Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?
1 2172Is there a table for authorizations where I can quickly see the values entered in a group of fields?
1250Post New SAP Security Questions
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What are the different types of sap security tables?
Can wildcards be used in authorizations?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What is the difference between role and a profile?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What profile versions?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What are su53 t-codes used for?
Differentiate between usobx_c and usobt_c
What is sap’s grc?
what is hypercare and go live support?