how we Set up profile parameters and security Audit log
activation
Answer Posted / mike
SM19 to activate security logs
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
When would you update a sap table directly?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
How to find ECC system, GRC system and BI system ?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
How we Educated client personnel in R/3 Security and general Basis knowledge
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is the process to find that one consultant had removed a table from sap tables
What authorization is required to create and maintain user master records?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What are the uses of an authorization group?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is t code?
You want to remove a developer's and developer keys from a system. How would you do that?
what is user buffer?