit_log_configuration__952328.png)