SAP Basis SAP Basis Consulting - SAP Corner

Direkt zum Seiteninhalt
SAP Basis Consulting
RZ01 Job Scheduling Monitor
New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA. A very good example are frequently used web applications that represent something new in the SAP area. In contrast to an SAP ERP system, HANA systems consist mainly of web applications, which were considered optional in the previous versions. These web applications can be found by various search engines on the Internet. This also applies to SAP Portal or Netweaver. There are URL schemes that help locate the system. This also applies to other SAP systems that use Web applications. This makes the new technology vulnerable to typical web attacks. SQL Injection, ABAP Code Injection, or XSS are all included. All risks known for a normal SAP system also apply to a SAP-HANA system. The data is stored unencrypted in RAM. Only then does the system gain this speed advantage. This results in risks such as a read-out by memory scraping malware. These pick up data in memory. Encryption costs performance, so it is not used by default. Especially during a migration HANA runs in a parallel system, therefore at least one new system comes to your landscape. Also note: HANA has its own tools and settings that need to be known and configured. The bottom line is that the system simply needs more attention when operating. Many settings often result in more errors. Three - points - HANA Security Plan 1) Roles and permissions In a previous SAP system, roles and permissions are certainly one of the main pillars of a secure system. Roles and permissions work differently in a HANA system. There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database. For example, the JDBC or HTTP technologies are used to give two examples.

Faster problem solutions: With an SAP service provider, you usually get faster solutions to problems that arise. With years of experience, experts can draw on a pool of solutions and know what is most efficient and best in each situation.
System Retirement
The following folders on the system will then be completely deleted: C:\Program Files (x86)\Common Files\SAP Shared\BW delete C:\Program Files (x86)\Delete SAP C:\Program Files\SAP This completes the CleanUp phase. Install new version SAP GUI and Bex (BI Addon) The first step is to install SAP GUI and Business Explorer (Bex). Please select and install the following in the installer (see screenshot): SAP GUI Suite under SAP GUI for Windows (=Frontend) Business Explorer complete The progress bar often stays at about 93%. It takes a few minutes to complete the installation.

However, the tasks also include strategic and planning aspects. For example, administrators define requirements and standards, select and control upgrades or extensions, implement monitoring processes, and take care of necessary backups and emergency management.

The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.

If the generation (tp-Step G) is aborted, you can either fix the errors immediately or after the commit is completed.

Some useful tips about SAP basis can be found on www.sap-corner.de.


SAP Basis is the IT structure on which an SAP system is based.
SAP Corner
Zurück zum Seiteninhalt