Can you explain internet-level security?
No Answer is Posted For this Question
Be the First to Post Answer
How we Schedul and administering Background jobs.
which table is used to store illegal passwords?
Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.
1 How many tickets usually get per day/month in support ? 2 what is the major ticket in your experience ? 3 what is the tool you are using in your company? 4 in situation we will use Derive roles in support project? 5 One User asked me the TCODE access in support project,he got approvals from all,so shal i create new role or can i add that TCODE in his roles? 6 what is ROLE OWNER? 7 What are the daily activities in your Project ?
How to transport a T-code into Production?
How can assign miising authorizations in BI?
i haven taken training on sap basis... right now i m looking for job .what we are doing in trace (st01)explain in detailed.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Explain sap system transactions?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Difference between SE01, SE10 & SE09?