Maintenance of profiles and operation modes
CG3Y File download
This is the heart of the SAP system. In the classic three-tier model, this would be the logic or control layer. One or more application servers host the necessary services for the various applications on this layer. These application servers provide all the services required by the SAP applications. In theory, a single server could fill this role. In practice, these services are in most cases distributed among several servers, each serving different applications.
Especially after security incidents it may be necessary to find out which (technical) users have logged in at which time. The USR02 table provides a first entry point. In the TRDAT column you can find the last login date for the user you want. However, a history of previous applications is not found in this table. In such cases, the Security Auditlog or SAL helps. Preparation In order to access the desired data, it must also have been saved previously. In the Security Auditlog, you can use various filters to determine which users are logged on which client and which information. The Security Auditlog stores, depending on configuration, logins, RFC calls, and other actions for specific users. You can make these settings in the SM19 transaction. Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc. It can be seen there among other things when the SAL was activated and last edited (1). You can also select the various filters (2), activate the filters individually (3), specify clients and users (4) and specify which activities are logged (5). Static configuration in the SM19 Under the Dynamic Configuration you can also see if SAL is currently active for the system. Determine the status of the SAL Evaluation of the SAL If the Security Audit Log is active, switch to the SM20 evaluation of the Security Audit Log. Select the desired user and client and the appropriate time window. The option Dialogues login is sufficient for the login. Then, restart the AuditLog analysis. Start evaluation You will get an overview of the user's login to the selected client of the system.
Soft skills in particular also play an important role in this job description. Communication skills are very much in demand on a day-to-day basis, because SAP administrators are often in close contact with customers and have to respond to their wishes and questions. They also need the ability to work in a structured manner and to find creative solutions and decisions. Continuous training in the field is advisable in order not to lose touch.
If a company chooses to tackle the area of e-learning itself and also to create the content for it itself, there is a certain challenge. The most obvious point here is that the above-mentioned initial effort is borne by the company. This means that employees spend their time creating videos, preparing presentations and/or creating questionnaires. This not to be underestimated effort must of course be borne by the company initially. On the other hand, a self-created e-learning offer offers the possibility to design it completely by itself and tailor it to the company's own needs. In addition, a company can decide whether it will use the e-learning offer itself only for its own employees (for internal training purposes) or whether it will also present the offer externally. This can be used, for example, for advertising purposes, as a know-how presentation or as a further source of income. Use the external sources: This is a very pleasant way for the company to improve the internal processes through ELearning. By acquiring external e-learning content, the company can purchase valuable know-how for comparatively low money. This know-how is in most cases already well prepared, that this can only be passed on to the employees and they can then independently acquire new knowledge or consolidate already known topics.
Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.
Here, the data is graphically prepared for the user on the terminal device by means of software components from the application programs of the application layer.
Moreover, the evil in all three stories could have been prevented by pro-activity.