Sap security audit log, Computer Engineering

You are required to use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data (Userdata.xls), generate appropriate reports and provide an analysis of your findings. Of particular interest are the following reports:

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.

2. List of users performing unsuccessful activities.

3. List of transaction codes performed, with their frequency by each user.

4. List of users engaging in security-related actions.

5. Top 10 users in terms of frequency of activity.

6. List of users who are dormant - in the range USER-001 to USER-050.

7. You should also produce at least 3 reports/charts/plots based on any of the above previous reports that summarise activity over time using YYYYMM.

Posted Date: 3/1/2013 1:14:16 AM | Location : United States

Related Discussions:- Sap security audit log, Assignment Help, Ask Question on Sap security audit log, Get Answer, Expert's Help, Sap security audit log Discussions

Write discussion on Sap security audit log
Your posts are moderated
Related Questions
Explain Binary number system. Ans. Binary Number System The number of system along with base or Radix two is termed as the Binary Number System. To show the number, 0 a

Meaning of Literal is:- Literal is string constant.

how can we find compound interest through flowchart

One of the fault base testing techniques is:- Mutation testing is the fault base testing.

write a program that counts the number of occurrences of the string in the n-th Padovan string P(n)

Explain the working of broad band ISDN. BISDN Configuration: Figure shows how access to the BISDN network is accomplished. All peripheral devices are interfaced to the acces

What is Function scope Function scope: A label is the only part of identifier that has function scope. A label is declared implicitly by its use in a statement. Label names m

Design a serial 2’s complementer with a shift register and a flip-flop

Representation in Prolog - Logic Programs: If we justimpose some additional constraints on first-order logic, so than we get to a representation language knowing as logic prog

What is divide overflow?  The division operation might result in a quotient with an overflow. Overflow happens when the length of the registers is finite and will not hold a nu