Provides online GRC10 online training,covers configuration
& suuport activities on all the four components.
SAP Securty covers--R3 Security,BW BI Security,HR
Security,SRM Security,CRM Security
Practicals on each component in GRC
Provides documentation and notes on each component
supports resume preparation and certification
For more details contact 8499995600.
We have few users with SAP_ALL profile from 90 days, now i
want check what are the transactions they are used till now
and i didn’t activate any audit filters in SM19. In this
case How can we find?
can any one let me know the Tables which we use for
compliance calibrator & Access enforcer of grc and please
let me know the background jobs of grc,
Please it's urgent so please answer as soon as possible to
these questions ,
I really appreciate your help,
what are the issues you faced with UME?
Tables so far used?
can any one explain me the step by step process to implement
security in BI/BW and what are the authorization objects we
use to BI/BW ,
How can the security is different between R/3 and BI/BW,
I appreciate your help
What is the Functionality difference between ECC 5 and ECC6?
i.e. new functionality in ECC6 which is not in ECC 5.
can you please send me SAP Security upgrade documents and
guide for CRM 5 and CRM 7 and what are the differeces
between crm 5 AND crm 7 according to sap security point of
Giving fire call access and extending fire call access by
using VIRSA’s VFAT tool.can any one brief this
Support types of WOs you have faced?
How to Maintenance of User Master Records, Profiles,
Can any one tell me the authorization objects for SOD
how we Restrict the auth groups for table maintain, creating
Auth group using SE54 to built new Auth groups to restrict
tables via auth object S_TABU_DIS
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE
ASKED IN USA....URGENT PLEASE
Give an example of SOD with object level control & also
decide the Risk implication from the Technical standpoint.
how we Custom Authorization Objects and Custom Transaction
maintenance and how we do User classification, Running
systems measurement reports during license auditing through
USMM and SLAW
when performing client copies what steps you need to take
from CUA point of view?