Do you want more traffic, leads, and sales?
SAP IDM
SAP Cyber Security
SAP Lead Generation
Recent Posts
What you need to Learn to Become $ 100 Per Hour SAP GRC Consultant- Part One
SAP User Administration: Creating users in the System and different options Understanding Different user types and their differences, date restrictions, defaults, Parameters, valid from...
Controlling Date Field in a Batch Program which executes monthly
Controlling Date Field to in a Batch Program which executes monthly Problem: When you have date field in the batch program and you want to execute the program monthly with the current date...
SAP Security policy is a collection of security policy features and their values. This procedure replaces the definition of behavior with profile parameters: once a security policy is assigned to a...
When you are auditing for SAP Transaction access within a SAP role or SAP users in the SAP ECC system, as an auditor you should also be aware of some of the back door transactions which are in SAP...
Alert Functionality for Your SAP Security Audit Log- Get Alerts when Sensitive Transactions are Used
SAP Security Audit Log can track all the transactions executed or any activities performed in the system. But most of the companies do not have the time to review the Transactions executed. Now SAP...
Business Owner: Approve risks for Monitoring and identify suitable reports for mitigation Approve remediation for user access and roles Actively participate in role design and changes Approve or...