SAP Basis SolMan - the Solution Manager takes over the monitoring of the system status and enables central application management - SAP Basis

Direkt zum Seiteninhalt
SolMan - the Solution Manager takes over the monitoring of the system status and enables central application management
Usage Procedure Logging in SAP Solution Manager
SAP Basis is also known as module BC or application Basis. In this regard, SAP Basis refers to all transactions, programs and objects that control the functions of the overall system. This includes, among other things, user and authorization management as well as the configuration of interfaces via RFC.

SAP SE offers various training courses and certifications for SAP Basis administrators and SAP Basis consultants. As an alternative to internal recruitment and training, companies can also turn to external consultants or even outsource the entire SAP Basis administration to an external team with experience in SAP Basis.
CREATION OF A CATALOGUE OF CRITERIA
Why should we even have an individual SAP Security Check performed? Your SAP authorisation concept is designed to ensure the security and protection of data against unauthorised access and abuse. The technical complexity of SAP systems and the ongoing adaptations of business processes often lead to unknown security vulnerabilities. In addition, the increasing digital networking with business partners offers further attack points on your SAP system. SAP Security Check gives you an overview of the security situation of your SAP systems. This will identify potential risks that could jeopardise the safe operation of your IT landscape. Your starting situation The ongoing changes in your IT systems lead to unrecognised security vulnerabilities and your auditors will regularly report to you in the final report on abuses in the authorisation concept. The legal requirements (e.g. EU guidelines) to secure your business processes and IT systems have not yet been implemented and the increasing networking with business partners presents new challenges to your security system. The security-related system settings and permissions settings applied to your SAPS systems are poorly documented, which in many cases causes the system settings to allow extensive critical access unchecked. Critical SAP permissions, profiles, and roles identify permissions that allow critical operations to be performed in terms of security or from a legal or business perspective are called "critical permissions" by SAP. The granting of critical allowances must therefore generally be carried out with particular care and should therefore be planned in advance. Technical and organisational measures and processes must then ensure that the desired level of safety is implemented.

In addition to proactive monitoring to prevent possible errors or even complete system failures, our SAP Basis team also implements clearly defined authorization concepts. So that unauthorized persons cannot access important data and your employees are protected from unintentional violations.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

Practical experience at home and abroad has given us a proven view of heterogeneous system landscapes.

Several companies were invited to participate and their willingness to participate actively was questioned in a DSAG survey.
SAP BASIS
Zurück zum Seiteninhalt