Some User has made changes to Tables in SAP. How to identify that user?
Answer Posted / sapsecvj
A little BG: If I create a role using PFCG, there are at least 2-3 tables been updated, eg: AGR_TEXTS, AGR_125 even though I do not have S_TABU_DIS & S_TABU_NAM.
Majority of the business transactions will be updating the tables in the back-end. We need to know on which date, which Tcode is used and which table is been updated by the user.
Method 1:
Go to ST03N and trace out who used the Tcode on the particular date.
Method 2:
Use FM CHANGE_DOCUMENTS_READ (dont have access to SAP, pls check name). Pass appropriate Values to the FM. it will return results from CDHDR, CDPOS tables. this is also the fastest way to access them.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Explain secure store and forward?
What is the use of Personalization tab in SU01?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Explain snc in sap security?
What is the difference between authorization object and authorization object class?
How to find out who has deleted users in the system?
what is hypercare and go live support?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what is user base in sap security?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Which tables will you use for making customizing setting for security administration?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
how a t code works