SAP Basis SM19 Security Audit - SAP Basis

Direkt zum Seiteninhalt
SM19 Security Audit
View the support package level of the installed software components
After the addition of Java Stack (the applications developed in J2EE, BSP, JSP, etc.), the security standard for business processes was increased. Both ABAP and Java stack can be monitored from one platform. Netweaver supports standard protocols such as HTTP, SMTP, XML, SOAP, SSO, WEBDAV, WSDL, WMLSSO, SSL, X.509 and Unicode format (text processing representation).

The result table USERTCODE contains the transaction codes of the SAP users. Afterwards you simply have to output the complete list via "Object > Output complete list". Then save the list via "System > List > Save > Local file". The column Account contains the SAP user. This way you can see the used transactions grouped by SAP user.
SM02 System message
After your user has the necessary permissions for the SQL Editor, perform the following steps: Call the DBACOCKPIT transaction. Open the following folder structure in Database Administration: Performance -> Additional Functions -> SQL Command Editor Enter your first query in the input query. Then click Run or alternatively press F8 View of the DBA Cockpit Invoke the input query and drop the first SQL query View the results of a query to query the users of a system.

Over time, the tasks associated with the base became more complex and time-consuming, so that only the consultants could handle them. A need arose to hire a person to deal only with Basis matters.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

SPAM Settings Option SAPM Basic Setting Transmission Monitor From Scenario Standard Rebuild Data File A data file after the example.

In the past, this was surprisingly difficult to do with most databases.
SAP BASIS
Zurück zum Seiteninhalt