SAP Basis Monitoring of the SAP system landscape through regular system checks according to defined schedules and workflows - SAP Corner

Direkt zum Seiteninhalt
Monitoring of the SAP system landscape through regular system checks according to defined schedules and workflows
Presentation layer (graphical user interface)
What do RFC interfaces and RFC security have to do with the play "Hauptmann von Köpenick" and the science fiction film "Minority Report"? Probably more than you like! RFC security and theatre?! Germany, Berlin, 1906: The 46-year-old cobbler Wilhelm Voigt dreams of returning to a normal life. After various convictions and many prison stays, he lives on the margins of society. It's not just the money he lacks. Above all, the lack of access to his social system makes him. In view of his impasse, he opts for a drastic measure. The excluded shoemaker pulls off and grates off several junk dealers to assemble a military uniform gradually. A few days later, he slips into the same disguise, successfully changes his identity and then swings through Berlin as Captain von Köpenick. He commandeers soldiers, storms the town hall and even detains the mayor. There is no doubt about the commands and their execution, because their true identity is veiled: Because of a simple disguise. A disguise that gives him all the necessary permissions he needs for his scam. At the end of the day, Wilhelm Voigt successfully compromised the Berlin government. RFC Security and Science Fiction?! USA, Washington, DC, 2054: The Washington police have long since stopped investigating murders: It prevents the killings right in advance. For this purpose, so-called "precogs" are used, which use precognition to predict and report murders in visions before they happen. At the same time, the government uses a system of public scanners that can identify all citizens clearly at any time by iris detection. One day, when policeman John Anderton himself appears as the culprit in a vision of the "Precogs," he flees the police building and decides to find out why.

In addition to internal security requirements, national and international guidelines sometimes require all audit and security-related user actions to be recorded. With the Security Audit Log (SAL) you have the possibility to log all changes, e.g. for users, user master records, but also roles and groups.
Application of support patches, upgrades and installation of add-ons
In this case, the term stands for the basic administration of SAP systems. In this context, responsible employees perform a number of classic tasks.

HANA optimization makes your own programs really fast. ABAP firewall: 92% less effort, 98% lower costs. Set quality standards for internal and external developments. Accurate and resource-saving analysis and evaluation. Security and compliance risks: significantly reduced.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

Common monitoring tool CCMS (Computing Centre Management System) to monitor alerts of R/3 system from one place.

On www.sap-corner.de you will also find useful information about SAP basis.


You trust in the availability of your SAP systems.
SAP Corner
Zurück zum Seiteninhalt