SAP Basis SM20 Evaluation of the Security Auditlog - SAP Basis

Direkt zum Seiteninhalt
SM20 Evaluation of the Security Auditlog
ST01 System trace
With simple job programming, you can start in clear environments with few dependencies. If the number of jobs and the complexity increases, an automatic job control is a good choice. Honico Batchman is such a solution, a 100% SAP integrated AddOn, which is quickly and easily installed via normal transports. The advantage here is that no additional infrastructure is required; instead, the existing SAP system landscape is used for the entire control and execution without incurring a loss in performance. This also ensures full audit and operational security (compliance). Since pure SAP systems are rather the exception, non-SAP systems can also be controlled and monitored. As a third option, high-end solutions are available that additionally monitor the infrastructure and legacy. Widely used products in this segment are UC4 and Arvato Streamworks. These three solution options differ significantly in terms of price and scope of services. IT departments in companies must therefore evaluate which solution is best suited to their own requirements.

In practice, it is quite possible that the target specifications defined in the security concept do not match the current actual status. Therefore, especially with regard to SAP security, it must always be checked whether the necessary SAP basic settings also correspond to the minimum level. Although a manual check is possible, it is very time-consuming because the necessary regularizations have to be read, interpreted and technically implemented. The Security Architect - part of the Xiting Authorizations Management Suite (XAMS) software solution developed by Xiting - offers you the possibility to precisely examine the current status of the SAP Basis settings with the help of the integrated check mode, whereby it is also possible to check several systems via RFC, starting from a central system. The scope of the check of system settings and system security includes not only the SAP Basis settings presented here, but also other SAP Basis settings. The scope of the check mode can be extended by self-defined check IDs.
Recertification made easy with EasyReCert
In addition to internal security requirements, national and international guidelines sometimes require all audit and security-related user actions to be recorded. With the Security Audit Log (SAL) you have the possibility to log all changes, e.g. for users, user master records, but also roles and groups.

On www.sap-corner.de you will also find useful information about SAP basis.

So much information... how can you keep it so that you can find it again when you need it? Scribble Papers is a "note box" that makes this very easy.

The following folders on the system will then be completely deleted: C:\Program Files (x86)\Common Files\SAP Shared\BW delete C:\Program Files (x86)\Delete SAP C:\Program Files\SAP This completes the CleanUp phase. Install new version SAP GUI and Bex (BI Addon) The first step is to install SAP GUI and Business Explorer (Bex). Please select and install the following in the installer (see screenshot): SAP GUI Suite under SAP GUI for Windows (=Frontend) Business Explorer complete The progress bar often stays at about 93%. It takes a few minutes to complete the installation.

"Shortcut for SAP Systems" makes many tasks in the area of the SAP basis much easier.

The insertion of a SPAM update is analogous to the insertion of support packages.

This gives you the ability to prepare background access permissions and then unlock all permissions by clicking on the CMC tab configuration.
SAP BASIS
Zurück zum Seiteninhalt