HOWTO - Using the Security Optimization Self Service - SAP.com
Recommend Documents
May 1, 2018 - led-blinking-uwp-app-with-raspberry-pi-2/. [26] Abdul Rasheed Feroz Khan âKickstart IoT (Internet of Things). With. Raspberry. Piâ. Link.
Security Quick−Start HOWTO for Red Hat Linux. Hal Burgiss [email protected] v.
1.2, 2002−07−21. Revision History. Revision v. 1.2. 2002−07−21. Revised by: hb.
Security Quick−Start HOWTO for Linux. Hal Burgiss [email protected] v. 1.2, 2002−
07−21. Revision History. Revision v. 1.2. 2002−07−21. Revised by: hb.
M. Desmurget and S. Grafton, "Forward modeling allows feedback control for fast ... C. W. Tseng, W. Lu, and M. P. Baker, "Self-checking and self-correcting ...
program komputer mulai dari shell atau prompt, editor teks, bahasa
pemrograman, ... mudah dikonfigurasi oleh pemakai komputer pemula yang tidak
tunanetra.
Oct 19, 2009 - Email: {mrocha,pns}@di.uminho.pt. bDepartment of ... that aim to provide end-users with Quality of Service (QoS) support. To ac- complish ... In the context of a QoS aware networking domain, Internet Service Providers ... the network,
Abstract. ATM cash flow management is a challenging task which involves both machine learning predictions and encashment planning. Banks employ these ...
... preview, print and fax anything under GNU/Linux. Almost everything applies
equally well to free software users using other Unix−like operating systems.
Dec 29, 2009 - 9-More than one file to be process . ... Experimentally derived particle size distribution often shown multimodal shape and this ..... A Survey of Multiobjective Optimization in Engineering Design, Technical Report No. LiTH-.
Contrary to the common perception that hospitality programs do not use ..... In the interest of strengthening the analysis, a correlation test considering all.
4.1.1 IBM WebSphere Application Server Express V5.0 . . . . . . . . . . . . . . 39 ...... clients for the Internet, application clients for the call center, wireless hand-held ...
Dissertation defense ... The design of a presentation depends entirely on its ...
What do I want the audience to take away from this presentation? ... Examples.
..... http://www.ece.cmu.edu/~pueschel/teaching/guides/guide- presentations.pdf.
Software defined radios supported by HDSDR version 2.0 and above may be ...
below demonistrates how to configure HDSDR and Ham Radio Deluxe's ...
future) PianoDisc iQ owner, you'll be happy to know that the iPad is a perfect
compliment ... browsing through your music and playing your favorite
PianoVideos.
Jul 5, 2012 - R18: â q,q â Np, Sp = (B,id,q) â§ q = q â§ Sq = (B,id,z) â§ z = p â Sp = (F,id,q). ⢠R19: â q,q ..... SBAM is the Java implementation of the DLPT.
pre-industrial etiquette, Gqffman's 1959 The Presentation of Self in Everyday Life ... the beauty of utility grounded in the aestheticization of everyday life that ...
Dec 13, 2007 ... Toolbox - a Tutorial. TU-Ilmenau ... 1.1.2 Functions of the Matlab Optimization
Toolbox . ... 3.1 Algorithms Implemented under quadprog.m .
Oct 28, 2005 - Illustration 2: Homepage of the HyperJournal Demo. .... By selecting this panel, you can create new roles and assign them permissions. In the.
feed for SIEM solutions such as RSA Security Analytics, Splunk, HP ArcSight, and ... INTEGRATION WITH SIEM/MONITORING TO
visibility across layers of devices, applications, data, and users presents far too ... With the cloud-based Absolute Da
requirements, download white papers, view screenshots and see other related
material ... and Forecasting for SAP/APO) al- low customers to address
immediate.
Linux Hardware Compatibility HOWTO. Steven Pritchard. Southern Illinois Linux
Users Group / K&S Pritchard Enterprises, Inc. . 3.2.4.
Jan 6, 2001 ... Kodak Digital Camera HOWTO. David Burley. The purpose of this document is to
help one get their Kodak digital camera working under ...
Cirrus Logic (now Basis Communications) PD6710, PD6720, PD6722, ...
controller in the HP Omnibook 600 is also unsupported. .... forms permit ordinary
users to issue commands to suspend and resume cards, reset cards, ... BIOS
devices.
HOWTO - Using the Security Optimization Self Service - SAP.com
This document describes how to use the SAP Security Optimization Self Service
... The system that should be tested needs to be prepared for Early Watch Alert ...
HOWTO SAP SECURITY OPTIMIZATION OPTIMIZATION WITH SAP SOLUTION MANAGER This document describes how to use the SAP Security Optimization Self Service in your local Solution Manager. Please also refer to SAP Notes 837490 and 696478 for further information www.service.sap.com/notes
1
SECURITY
OPTIMIZATION WITH SAP SOLUTION MANAGER
1 Preconditions The system that should be tested needs to be prepared for Early Watch Alert sessions as the Early Watch Alert download is also the basis for the Security Optimization Service. Please check the SAP notes 837490 and 696478 before you start. A specific authorization has to be set up in the target system before you can collect the data for the Security Optimization Service 1 Creation of the Security Optimization Session Create an instance of a Security Optimization Session in your Solution Landscape. Solution: 1. Connect to the solution manager system and call the Solution Manager using the transaction code “SOLUTION_MANAGER” or using the correspondent entry in the Easy Access Menu.
2.
Select your solution where you want to run the service.
2 3. 4. 5.
6.
Select “Operations” in the navigation bar on the left Select “Service Plan” “Sessions” in the header menu of the main window. (The menu “Service Plan” has been renamed to “Continuous Improvement” in the latest Solution manager version.) Select “Create Service” using the button on the right in the main window.
Mark the services “SAP Security Optimization - Self Service” and “SAP Security Optimization - Self Service – Questionnaire” (scroll down to the bottom of the list)
3 7.
Scroll back to the top of the list of the available services and select “Create” Confirm the proposed date (current date).
.
You can then see the created Security Optimization Services in the service plan of your solution. Now a request is sent to the target system to create an Early Watch Alert download and send it back to the solution manager. This download is used to build up the service session and some profile parameter data is used for a part of the security checks. As soon as the sandglass disappears the download is available and you can continue with the next steps
4 2 Only if you want to add own authorization checks: Check the definition of the customer specific authorization checks . If you use the ST-A/PI Plug-In in his F-Version (ST-A/PI 01F*) you need to implement f SAP Note 873038 to use the customer specific checks. This is not necessary for later versions of the Plug In Solution: 1. In the satellite system call the transaction ST13 2. Select the tool “SOS_CUSTOMER_DATA” and press “Execute”
3. 4.
Do not select the SAP Entries in the next screen to have a better overview. You will find an example of a check looking for users who are allowed to delete table change protocols.
5 3. Creation of the ST14 Download in the analyzed system Create the ST14download in the system that should be analyzed with the Security Optimization Service and send it to the Solution Manager. Solution: 1. Connect to the satellite system and call transaction ST14 2. Select the application “Security Optimization” 3. Press the pushbutton “Schedule job”
4.
Complete the input parameters of the selection screen as described in the picture below (The input parameters are also . explained in SAPNote 696478.) and press “Schedule job”
6
5. 6.
7.
8.
In the main menu of transaction ST14 select “Utilities” “Analysis browser” When the data collection has ended the status of the analysis will switch from “INPROCESS” to “COMPLETED” (There is no automatic refresh. You will need to call the analysis browser again to refresh the status). You can also use the job overview in the ST14 menu “Utilities” “Job overview” to survey jour job. The proposed default parameters for the job selection can be used. If the job has finished after 2 or 3 seconds you probably did not have the authorization described in SAPNote 696478. Please check in the analysis browser using the pushbutton “View data” if the analysis tree of the GUID contains data. The size of the collected data is several KB minimum. In the analysis browser make sure that the Solution Manager is selected as Remote system and send the analysis to the Solution Manager using the “Send” push button. Confirm the two dialog popups using the “Send” and the “OK” button.
7 4. Completing the Questionnaire for the Service Session The Questionnaire is used to influence the content and the look of the resulting service report. • Include all known users with special authorizations (System Administrators, User Administrators, Key Users, etc.) so that they are excluded from the service report. • Select the clients that should be checked • Decide if the user names should appear on the report. Solution: 1. In your Solution Manager session: Double click on the session “SAP Security Optimization - Self Service – Questionnaire”. 2. Check if the selected applications are correct (in our case only the application “R/3 WebAs” should be selected) and press “Save” . The questions corresponding to the selected applications show up when you open the corresponding sub tree in the menu on the left hand side.
3.
Complete the questions
8
5. Include the ST14 download in your analysis session and create the service report Now we open the service session and create the service report. Solution: 1. In your Solution Manager session: Double click on the session “SAP Security Optimization - Self Service”. 2. Select the check “Collect ST14 data into session”.
3.
4. 5.
Call the analysis browser with the push button “Analysis browser” and search for the correct GUID. Then “Copy and Paste” the GUID into the GUID field of the check table. You can now close the analysis browser again. (If you know the GUID you can also copy it directly into the check table without calling the Analysis Browser.) Press “Done” . Go to check “Read St14 Download” , set the flag in the column “Execute” in from of your GUID and press “Save”
9 6.
The session should now look like this:
7.
Now you can generate the service report using the push button “Word Document”. MS Word will start and the document will be generated. Please be patient until the report generation is finished.