List of transaction codes, users are executing for last 3 months
Answer Posted / srinath meesala
ST03-WORKLOAD ANALYSIS
FROM THIS T CODE WE CAN GET ALL THE USER INFORMATION THAT A USER HAS ACCESSED.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Explain internet-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What is t code?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Pfcg proposed activities but you need only two. What would you do?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
what is sod in sap security?
Which tables will you use for making customizing setting for security administration?
what is hypercare and go live support?
What is use of derived roles?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is sap’s grc?
How we Educated client personnel in R/3 Security and general Basis knowledge
What does user compare do?
How we schedule and administering background jobs?