Answer Posted / vaishali
Generally a call is made or an email is drafted to the help
desk and ticket is then raised on the client's behalf.
Usually a transact or user's access form is used to raise a
ticket wherein all the details are been filled.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
How to update risk id in rule set?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What authorization are required to create and maintain user master records?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
How to run the daily background job s for virsa violations ? thabks in advance
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
How we schedule and administering background jobs?
how we do CUA configuration in Quality system
Can you explain transport system-level security?
Explain secure store and forward?
Explain internet-level security?
Which tables will you use for making customizing setting for security administration?