This is a statement that I often hear: "SAP traces everything".
But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?
This is a statement that I often hear: "SAP traces everything".
But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?
Do we need days of work every time we have to deal with this issue?
To understand which licenses and how to read the reports extracted from SAP?
Some tips in this article to make the licensing process easier in SAP.
Topics: sap license auditing, audit sap, slaw, usmm
Employees management inside the HR systems (Human Resources). Here it's also essential to manage access in a way that protects sensible data.
Which are the instruments inside SAP HR systems used for logs management? Let's see the main ones here.
Topics: security audit log, audit sap, UI logging, SAP LOG
A classic SAP landscape is made of three distinct machines:
It's possible to define more environments, for example, pre-production or other clients in the aforementioned systems.
Why are test systems essential for SAP security, and why do they need to be managed in such a way?
Topics: gdpr, test system, quality, audit sap, sap security guidelines
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. P. IVA: IT 03868780960 - 2024 | Copy | Note legali