how we Set up profile parameters and security Audit log
activation
Answer Posted / mike
SM19 to activate security logs
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What appears as the last sentence in sap note 587410?
How do we test security systems.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Which transaction code is used to display the user buffer?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are su25 t-codes used for?
what is the main difference between the derived role and a single role?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Which transaction should not be given to BASIS and DEV team in Production?
what is authorization object and authorization object class?
what is hypercare and go live support?
explain the personalization tab within a role?
How can I do a mass delete of the roles without deleting the new roles?
Can you explain document transfer-level security?