One of the user logged into Production System, changed a
table and then logged out. How will you track him?
Answer Posted / boss
Run SM20 for that user and find out.
Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
Can you explain protecting public keys?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
what is the process to find that one consultant had removed a table from sap tables
Explain protecting public keys?
Can you explain internet-level security?
how you can delete multiple roles from qa, dev and production system?
explain the personalization tab within a role?
Can you explain transport system-level security?
what is hypercare and go live support?
Why is it important to delete sap-new profile? What steps will you take to do this?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How we Educated client personnel in R/3 Security and general Basis knowledge
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how a t code works
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS