Sie sind auf Seite 1von 3

SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

SAP ECC HR BI Business Objects Security and GRC Audit Training ( Email:selvakumardm@gmail.com or Phone 302 494 9476)

SAP GRC AUDIT ECC BI and HR Training


Wilmington, DE

Event Details Where


103 Ascension Drive

Overview Wilmington, DE 19808


OvervR/3 System Security and the Authorization Concept Yahoo | Mapquest | Microsoft
Overview
Overview of the Authorization Concept
SAP* and DDIC Users
What Is the Profile Generator?
What Is a Security role?
What Happened to Responsibilities?
Security role Assignments
The Big Picture: Successful and Secure R/3 Implementation
Case Study: Security Strategy in a Three-System Environment
Authorization Administration Using the Profile Generator
Setting Up Security Administrators
Policies and Procedures
Auditing Requirements
Naming Convention for Authorization Profiles
Setting Up the Profile Generator
Overview
When to Use the Profile Generator
Activating the Profile Generator
Working on SAP Check Indicator Defaults and Field Values
Reducing the Scope of Authorization Checks in R/3 (SU24)
Generating the SAP Standard Menu and Company Menu
Getting Support from the Online Service System
Applying Advance Corrections to Your R/3 System
User Administration:

Overview
System Users
External R/3 Users
Internal R/3 Users
Special R/3 Users
User Groups
Authorizations and Authorization Profiles
Mass Operations
Creating a New User
Listing All Defined System Users
Changing a User’s Password
Displaying a Generated Authorization Profile and its Authorizations

Working with Security roles


Overview
Starting Security role Maintenance (PFCG)
Creating Security roles
Copying and Deriving Security roles
Choosing the Correct Menu Path in Session Manager
Selecting Workflow Tasks
Displaying Security roles
Changing Security roles
Deleting Security roles
Transporting Security roles
Generating and Maintaining Authorization Profiles
Overview
Generating the Authorization Profiles

1 of 3 13-12-2010 11:39
SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

Displaying an Overview of Generated Profiles


Displaying the Technical Names in the Tree List
Regenerating Authorization Profiles After Making Changes
Elements and Symbols of the Hierarchy Display
Using Utilities
Customizing Authorizations

Day 2 ( 10 Hours)
Special Cases
Overview
Manually Post maintaining Authorizations
Assigning Transaction Codes to Reports
Adding Any Missing Transactions to the Company Menu Tree
Assigning Security roles and Users
Overview
Assigning Users to Security roles
Assigning Security roles to Users
Assigning PD Objects to Security roles
Assigning Security roles to PD Objects
Transferring Users from an IMG Project to an Security role
Updating Profiles in the User Master Records
Creating a Sample Organizational Plan
Info system Authorizations
Overview
Displaying Information
Additional Reports and Transactions
Predefined Security roles and Authorization Profiles
What Are Predefined Security roles
Advantages of Predefined Security roles
Which Security roles Are Predefined
Predefined Data for the Security roles
Adapting the Predefined Security roles to Your Specific Needs
Installing the Predefined Security roles

Transports
Overview
Transports Between Clients
Transports Between R/3 Systems
Transporting Security roles
Transporting Check Indicators and Field Values
Transporting the Company Menu
Transporting Authorization Templates
Transporting User Master Records

Tips and Troubleshooting Management


Overview
Tracing Authorizations with Transaction SU53
System Trace Using Transaction ST01
Evaluating a Written Trace File

Day 3 ( 10 Hours)
Upgrades
Overview
Upgrade from a Release Before 3.1x to 4.5
Upgrade from Release 3.0F to 4.5A or 4.5B
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.5x

Online Service System Notes


Overview
Online Service System Notes

Important System Profile Parameters

Incorrect Logons, Default Clients, and Default Start Menu

2 of 3 13-12-2010 11:39
SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...

Setting Password Length and Expiration


Specifying Impermissible Passwords
Securing SAP* Against Misuse
Tracing Authorizations
Profile Generator and Transaction SU24
User Buffer
No Check on Object S_TCODE
No Check on Certain ABAP Objects
RFC Authority Check

Frequently Used Transactions


Overview
Transaction Code Switches
Authorizations/User Administration Function
Miscellaneous Transactions

Frequently Asked Questions


Overview
Profile Generator Setup
Working with the PG and Profiles
Authorization Checks (SU24)
Including Transactions or Reports
Missing Authorizations
User Administration
Session Manager
Transporting
Menu Generation
Tables

Day 4 ( 10 Hours)
SAP BW/BI Security Concepts

User Administration and Authentication


Authorizations – Administration and Reporting
Communication Security
Security and Data Storage
Trace and Log files

SAP GRC Concepts

Functions of SAP GRC access control


Risk analysis and remediation- ABAP Version Only
Compliant User Provisioning- Concept Overview
Enterprise Role Management- Concept Overview
Super user privilege management- ABAP Version Only

SAP Security Automation

CATT Scripts

Contact Host for event and ticket information.

3 of 3 13-12-2010 11:39

Das könnte Ihnen auch gefallen