Sap system-wide security settings, Computer Engineering

Assignment Help:

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system.

You are to produce a report (HTML) summarizing the current user settings, default settings and recommended settings. Prepare a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). The report should take the following form:

ABC DISTRIBUTION COMPANY

System-Wide Security Settings

Date:

Prepared by:

System Setting                                                User                Default            Recommended

                                                                        Value              Value              Value

No auto user SAP*                                                                 0                      >0

Failed logins to end

Failed logins to lock

Auto failed unlock

Min password length

Password expiry (days)

Idle logout (seconds)

No check on Tcodes

Default login client


Related Discussions:- Sap system-wide security settings

#title.sequential circuit, design modulo 12 up synchronous counter using t ...

design modulo 12 up synchronous counter using t flip flop

Should validation occur server- side or client - side, Should validation (d...

Should validation (did the user enter a real date) occur server-side or client-side? Why? Validation will be completed in both sides i.e., at the server side and client side. S

What are the characteristics of the e-cash, What are the characteristics of...

What are the characteristics of the E-Cash? These kinds of payments, turning the Internet within a transaction oriented forum, need mediums which are easy and cheap (through a

What do you meant by a multimedia authoring system, Problem : a) What d...

Problem : a) What do you meant by a Multimedia Authoring System? b) Compare the verbose syntax to the dot syntax in Lingo. c) Explain each of the following terms: i) L

What do you meant by static and dynamic modeling, Static modeling is used t...

Static modeling is used to state structure of the objects that are in the problem domain. These are expressed using class, object and USECASE diagrams. But Dynamic modeling sig

Define device interface, Define device interface. The buffer registers ...

Define device interface. The buffer registers DATAIN and DATAOUT and the status flags SIN and SOUT are part of circuitry commonly called as a device interface.

Create a factory function and constructor, 1) This project will use an acco...

1) This project will use an account class that has the members: string account_code; string first_name; string last_name; double balance; Provide a constructor that

Define the working of flip flops, Define the working of Flip Flops? Fli...

Define the working of Flip Flops? Flip flop is the basic unit of storage this is used to store one bit of information. Flip-flops are the synchronous bistable devices. The term

Security protocols used for e-commerce applications, Explain dissimilar sec...

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

State the approaches to organizing stored program control, Determine the ap...

Determine the approaches to organizing stored program control There are 2 approaches to organizing stored program control: 1.  Centralized: In this control, all control equi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd