Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Data Description

The RSUSR003 event is used in SAP to check the passwords of standard users in all clients.

Potential Use Cases

This event could be used for the following scenarios:

  • Do determine if the standard users still have their default passwords.

  • If the standard users have well-known passwords.

  • To determine if of the standard users is locked.

Splunk Event

The event will look like this in Splunk:

SAP Navigation

Navigate to this data by using the RSUSR003 t-code. THen enter the user selection parameters, and select the Execute button.

The data below will match the data that is sent to Splunk.

Field Mapping

The field mapping between the data from SAP and values in Splunk can be seen in the table below:

Field

Description

Unit of Measure

CURRENT_TIMESTAMP

The date time stamp when the information was collected

YYYYMMDDHHMMSS

EVENT_SUBTYPE

String

EVENT_TYPE

RSUSR003

String

LOCKED

Whether or not the user is locked

String

LOCKREASON

The reason why the user is locked

String

MANDT

Client

String

PWSTATUS

The user’s password status

String

UNSUCESSLOGINS

The number of unsuccessful logins for the user

Number (count)

USERNAME

User Name

String

UTCDIFF

The UTC OFFSSET in HHMMSS that the data was collected in

HHMMSS

UTCSIGN

The UTC positive or negative OFFSET indicator. Positive (+) means add UTCDIFF to find the time zone of the data, negative (-) means subtract the UTCDIFF to find the time zone adjusted date time the data was collected in.

+ | -

VALIDFRM

The date the user is valid from

YYYYMMDD

VALIDTO

The date the user is valid until

YYYYMMDD

  • No labels