This is a statement that I often hear: "SAP traces everything".
But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?
This is a statement that I often hear: "SAP traces everything".
But is it actually like that? Can I really ensure an activity tracing and find out who did what in the system? Or are there any methods to bypass these logs?
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. P. IVA: IT 03868780960 - 2024 | Copy | Note legali