Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
cancel
Showing results for 
Search instead for 
Did you mean: 
MichaelShea
Product and Topic Expert
Product and Topic Expert

Attack detection patterns are what powers the ability of SAP Enterprise Threat Detection to alert you to suspicious activity in your network. The patterns were created by our experts to uncover a variety of anomalous events. You have asked what patterns we deliver with our product. Here is an overview of the kinds of patterns you get with SAP Enterprise Threat Detection 1.0 SP01. Don't worry, there is more to come in our future releases.


CategoryDescription
ABAP and HANA AuthorizationThese patterns look for escalation of privileges. An escalation of privileges is when you can exploit a weakness to gain access to resources you should not have access to. These patterns also watch for the assignment of critical roles or profiles.
ABAP Blacklists and WhitelistsA number of patterns function on blacklists and whitelists. We deliver blacklists for function modules, reports, transactions, and URL paths expected not to be used in productive systems. Customers can enhance these blacklists according to their needs. The same applies to several patterns which come with whitelists, which lead to an alert being created in case a certain user is active or function module called but not part of the whitelist.
ABAP Calls to Productive SystemsYour productive system runs your business. We have patterns that watch for calls from non-productive systems to productive systems. The patterns, like those in other categories,  have configurations to eliminate false positives.
ABAP and HANA ConfigurationThe patterns for ABAP and HANA configuration make sure that no one is trying to disable security in the system by making configuration changes to the system. Such changes include deactivating logs or other security functions.
ABAP DebuggingThese patterns attempt to find developers behaving badly, for example, debugging in a productive system. The patterns can find an infiltrator exploring code in an ABAP system.
ABAP Denial of ServiceThere are a number of indicators we can watch to identify if someone is trying to block access to the ABAP server.
ABAP DownloadsIf a user downloads data too often or in too large a volume from an ABAP server, patterns raise alerts in SAP Enterprise Threat Detection.
ABAP Internet Communication FrameworkSAP Enterprise Threat Detection also uses patterns to monitor access to the Internet Communication Framework (ICF).
ABAP and HANA LogonToo many failed logon attempts might indicate someone trying to brute force their way into the system. Suspicious activity is also trying to log on with users, who otherwise should be locked, expired, or deleted. We also look for replay attacks or other attempted manipulation of our security session technology.
ABAP PasswordManipulation of passwords for critical users or by users not normally in an administrative role can warn of an intruder in your system.
HANA SQL FunctionsWe include patterns to detect suspicious calls to SQL functions on SAP HANA platform.
ABAP User MorphingWe also look for changes in users that indicate a manipulation of the user, such as the user type.

Want to know more?

1 Comment