πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901 aws-aif-c01
Guided AZ-120 Domain 4
Domain 4 β€” Module 5 of 7 71%
26 of 28 overall

AZ-120 Study Guide

Domain 1: Migrate SAP Workloads to Azure

  • SAP on Azure: The Big Picture Free
  • Assessing SAP Workloads for Migration Free
  • Migration Strategies: The Decision Framework Free
  • RISE with SAP on Azure Free
  • Migration Execution: DMO, Classical, and Beyond Free
  • HANA System Replication for Migration Free
  • Post-Migration: Validation, Health, and HLI Migration Free

Domain 2: Design and Implement an Infrastructure to Support SAP Workloads

  • SAP-Certified Virtual Machines on Azure
  • Storage Architecture for SAP on Azure
  • Networking for SAP on Azure
  • HANA Architecture on Azure
  • SAP Application Tier on Azure
  • Proximity Placement and Availability Options
  • Azure Center for SAP Solutions (ACSS)
  • SAP Deployment Automation Framework (SDAF)

Domain 3: Design and Implement High Availability and Disaster Recovery

  • High Availability Concepts for SAP
  • High Availability for ASCS/SCS
  • HANA System Replication for HA
  • Shared Storage and Load Balancer Deep Dive
  • Disaster Recovery Strategy for SAP
  • Disaster Recovery Implementation

Domain 4: Maintain SAP Workloads on Azure

  • Azure Monitor for SAP Solutions
  • Backup for SAP HANA
  • Backup for SAP Application Servers
  • Security and Encryption for SAP
  • Microsoft Sentinel for SAP
  • Cost Optimization for SAP on Azure
  • SAP Operations and Lifecycle Management

AZ-120 Study Guide

Domain 1: Migrate SAP Workloads to Azure

  • SAP on Azure: The Big Picture Free
  • Assessing SAP Workloads for Migration Free
  • Migration Strategies: The Decision Framework Free
  • RISE with SAP on Azure Free
  • Migration Execution: DMO, Classical, and Beyond Free
  • HANA System Replication for Migration Free
  • Post-Migration: Validation, Health, and HLI Migration Free

Domain 2: Design and Implement an Infrastructure to Support SAP Workloads

  • SAP-Certified Virtual Machines on Azure
  • Storage Architecture for SAP on Azure
  • Networking for SAP on Azure
  • HANA Architecture on Azure
  • SAP Application Tier on Azure
  • Proximity Placement and Availability Options
  • Azure Center for SAP Solutions (ACSS)
  • SAP Deployment Automation Framework (SDAF)

Domain 3: Design and Implement High Availability and Disaster Recovery

  • High Availability Concepts for SAP
  • High Availability for ASCS/SCS
  • HANA System Replication for HA
  • Shared Storage and Load Balancer Deep Dive
  • Disaster Recovery Strategy for SAP
  • Disaster Recovery Implementation

Domain 4: Maintain SAP Workloads on Azure

  • Azure Monitor for SAP Solutions
  • Backup for SAP HANA
  • Backup for SAP Application Servers
  • Security and Encryption for SAP
  • Microsoft Sentinel for SAP
  • Cost Optimization for SAP on Azure
  • SAP Operations and Lifecycle Management
Domain 4: Maintain SAP Workloads on Azure Premium ⏱ ~12 min read

Microsoft Sentinel for SAP

Deploy Microsoft Sentinel's SAP solution for threat detection including the SAP data connector with agent and RFC, detect privilege escalation, data exfiltration, RFC abuse, and audit log tampering with built-in analytics rules.

Why SAP needs its own SIEM

πŸ”§ Aisha pulls up security alerts. β€œStandard Azure security tools monitor infrastructure β€” failed logins, suspicious network traffic, malware. But they do not understand SAP. They cannot tell you when someone grants themselves SAP_ALL authorization, exports the entire customer table via RFC, or disables the SAP audit log. For that, we need Microsoft Sentinel with the SAP solution.”

Carlos raises an eyebrow. β€œSAP has its own security, does it not?”

πŸ”§ Aisha shakes her head. β€œSAP logs security events, but it does not correlate them, alert on patterns, or respond automatically. Someone could be slowly escalating privileges over weeks, and native SAP tools would not flag it unless a Basis admin manually reviews logs. Sentinel automates that detection.”

β˜• Simple explanation

Think of it like a security camera system for a building.

Standard Azure security is like having cameras at the building entrance β€” you see who comes and goes. But SAP is like a vault inside the building with its own access rules, combination locks, and inventory. Sentinel for SAP adds cameras and motion sensors inside the vault β€” it watches what people do with the sensitive items, not just whether they entered the building.

Microsoft Sentinel is Azure’s cloud-native SIEM (Security Information and Event Management). The SAP solution for Sentinel deploys a data connector that pulls SAP security logs (audit logs, change documents, RFC logs, security authorization logs) into Sentinel via an agent using RFC. Built-in analytics rules detect SAP-specific threats: unauthorized authorization changes, suspicious data downloads, RFC exploitation, audit log tampering, and user creation anomalies. This gives security teams visibility into SAP-layer threats that infrastructure monitoring cannot detect.

The SAP data connector

The Sentinel SAP data connector is the bridge between SAP and Sentinel. There are two approaches β€” the current recommended agentless method and the legacy agent-based method:

Recommended: Agentless data connector (GA)

  • Uses SAP Cloud Connector and SAP Integration Suite to forward SAP logs to Sentinel
  • No agent VM required β€” eliminates the infrastructure overhead of managing a collector VM
  • Logs are sent to the Sentinel Log Analytics workspace for analysis
  • This is the current recommended architecture for new deployments

Legacy: Containerized agent (deprecated β€” will be disabled September 14, 2026)

  • A containerized agent runs on a Linux VM and connects to SAP using RFC
  • The agent pulls SAP logs: security audit log, change documents, table access logs, RFC gateway logs
  • This approach still works but is deprecated and will stop functioning after September 2026
  • Existing deployments should plan migration to the agentless connector

Deployment requirements (agentless):

  • SAP Cloud Connector configured to expose SAP system logs
  • SAP Integration Suite for log forwarding
  • Log Analytics workspace with Sentinel enabled
  • The SAP solution installed from the Sentinel content hub
πŸ’‘ Exam tip: Know both connector approaches

The exam may reference the RFC-based containerized agent (legacy) or the newer agentless connector via SAP Cloud Connector. The agentless approach is the current recommendation. If you see a question about deploying the Sentinel SAP connector, the modern answer uses SAP Cloud Connector and SAP Integration Suite. The legacy agent-based approach using RFC from a container VM is deprecated and will be disabled September 14, 2026.

πŸ’‘ ⚠️ Recently changed β€” exam alert

The SAP data connector architecture changed significantly in 2025-2026. The original containerized agent approach (Linux VM running a Docker container with RFC connectivity) is now deprecated and will be permanently disabled on September 14, 2026. The current recommended approach is the agentless data connector using SAP Cloud Connector and SAP Integration Suite. Exam questions may test whether you know the current recommended deployment method β€” if you see β€˜deploy a containerized agent on a Linux VM’ as an answer choice, that is the legacy/deprecated approach.

SAP-specific threat types

SAP threat detection categories in Sentinel
Threat typeWhat it detectsExample scenarioRisk
Privilege escalationUnauthorized role or authorization changesA user assigns SAP_ALL profile to themselves during off-hoursFull system access β€” can read, modify, or delete any data
Data exfiltrationLarge or unusual data downloadsSomeone exports the entire customer master table to a local fileData breach β€” customer, financial, or employee data stolen
RFC abuseSuspicious RFC function callsExternal system calls sensitive BAPIs without proper authorizationRemote code execution or data access through RFC gateway
Audit log tamperingDisabling or modifying SAP audit logsAn attacker turns off the security audit log to hide their tracksLoss of forensic evidence β€” attacks become invisible
User creation anomaliesUnusual user account creationA new SAP user with broad authorizations is created at 3 AMBackdoor accounts for persistent unauthorized access

πŸ”§ Aisha demonstrates. β€œLast month, Sentinel detected an SAP user who granted themselves debug authorization at 11 PM. That user had no business doing ABAP debugging. Turned out their credentials were compromised. We caught it in minutes instead of weeks.”

Built-in analytics rules

The Sentinel SAP solution includes dozens of pre-built analytics rules:

  • SAP β€” Sensitive privilege use β€” detects when high-privilege transactions (SM19, SU01, SE38) are used outside normal hours
  • SAP β€” User authorizations changed β€” triggers when role assignments or profiles are modified
  • SAP β€” Audit log cleared β€” alerts when someone attempts to clear or disable the audit log
  • SAP β€” RFC execution of sensitive function β€” detects calls to sensitive function modules via RFC
  • SAP β€” Multiple logon from different IPs β€” flags concurrent logins from geographically distant locations
  • SAP β€” Critical authorization changes β€” detects assignment of critical profiles like SAP_ALL or SAP_NEW

Rules can be customized:

  • Adjust thresholds (e.g., alert after 5 sensitive transactions, not 1)
  • Add exclusions for known administrative activities
  • Create custom rules for TradeCorp-specific threat scenarios

Investigation and response

When Sentinel detects a threat:

  1. Incident created β€” with severity, affected entities (user, system), and timeline
  2. Investigation graph β€” visual map of related events, users, and systems
  3. Automated response β€” Logic Apps can lock the SAP user, notify the security team, or create a ServiceNow ticket
  4. Hunting queries β€” pre-built queries to search for similar activity across all SAP systems
Automated response for SAP

Sentinel playbooks (Logic Apps) can automate response to SAP threats. For example, if Sentinel detects a user granting themselves SAP_ALL, a playbook can automatically lock that user in SAP via RFC, send a Teams notification to the security team, and open an incident ticket β€” all within seconds. This is powerful but requires careful testing to avoid locking out legitimate admins.

Question

Why does SAP need dedicated SIEM integration beyond standard Azure security?

Click or press Enter to reveal answer

Answer

Standard Azure security monitors infrastructure (network, VM, OS) but cannot detect SAP-layer threats like privilege escalation, data exfiltration, RFC abuse, or audit log tampering. These threats happen within the SAP application layer and require SAP-specific log analysis that only a Sentinel SAP solution can provide.

Click to flip back

Question

How does the Microsoft Sentinel SAP data connector collect logs?

Click or press Enter to reveal answer

Answer

The recommended approach (GA) uses an agentless data connector via SAP Cloud Connector and SAP Integration Suite to forward SAP security logs to Sentinel. The legacy approach (deprecated, disabled September 2026) used a containerized agent on a Linux VM connecting via RFC. Both methods feed data into the Sentinel Log Analytics workspace for analysis.

Click to flip back

Question

What are the main SAP threat types that Sentinel detects?

Click or press Enter to reveal answer

Answer

Privilege escalation (unauthorized authorization changes), data exfiltration (large data downloads), RFC abuse (suspicious remote function calls), audit log tampering (disabling security logs), and user creation anomalies (backdoor accounts). Each has built-in analytics rules in the SAP solution.

Click to flip back

Question

What is needed to deploy the Sentinel SAP data connector?

Click or press Enter to reveal answer

Answer

For the recommended agentless approach: SAP Cloud Connector, SAP Integration Suite, a Log Analytics workspace with Sentinel enabled, and the SAP solution from the Sentinel content hub. The legacy agent-based approach (deprecated) required a Linux VM with a containerized agent and RFC connectivity to SAP.

Click to flip back

Knowledge check

Knowledge Check

Carlos asks why standard Azure security tools are insufficient for SAP. What is Aisha's answer?

Knowledge Check

Aisha is reviewing TradeCorp's Sentinel SAP connector architecture. In the legacy (agent-based) data connector, what protocol does the agent use to pull logs from SAP?

Knowledge Check

Sentinel detects a user granting themselves SAP_ALL authorization at 2 AM. What automated response can Aisha configure?

Summary

You now understand why SAP needs its own SIEM layer: standard infrastructure security cannot detect SAP-specific threats. Microsoft Sentinel with the SAP solution provides RFC-based log collection, built-in analytics rules for privilege escalation, data exfiltration, RFC abuse, and audit log tampering, plus automated investigation and response.

Next, we look at cost optimization β€” making all this SAP infrastructure as cost-efficient as possible without sacrificing performance or availability.

🎬 Video coming soon

← Previous

Security and Encryption for SAP

Next β†’

Cost Optimization for SAP on Azure

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.