SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 4759The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
1982What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 13610Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 8229Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 11835Post New SAP Security Questions
When would you update a sap table directly? What precautions would you taje?
What are su56 t-codes used for?
Explain network topology in sap systems?
Explain document transfer-level security?
Explain x-glueb and its use in sap security.
List the various user types.
Which tables will you use for making customizing setting for security administration?
Can you explain network topology in sap systems?
Differentiate between usobx_c and usobt_c
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what is the use of defaults tab in start menu
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
How we schedule and administering background jobs?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What are the different types of sap security tables?