{"id":9010,"date":"2021-06-24T09:00:43","date_gmt":"2021-06-24T16:00:43","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9010"},"modified":"2026-04-03T12:56:44","modified_gmt":"2026-04-03T19:56:44","slug":"examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/","title":{"rendered":"Examining Microsoft&#8217;s SAP transactions with Microsoft Azure Anomaly Detector"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"112\" class=\"size-medium wp-image-7498 alignright\" style=\"margin-top: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories-300x112.png\" alt=\"Microsoft Digital technical stories\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories-300x112.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><em>We periodically update our stories, but we can\u2019t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.<\/em><\/p>\n<p>As part of our continuing digital transformation journey, our Microsoft Digital Employee Experience (MDEE) team is constantly looking for ways to improve our business processes and detect issues and anomalies before they become serious problems.<\/p>\n<p>Sometimes these failures happen sporadically within the application framework and often go undetected. Even if a user detects an anomaly, they need to decide how to react, which is time consuming.<\/p>\n<p>To do this, we\u2019re using Microsoft Azure Anomaly Detector to examine transactions across our SAP environment, which helps us identify issues before they become problems. In turn this enables us to proactively improve the performance, consistency, and reliability of our entire SAP landscape.<\/p>\n<p><em>[<a href=\"\/en-us\/insidetrack\/optimizing-sap-for-azure\">Unpack how we\u2019re optimizing SAP for Microsoft Azure<\/a>. | <a href=\"\/insidetrack\/blog\/protecting-microsofts-sap-workload-with-microsoft-sentinel\/\">Discover how we\u2019re protecting Microsoft\u2019s SAP workload with Microsoft Sentinel<\/a>. | <a href=\"\/insidetrack\/blog\/upgrading-microsofts-core-human-resources-system-with-sap-successfactors\/\">Explore how we\u2019re upgrading Microsoft\u2019s core Human Resources system with SAP SuccessFactors<\/a>.]<\/em><\/p>\n<h2>Understanding the need for anomaly detection in SAP<\/h2>\n<p>At Microsoft, our SAP environment comprises many complex processes across multiple lines of business. To avoid having disparate environments and isolated monitoring and reporting data, we wanted to build a single codebase solution for monitoring and anomaly detection that each line-of-business can use with minimal code implementation.<\/p>\n<p>We wanted to build intelligence to detect anomalies and inconsistencies in business process flow to improve platform health. Improved platform health improves engineering service-level agreements (SLAs) and reduces revenue loss by being proactive rather than reactive.<\/p>\n<p>There were hundreds of areas that could benefit from anomaly detection in our SAP portfolio, but we wanted to identify a single area for our pilot project. In the Master Data Management (MDM) space, we create thousands of objects representing business entities such as customers and business partners.<\/p>\n<p>Most of these objects are created by using an application programming interface (API), and no human interaction is needed. However, it\u2019s extremely difficult to identify if issues related to MDM are occurring in upstream systems, so we needed a way to capture issues in advance, proactively and quickly.<\/p>\n<p>In the MDM space, we have SAP Master Data Governance (MDG) background processes, such Customer Master data creation, which run without any user interaction. Across various batch and scheduled jobs, process runtime varies based on data volume, time of day, time of year, and resource availability.<\/p>\n<p>Understanding the potential for issues in each process and the larger process environment involves several challenging questions, including:<\/p>\n<ul class=\"c-list\">\n<li>Is the transaction supposed to run that long?<\/li>\n<li>Is there a problem in an upstream system?<\/li>\n<li>Are there resources that reached their maximum capacity or that are creating a performance bottleneck?<\/li>\n<\/ul>\n<h3>Assessing Microsoft Azure Cognitive Services and Microsoft Azure Anomaly Detector<\/h3>\n<p>Detecting these issues by using human triage was difficult and time and resource intensive. Many issues went undetected, resulting in poor customer experience and the loss of potential revenue, in addition to lost capacity that could have been used for more productive purposes.<\/p>\n<p>To solve this problem, we required a solution that was reliable, scalable, and easy to integrate with our SAP systems. The solution that we wanted would be process agnostic, implemented as a single codebase, and require no human intervention to detect issues.<\/p>\n<p>The Microsoft Azure Anomaly Detector service, available within Microsoft Azure Cognitive Services, fits all our requirements.<\/p>\n<p>The Anomaly Detector API enabled us to monitor and detect abnormalities in our data without having to know machine learning. The Anomaly Detector API&#8217;s algorithms adapt by automatically identifying and applying the best-fitting models to data, regardless of industry, scenario, or data volume, which greatly reduced our development efforts. Our primary steps were quite simple:<\/p>\n<ol class=\"c-list\">\n<li>Provision a service instance for Anomaly Detector in Microsoft Azure Cognitive Services.<\/li>\n<li>Start using the REST APIs in application code and interactions.<\/li>\n<\/ol>\n<h2>Using time-series data and data anomalies<\/h2>\n<p>For Anomaly Detector to identify anomalies, it requires time-series data, which is a series of data points indexed in time-based order.<\/p>\n<p>For example, your car might have embedded sensors that send information regarding engine health, speed, tire pressure, and gasoline capacity. This information about your car is constantly updated over time and, as such, it can be used as time\u2011series data.<\/p>\n<p>Most data received throughout time can be manipulated to be time\u2011series data if it\u2019s a consistent data sequence with a time stamp. Time-series data with a single variable is considered a univariate series, while time-series data with more than one variable is considered a multivariate time series. Anomaly detector supports both univariate and multivariate series.<\/p>\n<p>A data anomaly is outlying data that doesn&#8217;t fit within expected boundaries. The graphic below depicts the visual pattern of the time-series data with highlighted anomaly points in the time-series data. The graphic contains each of the time\u2011series data on the plot.<\/p>\n<p>Data should be within minimum and maximum boundaries. In the figure, the boundary is filled with a light color. Most of the data points are within the expected boundaries. However, some data points that exceed the expected boundaries are highlighted in red in the figure, are data anomalies.<\/p>\n<figure id=\"attachment_9017\" aria-describedby=\"caption-attachment-9017\" style=\"width: 461px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9017 size-full\" style=\"margin-top: 20px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure1.png\" alt=\"Time-series data with anomaly data points, with some data points outside the expected limits of the graph.\" width=\"461\" height=\"346\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure1.png 461w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure1-300x225.png 300w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><figcaption id=\"caption-attachment-9017\" class=\"wp-caption-text\">Time-series data with anomaly data points.<\/figcaption><\/figure>\n<p>For example, a stock price that drops below the expected limit is a data anomaly. If the temperature reading of a power plant core exceeds the acceptable limit, the reading is a data anomaly, and the technicians at the power plant should be immediately notified so that they can act based on the anomaly.<\/p>\n<p>Not all data anomalies are negative.<\/p>\n<p>For example, if you have an article on your website that\u2019s trending and experiencing larger traffic volume than normal, you likely want to be notified about the anomaly.<\/p>\n<p>Or, if you have an e\u2011commerce website and receive a sudden spike in product demand, you, as the product supplier, should be notified so that you can act immediately. The graphic below contains examples of inputs and results for the Anomaly Detector service.<\/p>\n<figure id=\"attachment_9018\" aria-describedby=\"caption-attachment-9018\" style=\"width: 606px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9018 size-full\" style=\"margin-top: 20px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure2.png\" alt=\"Examples of inputs and results for the Anomaly Detector service.\" width=\"606\" height=\"573\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure2.png 606w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure2-300x284.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><figcaption id=\"caption-attachment-9018\" class=\"wp-caption-text\">Inputs and results for the Anomaly Detector service.<\/figcaption><\/figure>\n<h3>Using Microsoft Azure services to create a business solution<\/h3>\n<p>To enable integration with our SAP portfolio, we\u2019ve implemented several decoupled software components. Each component has a specific use case, and we decouple business logic and the presentation layers to the extent possible. All application code is committed to a Microsoft Azure DevOps repository and is built as a Microsoft Azure-native solution.<\/p>\n<ul class=\"c-list\">\n<li><strong>Microsoft Azure Web Apps.<\/strong> We host the front-end (presentation layer) application in an Azure Web App, from which the user can call the anomaly-detection service by using the prepared time-series data. Microsoft Azure Web App Service gives our developers the option to work in their preferred language, which can be .NET, .NET Core, Java, Ruby, Node.js, PHP, or Python. We protect the application endpoint with Microsoft Azure Active Directory for user authentication and authorization.<\/li>\n<li><strong>Microsoft Azure Function Apps.<\/strong> We host all business-logic functionality in Azure Function Apps. We use two Azure Function Apps. The first is used to connect to Microsoft Azure Application Insights and capture SAP telemetry, such as customer or business-partner processes that need anomaly detection.\n<div style=\"margin-top: 20px;\">The Function App transforms the data into JavaScript Object Notation (JSON) format with time-series subformatting. The second Function App captures the precompiled time-series data from the first Function App, makes a call to the Anomaly Detector service, and then retrieves the result. The Web App presentation layer displays the results in a graph format. Function App endpoints are protected with access tokens.<\/div>\n<\/li>\n<li><strong>Application Insights. <\/strong>We store all SAP log data in Application Insights. This log data is posted from various business processes, including Customer Master Data creation, Business Partner Creation and updates, and batch program logs. These logs are the source for all anomaly detection.<\/li>\n<li><strong>Microsoft Azure Anomaly Detector.<\/strong> Anomaly Detector uses the Anomaly Detector API to detect and return all anomaly points based on time-series data that the Function Apps send. While there are two options for interacting with Anomaly Detector, our developers chose to call the HTTP REST API directly for the Anomaly Detector rather than use the client SDK to integrate Anomaly Detector directly with their application. Using the API removes the limitation of using a single codebase and enables simple integration with any modern language that supports calling REST APIs through HTTP.<\/li>\n<\/ul>\n<h3>Implementation architecture<\/h3>\n<p>As depicted in the graphic below, various SAP applications post their business-process logs into the Application Insights instance. The Web App hosts the core application, including the presentation layer and user interaction. The two Function Apps perform extract and process data from the Application Insights service and control interaction with the Anomaly Detector service. The Function Apps send the final results from the Anomaly Detector service for display and consumption in the Web App.<\/p>\n<figure id=\"attachment_9019\" aria-describedby=\"caption-attachment-9019\" style=\"width: 1049px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9019 size-full\" style=\"margin-top: 20px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3.png\" alt=\"Diagram of Azure Anomaly Detector for an SAP architecture.\" width=\"1049\" height=\"661\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3.png 1049w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3-300x189.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3-1024x645.png 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3-768x484.png 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-figure3-342x216.png 342w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><figcaption id=\"caption-attachment-9019\" class=\"wp-caption-text\">Microsoft Azure Anomaly Detector for an SAP architecture.<\/figcaption><\/figure>\n<h2>Business implementation and benefits<\/h2>\n<p>One of our key business processes that we onboarded to the Anomaly Detector\u2013based solution was the Master Data Management (MDM) business-partner creation that uses SAP Master Data Governance (MDG).<\/p>\n<p>We constantly create and update business-partner data in our SAP system via API calls from various upstream tenants and front-end systems. Based on incoming telemetry sources, the Anomaly Detector solution detects if there is a sudden drop in creation or update processes because of API failure or network issues.<\/p>\n<p>The detection algorithm can detect these issues automatically, in real time, which helps our system users to take corrective action. This simple addition to the issue-detection process helps us supply a better customer experience and eliminates major negative effects on revenue.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"74\" class=\"alignnone size-medium wp-image-7448\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png\" alt=\"Key Takeaways\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We\u2019re planning to implement the same solution design across many other business processes, such as batch-job monitoring.<\/p>\n<p>Currently, we have several hundred batch jobs that range from a runtime of a few seconds to several hours. It\u2019s extremely difficult to monitor them manually and individually.<\/p>\n<p>Sometimes, due to system issues or transaction locking, these jobs take more time, further affecting downline processes. Anomaly detection will play a critical role in detecting those issues, creating automatic alerts, and reducing manual monitoring.<\/p>\n<p>This application has many potential use cases across multiple business scenarios. We\u2019re planning to explore several of these use cases, including:<\/p>\n<ul class=\"c-list\">\n<li>SAP batch job monitoring, evaluating long running jobs and triggering alerts.<\/li>\n<li>Business-document processing and creation, such as sales orders, purchase orders, financial postings, and work orders.<\/li>\n<li>Any set of data that has time-series patterns. Data sets such as these can be evaluated and monitored for anomaly detection on a case-by-case basis.<\/li>\n<\/ul>\n<p>Using Microsoft Azure Anomaly Detector has enabled us to quickly and efficiently build a solution to detect abnormalities in our SAP processes without having to know machine learning. The Anomaly Detector API&#8217;s algorithms help us to identify issues before they become problems, thereby proactively improving the performance, consistency, and reliability of our entire SAP landscape.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"81\" class=\"alignnone size-medium wp-image-7482\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png\" alt=\"Related links\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul class=\"c-list\">\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/insidetrack\/optimizing-sap-for-azure\">Unpack how we\u2019re optimizing SAP for Microsoft Azure<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-microsofts-sap-workload-with-microsoft-sentinel\/\">Discover how we\u2019re protecting Microsoft\u2019s SAP workload with Microsoft Sentinel<\/a>.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/upgrading-microsofts-core-human-resources-system-with-sap-successfactors\/\">Explore how we\u2019re upgrading Microsoft\u2019s core Human Resources system with SAP SuccessFactors<\/a>.<\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/cognitive-services\/anomaly-detector\/concepts\/anomaly-detection-best-practices\" target=\"_blank\" rel=\"noopener\">Learn more about our best practices for using Anomaly Detector API<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We periodically update our stories, but we can\u2019t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time. As part of our continuing digital transformation journey, our Microsoft Digital Employee Experience (MDEE) team [&hellip;]<\/p>\n","protected":false},"author":133,"featured_media":9013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[820,115],"coauthors":[646],"class_list":["post-9010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-device-management","tag-microsoft-azure","program-microsoft-digital-technical-stories","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Azure Anomaly Detector: Examining SAP Transactions<\/title>\n<meta name=\"description\" content=\"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Azure Anomaly Detector: Examining SAP Transactions\" \/>\n<meta property=\"og:description\" content=\"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T16:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T19:56:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1040\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inside Track staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inside Track staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/\"},\"author\":{\"name\":\"Inside Track staff\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d87d5d73eed76dd055086299c842c17e\"},\"headline\":\"Examining Microsoft&#8217;s SAP transactions with Microsoft Azure Anomaly Detector\",\"datePublished\":\"2021-06-24T16:00:43+00:00\",\"dateModified\":\"2026-04-03T19:56:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/\"},\"wordCount\":1895,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/11\\\/10254-hero.jpg\",\"keywords\":[\"device management\",\"Microsoft Azure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/\",\"name\":\"Microsoft Azure Anomaly Detector: Examining SAP Transactions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/11\\\/10254-hero.jpg\",\"datePublished\":\"2021-06-24T16:00:43+00:00\",\"dateModified\":\"2026-04-03T19:56:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d87d5d73eed76dd055086299c842c17e\"},\"description\":\"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/11\\\/10254-hero.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2022\\\/11\\\/10254-hero.jpg\",\"width\":1040,\"height\":585,\"caption\":\"Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems, which allows it to proactively improve the performance, consistency, and reliability of its full SAP landscape.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Examining Microsoft&#8217;s SAP transactions with Microsoft Azure Anomaly Detector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/d87d5d73eed76dd055086299c842c17e\",\"name\":\"Inside Track staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g5b36aff6a325749e67e5cb253696fa6b\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g\",\"caption\":\"Inside Track staff\"},\"description\":\"Questions? Send us a note: msitstaff@microsoft.com\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/insidetrack\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Azure Anomaly Detector: Examining SAP Transactions","description":"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Azure Anomaly Detector: Examining SAP Transactions","og_description":"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/","og_site_name":"Inside Track Blog","article_published_time":"2021-06-24T16:00:43+00:00","article_modified_time":"2026-04-03T19:56:44+00:00","og_image":[{"width":1040,"height":585,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","type":"image\/jpeg"}],"author":"Inside Track staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inside Track staff","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/"},"author":{"name":"Inside Track staff","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d87d5d73eed76dd055086299c842c17e"},"headline":"Examining Microsoft&#8217;s SAP transactions with Microsoft Azure Anomaly Detector","datePublished":"2021-06-24T16:00:43+00:00","dateModified":"2026-04-03T19:56:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/"},"wordCount":1895,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","keywords":["device management","Microsoft Azure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/","name":"Microsoft Azure Anomaly Detector: Examining SAP Transactions","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","datePublished":"2021-06-24T16:00:43+00:00","dateModified":"2026-04-03T19:56:44+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d87d5d73eed76dd055086299c842c17e"},"description":"Learn how Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","width":1040,"height":585,"caption":"Microsoft uses Microsoft Azure Anomaly Detector to review its SAP transactions and identify issues before they become problems, which allows it to proactively improve the performance, consistency, and reliability of its full SAP landscape."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/examining-microsofts-sap-transactions-with-microsoft-azure-anomaly-detector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Examining Microsoft&#8217;s SAP transactions with Microsoft Azure Anomaly Detector"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/d87d5d73eed76dd055086299c842c17e","name":"Inside Track staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g5b36aff6a325749e67e5cb253696fa6b","url":"https:\/\/secure.gravatar.com\/avatar\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd7f2a0db74c09eb5a4b1d8812baa96be830da787002d0c498742b974e5d36d2?s=96&d=mm&r=g","caption":"Inside Track staff"},"description":"Questions? Send us a note: msitstaff@microsoft.com","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/insidetrack\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2022\/11\/10254-hero.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-2lk","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=9010"}],"version-history":[{"count":9,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9010\/revisions"}],"predecessor-version":[{"id":22970,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/9010\/revisions\/22970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/9013"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=9010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=9010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=9010"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=9010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}