SUGR Maintain user groups
Do you have any questions?
Instead of letting the power consumer determine each parameter individually, the SAP basis can now create meaningful bundles, such as the power server with a lot of processor power, memory and disk space, and the light server in a simpler setup. Each bundle has its own price, which requires preparation and consideration. The principle of consistently aligning IT services with repeatable standards is thus directly linked to the standardisation of processes and technical specifications. Standardised products can only be offered if process processes are standardised. Likewise, these can only be offered as simple and comprehensible product bundles if technical standards are established.
THE SAP basis AS AN OPPORTUNITY ALMOST EVERY INNOVATION IN THE COMPANY HAS A TECHNICAL FOOTPRINT IN THE BACKEND, WHICH MOSTLY REPRESENTS AN SAP SYSTEM. HERE, THE SAP basis CAN HELP CREATE AN ADDED VALUE FOR THE COMPANY. EARLY INVOLVEMENT IN THE PROJECT IS ESSENTIAL.
Support or substitution of your employees
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.
SAP Basis refers to the IT underlying the SAP system. It includes various middleware programs and tools and is responsible for the smooth operation of the SAP system.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
Read more This blog post is intended to show what is already possible in the field of Security Automation.
In your applications, you better start to check them for risks early on and run this backup process regularly.