how we Set up profile parameters and security Audit log
activation
Answer Posted / gaurav shrivastava
use t-code RZ10 is used to set profile parameters.
SE19 is used to activate audit log.
| Is This Answer Correct ? | 4 Yes | 7 No |
Post New Answer View All Answers
Tell me about derived role?
Explain x-glueb and its use in sap security.
You want to remove a developer's and developer keys from a system. How would you do that?
What does the item category specify in a purchasing order in SAP Materials Management?
What is stad?
Can you explain network topology in sap systems?
How to insert missing authorization?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What does the profile generator do?
What is t code?
What are su56 t-codes used for?
what is authorization object and authorization object class?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
when performing client copies what steps you need to take from CUA point of view?
What happens to change documents when they are transported to the production system?