Provides online GRC10 online training,covers configuration
& suuport activities on all the four components.
ARA,ARM,EAM,BRM.
SAP Securty covers--R3 Security,BW BI Security,HR
Security,SRM Security,CRM Security
Practicals on each component in GRC
Provides documentation and notes on each component
supports resume preparation and certification
For more details contact 8499995600.
No Answer is Posted For this Question
Be the First to Post Answer
Difference between short and Long Description in PFCG?
SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code?
What are su25 t-codes used for?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is the difference between c (check) and u (unmaintained)?
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
What are su 24 t-codes used for?
What are se10 t-codes used for?
why we are assigining only 312 profiles to the user
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)