Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to monitor user accessed transactions (Tcode) day wise?

Answer Posted / sadiq

Hi,

you can use st03n for this and the best option is activate the security audit log with sm19 and see the t-code in sm20.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is the difference b/w 4.7EE & ECC5.0?

2475


Which table contains the details related to Q defined in SPAM? Is there a way to revert back the Q defined? If yes, How?

1329


At o.s level where to check for system logs of sap application?

1110


Using Tc SGEN I have generated 74% job and later I have terminated the job. I wish to start generating from where it stopped I have refreshed but to no chance, nothing was done. How should I further proceed so as to complete the remaining job?

1155


How to perform a sap-export and import tables in sap from os level?

1354


If brtools is not working how you will add datafile?

2583


What is an interface in SAP?

1305


List the difference between asynchronous and synchronous transport?

1066


How to perform the transport?

1197


Is it possible to install sap patches when other users are online?

1071


Why do you use DDIC user not SAP* for Support Packs and SPam?

1273


Can anyone forward me EP faqs to the following mail id: hakeem99khan@gmail.com Thanks in advance

2633


How to configure TMS?

1887


What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?

1974


can any send unix admin doc? if u have please send it to chanduk29@gmail.com

2034