Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how do we test security systems.what is the use of SU56

Answer Posted / badal

Through Tcode SU56 ,We will check the users buffer

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Is it possible to change role template? How?

1142


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2402


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

990


What is the use of tmssup* rfc destinations?

2516


What happens to change documents when they are transported to the production system?

1760


What authorization are required to create and maintain user master records?

1061


What are su22 t-codes used for?

1088


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1136


How do you check background jobs?

1130


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1199


Pfcg proposed activities but you need only two. What would you do?

1070


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2278


Which t-code can be used to delete old security audit logs?

1425


Differentiate between temp role and copy role

1132


What is use of derived roles?

1186