Personalisation of role in PFCG / user in SU01
Basis includes a client/server architecture and configuration, a relational database management system (DBMS), and a graphical user interface (GUI). In addition to the interfaces between system elements, Basis includes a development environment for R/3 applications, a data directory, and user and system administration and monitoring tools.
Once the UPL is activated, you can access the usage data as follows: Solution Manager: BW Query 0SM_CCL_UPL_MONTH (other predefined Querys available) Managed System: Report /SDF/SHOW_UPL Based on the UPL's data collection, you can now use additional functionalities of the CCLM to depick, for example, proprietary developments that are unused for a long time. Do you know the UPL of SAP and already use it to gain more information about its existing system landscape?
Load Support Packages into Other Systems
There was even a case where the SAP environment required a review of the data center power and cooling. At that time, the data center infrastructure had to be upgraded before we could even proceed.
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.
With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.
If necessary, he communicates with the company's decision makers so that improvements, adjustments and optimizations can be made to the SAP software.
When identifying critical SAP permissions, profiles and roles, it should be noted that SAP does propose a concept for names, but this is not always taken into account by applications or its own developments.