{"id":1264,"date":"2020-06-18T13:49:02","date_gmt":"2020-06-18T11:49:02","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1264"},"modified":"2020-07-28T13:10:49","modified_gmt":"2020-07-28T11:10:49","slug":"monitoring-transactions-in-sap-systems","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/","title":{"rendered":"The importance of reliably monitoring transactions in SAP systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1265 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg\" alt=\"SAST Blog: The importance of reliably monitoring transactions in SAP systems\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar.jpg 437w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>SAP systems contain numerous transactions that enable applications to be accessed quickly. However, transactions can also be used to access sensitive business processes and confidential information. This is why events relevant to security have to be filtered out of a sea of data and placed in the proper context. This means that in order to evaluate and analyze conspicuous events, intelligent management is required.<strong>\u00a0<\/strong><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Calling transactions in SAP systems \u2013 critical or not?<\/strong><\/h2>\n<p>SAP systems contain numerous transactions that are used to activate SAP applications quickly in a single step. However, security-relevant areas can also often be accessed via transactions. This is why employees who are responsible for securing SAP systems have to ask themselves the following questions: Is even the mere calling of a transaction critical? Or does it only become relevant to security if a specific action is executed within the functions called?<\/p>\n<p>Keeping a constant eye on your transactions and applications is therefore essential for the protection of your SAP ERP and S\/4HANA environment.<\/p>\n<h2><strong>Reduce your effort with tool-assisted monitoring.<\/strong><\/h2>\n<p>A clear advantage of tool-assisted monitoring, such as the <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Security Radar<\/a> of the SAST SUITE, is that it comes with a comprehensive catalog of predefined critical actions (events in the SAP systems). Our SAST SUITE analyses this data for special features. You have the possibility of defining events individually via filter as well as when they should be triggered. This makes it easier for you to monitor critical actions in programs and functions reliably, because while a source is still reading data from the SAP system, it is analyzed and examined for special features.<\/p>\n<p>When using critical actions in transactions, the DIALOG_TRANSACTION event is displayed, for example, whenever OK codes\/buttons are triggered from the filter settings. This is also the case when the \u201cRZ10\u201d transaction is used. As a rule, every SAP Basis employee is authorized for this, since the call is often only used to view a specific parameter value of the configuration. As long as no change is made there, such behavior is therefore absolutely uncritical. However, you should take a closer look and be alerted if parameters are changed as well as saved. In order to ensure that only such calls are displayed, the function code is required.<\/p>\n<h2><strong>Successfully monitor your transactions with the SAST Security Radar in just two steps.<\/strong><\/h2>\n<p>In order to get a function code, first select the corresponding transaction. The example used here is RZ10. Using the menu, a double-click opens the \u201cUser interface status\u201d field. This view shows the corresponding function code for each button:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1266\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik1.jpg\" alt=\"SAST Blog: The importance of reliably monitoring transactions in SAP systems\" width=\"894\" height=\"564\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik1.jpg 894w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik1-300x189.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik1-768x485.jpg 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><br \/>\nFigure: User interface status of transaction RZ10<\/p>\n<p>Before you subsequently enter a transaction with the determined function code, first list all critical event calls with the possible function codes. You can then store the corresponding function code in change mode:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1267\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik2.jpg\" alt=\"SAST Blog: The importance of reliably monitoring transactions in SAP systems\" width=\"894\" height=\"593\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik2.jpg 894w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik2-300x199.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Funktionscode_Grafik2-768x509.jpg 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><br \/>\nFigure: Definition of a DIALOG_TRANSACTION event for RZ10<\/p>\n<p>This simple method enables the SAST Security Radar to reliably monitor critical transactions as well as execute critical actions in programs and functions.<\/p>\n<p>Moreover, by integration with a comprehensive SIEM (Security Information and Events Monitoring) or SOAR (Security Orchestration, Automation and Response) tool, you can also consolidate all security-related event of your SAP ERP and S\/4HANA systems with other relevant IT systems. The display of your security status will then be just a mouse-click away.<\/p>\n<p>Would you also like to reliably analyze transaction activities, thereby protecting your SAP systems from attacks? Then please visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> and feel free to <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1268\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Viktor.jpg\" alt=\"Viktor Vogt (SAST SOLUTIONS)\" width=\"257\" height=\"257\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Viktor.jpg 257w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Viktor-150x150.jpg 150w\" sizes=\"auto, (max-width: 257px) 100vw, 257px\" \/><br \/>\n<strong>Viktor Vogt (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>This might interest you too:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/01\/07\/sap-systems-insider-attacks\/\">Study shows SAP systems especially prone o insider attacks<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/\">SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP systems contain numerous transactions that enable applications to be accessed quickly. However, transactions can also be used to access sensitive business processes and confidential information. This is why events relevant to security have to be filtered out of a sea of data and placed in the proper context. This means that in order to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[156,80,170,114],"class_list":["post-1264","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-cyber-security","tag-sap-security","tag-security-monitoring","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Find out why it is important to monitor transactions in SAP systems.<\/title>\n<meta name=\"description\" content=\"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Find out why it is important to monitor transactions in SAP systems.\" \/>\n<meta property=\"og:description\" content=\"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T11:49:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-28T11:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"437\" \/>\n\t<meta property=\"og:image:height\" content=\"291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Find out why it is important to monitor transactions in SAP systems.\" \/>\n<meta name=\"twitter:description\" content=\"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"The importance of reliably monitoring transactions in SAP systems\",\"datePublished\":\"2020-06-18T11:49:02+00:00\",\"dateModified\":\"2020-07-28T11:10:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Radar-300x200.jpg\",\"keywords\":[\"Cyber Security\",\"SAP Security\",\"Security Monitoring\",\"Threat Detection\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/\",\"name\":\"Find out why it is important to monitor transactions in SAP systems.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Radar-300x200.jpg\",\"datePublished\":\"2020-06-18T11:49:02+00:00\",\"dateModified\":\"2020-07-28T11:10:49+00:00\",\"description\":\"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Radar-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Radar-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/18\\\/monitoring-transactions-in-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of reliably monitoring transactions in SAP systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Find out why it is important to monitor transactions in SAP systems.","description":"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"Find out why it is important to monitor transactions in SAP systems.","og_description":"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/","og_site_name":"SAST BLOG","article_published_time":"2020-06-18T11:49:02+00:00","article_modified_time":"2020-07-28T11:10:49+00:00","og_image":[{"width":437,"height":291,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Find out why it is important to monitor transactions in SAP systems.","twitter_description":"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Radar.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"The importance of reliably monitoring transactions in SAP systems","datePublished":"2020-06-18T11:49:02+00:00","dateModified":"2020-07-28T11:10:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/"},"wordCount":625,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg","keywords":["Cyber Security","SAP Security","Security Monitoring","Threat Detection"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/","name":"Find out why it is important to monitor transactions in SAP systems.","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg","datePublished":"2020-06-18T11:49:02+00:00","dateModified":"2020-07-28T11:10:49+00:00","description":"Tool-supported monitoring such as the SAST Security Radar makes it possible to successfully monitor critical transactions and correctly analyze events.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Radar-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"The importance of reliably monitoring transactions in SAP systems"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1264"}],"version-history":[{"count":8,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1264\/revisions"}],"predecessor-version":[{"id":1354,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1264\/revisions\/1354"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}