SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5816The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2406What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 15003Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9691Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13435Post New SAP Security Questions
Pfcg proposed activities but you need only two. What would you do?
What is Sap security t-codes?
What is the main purpose of parameters, groups & personalization tabs?
How to insert missing authorization?
how you can delete multiple roles from qa, dev and production system?
how a t code works
what is your ticketing tool? can we give some details about how we are getting tickets
How we Educated client personnel in R/3 Security and general Basis knowledge
How do we test security systems.
how we can see FFID if firefighter not able to see FFids ?
What is the difference between role and a profile?
Support types of WOs you have faced?
what are all the questions covered in "profiles related concepts " please let me know ?
What is the difference between the table buffer and the user buffer?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER