Answer Posted / priyanka gadge
Via transaction EWZ5
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
how a t code works
What does the profile generator do?
Can you explain sap system transactions?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Support types of WOs you have faced?
What appears as the last sentence in sap note 587410?
How we schedule and administering background jobs?
Which t-code can be used to delete old security audit logs?
How can sap security be improved?
what are all the questions covered in "profiles related concepts " please let me know ?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS