Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Whr will u find u Error logs in BI security and What
are Error logs will come and how will u solve that

Answer Posted / syed

Tcode RSECADMIN and Run Trace for the Report. Find the log
in the display log tab.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the use of tmssup* rfc destinations?

2516


Which transaction code is used to display the user buffer?

1136


How to run the daily background job s for virsa violations ? thabks in advance

3608


what is sod in sap security?

1154


How to find ECC system, GRC system and BI system ?

1174


Can you explain sap system transactions?

1076


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2524


What authorization is required to create and maintain user master records?

1045


Explain transport system-level security?

1090


what is authorization object and authorization object class?

1190


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1125


Explain document transfer-level security?

1066


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2076


How we Educated client personnel in R/3 Security and general Basis knowledge

2215


What are the most used tables in sap?

1155