Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to trace the Users in BI Security and give me
navigation

Answer Posted / ramamohan53200

Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

When would you update a sap table directly? What precautions would you taje?

1157


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1081


Can you explain protecting public keys?

1009


How do you check background jobs?

1131


Can you explain network topology in sap systems?

1052


What is use of derived roles?

1190


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2274


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2610


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1441


Which t-code can be used to delete old security audit logs?

1425


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7072


Which transaction code is used to display the user buffer?

1139


What are the different types of sap security tables?

1053


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2391


how we can see FFID if firefighter not able to see FFids ?

1980