SAP SE
SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION

Last updated:

Abstract:

A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

Status:
Application
Type:

Utility

Filling date:

20 Sep 2021

Issue date:

6 Jan 2022