how we Set up profile parameters and security Audit log
activation
Answer Posted / mike
SM19 to activate security logs
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Explain secure store and forward?
List the various user types.
As a SAP security consultant what is the most challenged you faced in previous company?
How to assign any program to user?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
how we Set up Central User Administration (CUA) to manage 4 systems/clients
Differentiate between derived role and composite role
What are pfud t-codes used for?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
what is hypercare and go live support?
What appears as the last sentence in sap note 587410?
By which parameter number of entries are controlled in the user buffer?
what is the different b/w su10 and su12
the company needs to expand its region to another country which the same authorizations had previously what approach you will take