Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.

3 5941

How see hierarchies in BI security

IBM, L&T,

1 6710

What are the critical tables in BI Security

IBM, L&T,

1 13798

How to trace the Users in BI Security and give me navigation

IBM, L&T,

2 9714

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

IBM,

2445

What r the daily activity in BI security

IBM, iGate,

1 8421

What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user

IBM,

2 15145

What is purpose of using Pound Sign(#) and colon(;) in BI/BW security

IBM,

3 15039

Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that

IBM,

3 9865

Whr will u find u Generation logs in BI security and What are Generation logs will come

IBM,

2 9001

What are the T-codes in BI security

HP, IBM,

3 20232

Join SAP Security Group on Facebook for active discussions.

1 5214

Difference between User Group in "Logon data" and "Groups" tab in SU01

HP,

8 30806

What is the difference between Execution and Simulation in grc rar

IBM,

1 13443

Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?

Cognizant,

4 13622


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Which t-code can be used to delete old security audit logs?

1486


Explain network topology in sap systems?

1092


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2445


How to run the daily background job s for virsa violations ? thabks in advance

3659


What authorization are required to create and maintain user master records?

1153


What is Sap security t-codes?

1223


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1074


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2191


What are se10 t-codes used for?

1139


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

2090


What is the use of su56?

1148


What is the difference between role and a profile?

1304


What is stad?

1176


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7177


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1094