SAP Basis The setup of SAP monitoring

Direkt zum Seiteninhalt
The setup of SAP monitoring
Automated deployment
More security with less effort Internal employees often do not have the comprehensive know-how to know all relevant security risks. However, our security experts specialise in this. We use a standardised approach to determine your current security situation. Based on the analysis results, we show you where the security of your SAP systems can be improved and show you possible solutions. Focus your internal resources on your core business, while our experts will perform a customised audit on your SAP system to determine your security status. SAP Security Check - Our standardised approach (4-step model) Briefing: You register an interest in SAP Security Check. A consultant will contact you and discuss the details of the exam. They have the opportunity to clarify individual issues and to determine the focus of the security check. Data extraction: To ensure that your system is not affected by our audit, we export the relevant data manually or with the help of a data export tool. Analysis: Our security experts analyse the data, evaluate the results and prepare your report. Results: We will discuss the results of SAP Security Check with you. If safety deficiencies have been discovered, we will give recommendations for action on how to correct them. Optionally, you can ask our experts to solve your security risks in the short term. Your security risks become transparent Rapid assessment of your current SAP security status Detailed analysis and documentation Simple traffic light system enables overview of the results You can assess and prioritise the potential for danger for your company for every risk Know-how Transfer and recommendations for action You can easily communicate internally with the transparent and easily understandable final report You can close the relevant security gaps with our measures Optional: Eliminating security deficiencies Experts Our standardised approach enables us to assess the security of your SAP systems systematically and quickly. You do not need to build up authorisation expertise.

SAP Basis Administration Batch Control Job Control A large proportion of batch jobs run at night, while IT systems are available for dialog and online applications during the day. Meanwhile, web applications demand computer capacity around the clock. Even dialog systems are no longer in operation only from 8 a.m. to 6 p.m., but between 7 a.m. and 10 p.m. or longer. The time window for administration tasks is increasingly shifting toward transaction processing. This leaves less and less time for mission-critical batches, which can lead to disruptions and terminations. Whereas batch processing used to be a mainframe domain, companies today usually have to control background processing in heterogeneous operating system environments and client-server applications. For this reason, cross-platform, integration-capable job schedulers that can respond to unplanned events are in demand.
What does TREX have to do with SAP Solution Manager?
In transaction PFUD (see image above), you can perform the user match manually for all roles (or selected roles). You can choose between the matchup types Profile Matchup, Matchup of Indirect Assignments from Composite Roles, and Matchup HR Organizational Management. According to SAP documentation, the matchups differ as follows: Profile Matchup: "The program compares the currently valid user assignments of the selected single roles with the assignments of the associated generated profiles and makes any necessary adjustments to the profile assignments. Matching indirect assignments from composite roles: User assignments to composite roles result in indirect assignments for the single roles contained in the composite role. This match type matches the indirect assignments of the selected single roles to the user assignments of all composite roles that contain the single roles. If the selection set contains composite roles, the comparison takes place for all single roles contained in it. HR Organizational Management comparison: This comparison type updates the indirect assignments of all selected single and composite roles that are linked to elements of HR Organizational Management. The HR adjustment is inactive and cannot be selected if no active plan version exists or if a global deactivation has been made by setting the Customizing switch HR_ORG_ACTIVE = NO in table PRGN_CUST. Furthermore, the option "Perform cleanup" is interesting, which can be selected independently of the three adjustment types and does not refer to the role selection. The Perform Cleanup function can be used to remove residual data that resulted from incomplete deletion of roles and the associated generated profiles.

In this step, a dialogue box prompts you to confirm the commit. If the user does not have permission to execute the transaction SPAM or the current queue has not yet been confirmed, the transaction stops SPAM with a message to that effect. CHECK_REQUIREMENTS In this step, different requirements for inserting are checked. There are the following reason that may cause this step to be cancelled: TP_CANNOT_CONNECT_TO_SYSTEM: tp cannot log in to the system database. QUEUE_NOT_EMPTY: There are incomplete OCS jobs in the tp buffer. You can view these jobs using the following tp command: tp SHOWBUFFER -D SOURCESYSTEMS= TAG=SPAM You cannot resume the processing of the queue until these jobs have been completely processed or deleted from the tp buffer. DISASSEMBLE In this step, files are extracted from the corresponding OCS files and placed in the /usr/sap/trans/data (UNIX) directory.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.

However, to protect your system from unauthorized access via the network, a correct configuration of the SAP gateway is required.

So-called Access Control Lists (ACL) offer a good possibility to secure your gateway in order to exclude unwanted external accesses to the database of the application server.
SAP Corner
Zurück zum Seiteninhalt