SAP Basis Activation of the email function for all events in the Security Audit Log

Direkt zum Seiteninhalt
Activation of the email function for all events in the Security Audit Log
Creation of reports
In practice, it is quite possible that the target specifications defined in the security concept do not match the current actual status. Therefore, especially with regard to SAP security, it must always be checked whether the necessary SAP basic settings also correspond to the minimum level. Although a manual check is possible, it is very time-consuming because the necessary regularizations have to be read, interpreted and technically implemented. The Security Architect - part of the Xiting Authorizations Management Suite (XAMS) software solution developed by Xiting - offers you the possibility to precisely examine the current status of the SAP Basis settings with the help of the integrated check mode, whereby it is also possible to check several systems via RFC, starting from a central system. The scope of the check of system settings and system security includes not only the SAP Basis settings presented here, but also other SAP Basis settings. The scope of the check mode can be extended by self-defined check IDs.

For the SAP basis and its employees, the change in self-understanding results in an attractive, responsible and demanding working environment. Technological diversity can be controlled and kept to the minimum necessary. This includes an overview of the existing interfaces and a controllable data flow with the associated guarantee of data security.
Collaboration and management of (sub-)projects in the SAP Basis environment, if necessary also cross-departmentally
In order to demonstrate the necessary open spaces and capacities and also to demonstrate the innovative power of the SAP basis, regular reporting to the CIO or the management is recommended. If a product or technology is successfully evaluated, this can also be published as a success story within the framework of SAPBasis marketing (see chapter 7.4 in the Master's thesis) within the company.

A clearly structured and secure authorization management is very important to avoid errors and prevent access by unauthorized persons. These services are part of our authorization management:

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

All security settings of existing and future components must be validated to HANA compatibility.

Avoid errors proactively: SAP experts can perform efficient troubleshooting to prevent errors that may occur.
SAP Corner
Zurück zum Seiteninhalt