Sap system-wide security settings, Computer Engineering

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system.

You are to produce a report (HTML) summarizing the current user settings, default settings and recommended settings. Prepare a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). The report should take the following form:

ABC DISTRIBUTION COMPANY

System-Wide Security Settings

Date:

Prepared by:

System Setting                                                User                Default            Recommended

                                                                        Value              Value              Value

No auto user SAP*                                                                 0                      >0

Failed logins to end

Failed logins to lock

Auto failed unlock

Min password length

Password expiry (days)

Idle logout (seconds)

No check on Tcodes

Default login client

Posted Date: 3/1/2013 1:15:20 AM | Location : United States







Related Discussions:- Sap system-wide security settings, Assignment Help, Ask Question on Sap system-wide security settings, Get Answer, Expert's Help, Sap system-wide security settings Discussions

Write discussion on Sap system-wide security settings
Your posts are moderated
Related Questions
What does the term convergence mean regarding E-commerce? Convergence regarding e-commerce: The capability to leverage and integrate the different data sources and proces

Q. Show the Features added in message passing interface-2 Input/output Single-sided operations for remote memory access Binding for C++ Dynamic process managem

A set of techniques that allow executing a program which is not entirely in memory is called ? Ans. virtual memory which allows executing a program that is not entirely in me

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

Extranet : Extranet is Extension of an Intranet that makes the latter accessible to outside companies or individuals with or without an intranet. It is also described as a coll

The final selector is connected to the (A) calling subscriber.                     (B) switching network. (C) called subscriber.                      (D) li

Write a procedure which divides a 32-bit number by a 16-bit number. The procedure must be general which is it's defined in one module and can be called from another assembly module

Function name or connective symbol: Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are the

Q. Illustrate Left shift register with parallel load? A register that shifts data in one direction only is known as Uni-directional shift register and a register that can shift

Q. What is Access latency and Rotation Speed? Access latency: A disk access basically moves the arm to selected cylinder and waits for rotational latency that may take less t