SAP technological consulting
Infrastructure
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.
In order to guarantee an optimal operation process a permanent operation is recommended. We are ready to take over the monitoring including on-call service for you at any time.
SWF_APPL_DISPLAY Evaluate application log
SAP Basis is the cornerstone of your SAP system and failures can lead to significant and annoying problems. For assistance in building and expanding SAP Basis, SAP Basis consultants can help. Certified SAP consultants enable tailored solutions for any business landscape.
The presentation layer is based on the software components, collectively called "SAP GUI". This includes several possible implementation variants: for example, SAP GUI for HTML (Web GUI) and Web Dynpro for ABAP (WDA). Since the respective GUI depends entirely on the concrete application, the presentation layer looks very different in practice.
Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.
A peculiarity of blockchain technology is that it has solved the "Double Spending Problem".
For an active logging it is necessary to set the flag "Log data changes".