mail info@ascendinfosolutions.com    phn 732- 645-7910

SAP ERP

SAP Security Contents

  • SAP R/3, Net weaver Technologies SAP Security
  • Elements of SAP Authorization Concepts
  • User Master Record
  • Working with Profile Generator (Roles, Composite Roles, Derived Roles, Customizing Roles)
  • Access Control and User administration (password Rules, special users, Authorization Administration)
  • Analysis and monitoring functions.
  • Special Authorization Components (Express Profile Gen)
  • Transport of authorization components
  • Automation of initial Loads
  • Central User Administration
  • Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
  • Controlling Transaction Codes, Tables, Programs Auditing the protection of transaction code execution Auditing the protection of direct table access Auditing the protection of direct program execution Auditing the protection of developer access
  • Securing User and Group Administration User Information System for Audits Decentralized security approaches Trace tools for users that can be used to support audits Auditing standard SAP users Auditing user related security parameters
  • Change Management and Security SAP recommended system landscape Approval processes for change management Auditing system change options and client change options Roles and responsibilities for change management
  • Securing System Administration Services in Production Auditing security for background processing Auditing security for spool, operating system commands System authorizations required for end-users Auditing RFC destinations
  • BW Security Review
  • CRM Security Review
  • SCM Security Review
  • XI Security Review
  • Solution Manager Security Review
  • Enterprise Portals Security Review
  • HR Security Review