SAP Security Interview Questions
Questions Answers Views Company eMail

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

1988

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

1951

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 5818

how to do Reporting and Analysis authorizations

IBM,

2110

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

2074

how to we Assigning Portal groups for Business users in BI

IBM,

1 3117

what is the difference between BI AND BW security

IBM,

2 15914

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 7607

how we Set up profile parameters and security Audit log activation

IBM,

3 8069

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1900

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM, SAP Labs,

2081

how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter

IBM,

2 7639

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1 6751

How we Schedul and administering Background jobs.

IBM,

1 3050

How we Schedul and administering Background jobs.

IBM,

2 6379


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

819


What are se09 t-codes used for?

886


What is the use of Personalization tab in SU01?

5323


What appears as the last sentence in sap note 587410?

835


What is the procedure for role modifications?

874


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1439


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4211


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2462


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1988


What is stad?

912


Any details about secatt apart from SAPSecurity online.com?

2083


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1900


Can you explain internet-level security?

870


How to codify for an Item in SAP? How many digits are required for an item?

2406


What does the item category specify in a purchasing order in SAP Materials Management?

1123