Thank You for Choosing Ezeecontol , the SAP Security Audit Support Tool

Total Page:16

File Type:pdf, Size:1020Kb

Thank You for Choosing Ezeecontol , the SAP Security Audit Support Tool

1

Thank you for choosing, eBeacon the security audit support product.

The purpose:

This product determines the users that have critical combinations of authorizations based on SAP standard functionality.

Cause:

The organization must incorporate within its risk management processes consideration of fraud risks. Audit trails can be used to detect high risk authorizations.

Solution:

The eBeacon is a product that comprises the data matrix and uploading program to SAP standard transaction S_BCE_68002111 - With Critical Authorizations. This product translates SAP authorization objects to readable business language for each management level.

Prerequisite:

SAP Overview Basic Knowledge of the SAP Authorization methodology ABAP Developer Key 2

Step by Step

Following are the symbols that may be displayed in the step-by-step procedure section of this document:

Warning – Please take note of this information before proceeding.

Information – Note system messages, business

Critical – This function is critical to completing the transactions and transaction information.

Contact - Contact another department / business.

Reference – Refer to additional documentation. 3

1. Installation

The program is fully contained within a single program text. That is, the program requires no custom tables, or text elements etc.

eBeacon.ABAP.txt

Prior to transport into the production system; install the program in the development system, and then follow your own change request methodology Menu Path: Tools è ABAP Workbench è Development è SE 38 ABAP Editor

1. Start the transaction using the menu path or transaction code. 4

As required, complete/review the following header data:

Field Name R/O/C Description

Program Required Define the program name. Example: eBeacon

You can define your own program name

2. Click

Create program type “1”

3. Copy the text from this attachment, paste it into the program, and then activate the program. The screen prints in this installation guide are made in ECC 6.0,

You have completed this step 5

2. Program Execution

1. Start the transaction using the menu path or transaction code. SE38.

Enter the program name .

2. Click Execute

When the transaction is executed, the screen below will appear. 6

Input file – this is the file name of the data file that comprises the matrix.

1. Click Select the file

2. Click

Indicator Test only. With this option, the system checks only whether the preconditions exist for uploading the file successfully. The system displays the message.

Error Messages: The system displays the message, number of line in input file where this error occurred.

If you have any questions regarding this process, please do not hesitate to contact to Gregory Azbel 1647.801.15.17 or [email protected] 7

3. Clear check box

Select update mode function according to your business requirements. “Append to existing data” option makes changes or add new data. “Overwrite existing data” option deletes existing data and creates new data.

4. Click Execute

5. Click to confirm

The import generates a message 8

3. Transaction Execution 1. Start the transaction using the transaction code. S_BCE_68002111 - With Critical Authorizations

2. Click

3. Click

4. Double Click ZZCRITICAL_AUTH

The variant ZZCRITICAL_AUTH has been created by the program during upload. Change the variant name if it is required. 9

5. Click Execute

Use Sort and Filter function in order to analyze data.

You have completed this transaction. 10

Recommended publications