Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.
CTS,
2 7540What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code?
7 48499Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?
4 11732some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
1 8621Post New SAP Security Questions
What is the maximum number of profiles in a role and maximum number of object in a role?
what is the process to find that one consultant had removed a table from sap tables
Is it possible to have more than one st of org-level values in one role? Explain your answer.
How to find out who has deleted users in the system?
What are su53 t-codes used for?
What happens to change documents when they are transported to the production system?
Attributes in SE01?
Can you explain network topology in sap systems?
Differentiate between derived role and composite role
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is use of copy data in derived role and when we use this one ???
How do we test security systems.
User is not there in User master record. Then how to trace the user?
explain the personalization tab within a role?
How to run the daily background job s for virsa violations ? thabks in advance