Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q)if u r using 10 firefighter ids at a time? How will the
log reports goes to controller?
Q)wt is ruleset? and how to update risk id in rule set?

Q)wt is the procedure for Role modifications?explain with
example?

Q)who will done user comparision?

Answer Posted / anjibabu

1) log reports send through ( mail , workflow or
logdispaly ) these are available at options tab when we are
assigning fids to the controller tab.

2) ruleset which contains ( busniessprocess , risks ,
function and action,authorisations ) is know as rule set.

Is This Answer Correct ?    2 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is audit information system?

1089


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1267


what is sod in sap security?

1154


what is the main difference between the derived role and a single role?

1089


Can you explain network topology in sap systems?

1055


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1629


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2526


how to do Reporting and Analysis authorizations

2390


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4404


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2186


What are su53 t-codes used for?

1274


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2023


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2282


How do we test security systems.

1043


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2599