SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5941The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2445What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 15145Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9865Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13622Post New SAP Security Questions
Which t-code can be used to delete old security audit logs?
Explain network topology in sap systems?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How to run the daily background job s for virsa violations ? thabks in advance
What authorization are required to create and maintain user master records?
What is Sap security t-codes?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What are se10 t-codes used for?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What is the use of su56?
What is the difference between role and a profile?
What is stad?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?