Sap system-wide security settings, Computer Engineering

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system.

You are to produce a report (HTML) summarizing the current user settings, default settings and recommended settings. Prepare a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). The report should take the following form:

ABC DISTRIBUTION COMPANY

System-Wide Security Settings

Date:

Prepared by:

System Setting                                                User                Default            Recommended

                                                                        Value              Value              Value

No auto user SAP*                                                                 0                      >0

Failed logins to end

Failed logins to lock

Auto failed unlock

Min password length

Password expiry (days)

Idle logout (seconds)

No check on Tcodes

Default login client

Posted Date: 3/1/2013 1:15:20 AM | Location : United States







Related Discussions:- Sap system-wide security settings, Assignment Help, Ask Question on Sap system-wide security settings, Get Answer, Expert's Help, Sap system-wide security settings Discussions

Write discussion on Sap system-wide security settings
Your posts are moderated
Related Questions
Explain the term- Variables - Variables are used for local storage of data -  Variables are usually not available to multiple processes and components. -  Variables would

Write a short notes on storage classes in C. Every variable and function in C has two attributes : type and storage class. The four storage classes are automatic, external, reg

Q. Show the advantages of Joint Application Development? The following are the numerous advantages of Joint Application Development: Actively includes management and use

Computers manipulate numbers - but decimalnumbers with digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 cannot be represented using two states of a digitalcircuit.Instead decimal numbers are co

What is a path name?  A pathname is the path from the root by all subdirectories to a specified file. In a two-level directory structure a user name and a file name describe a

Explain about Physical model The Physical model describes concrete software and hardware components of system's context or implementation.

Reduce the following equation using k-map Y = BC‾D‾ + A‾BC‾D + ABC‾D + A‾BCD + ABCD Ans. Multiplying the first term with (A+A') Y = A'BC'D' + ABC'D' + A'BC'D + ABC'D + A'BCD + A

Q. Example to show a single digit ? Displaying a single digit (0 to 9) Presume that a value 5 is stored in BL register then to output BL as ASCII value add character ‘0' to

Q. Fundamental differences between RISC and CISC architecture? Fundamental differences between RISC and CISC architecture. The following table lists following differences:

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are send