Answer Posted / karun
1.Goto : /n/virsa/zvrat -> execute (F8)
2.Select Roles check box -> Copy all( Parent and derived
roles) roles in role box.
3.Checked the check box: Mitigating Controls
4.Click the Simulate tab
5.Here U got one Popup window.
6.Here Click the Transaction box (Enter all tcodes)
7.Checked the check box: Risks from Simulation Only
8.Execute (F8)
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What is use of derived roles?
What is Sap security t-codes?
What is audit information system?
what is use of copy data in derived role and when we use this one ???
Explain protecting public keys?
What are st01 t-codes used for?
How to run the daily background job s for virsa violations ? thabks in advance
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is t code?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
what is the process to find that one consultant had removed a table from sap tables
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.