SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5902The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2435What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 15113Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9818Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13581Post New SAP Security Questions
what is the process to find that one consultant had removed a table from sap tables
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What is audit information system?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Authorization check on s_btch_job failed. What would happen now?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
How do we test security systems.
what is user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How we Educated client personnel in R/3 Security and general Basis knowledge
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation