Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what Troubleshooting we get these transactions like SU53,
ST01, SUIM and ST22

Answer Posted / chakravarthy

SU53- Authorization analysis
ST01- Trace
SUIM- Reports
ST22 - ABAP dump analysis

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2135


explain the personalization tab within a role?

1388


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7177


What are su22 t-codes used for?

1140


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4464


what is the use of defaults tab in start menu

1895


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2291


What happens to change documents when they are transported to the production system?

1831


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4265


Which t-code can be used to delete old security audit logs?

1486


You want to remove a developer's and developer keys from a system. How would you do that?

1100


What is the difference between authorization object and authorization object class?

1136


What is sap cryptographic library?

1076


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1479


By which parameter number of entries are controlled in the user buffer?

1402