Thank You for Choosing Ezeecontol , the SAP Security Audit Support Tool
Total Page:16
File Type:pdf, Size:1020Kb

1
Thank you for choosing, eBeacon the security audit support product.
The purpose:
This product determines the users that have critical combinations of authorizations based on SAP standard functionality.
Cause:
The organization must incorporate within its risk management processes consideration of fraud risks. Audit trails can be used to detect high risk authorizations.
Solution:
The eBeacon is a product that comprises the data matrix and uploading program to SAP standard transaction S_BCE_68002111 - With Critical Authorizations. This product translates SAP authorization objects to readable business language for each management level.
Prerequisite:
SAP Overview Basic Knowledge of the SAP Authorization methodology ABAP Developer Key 2
Step by Step
Following are the symbols that may be displayed in the step-by-step procedure section of this document:
Warning – Please take note of this information before proceeding.
Information – Note system messages, business
Critical – This function is critical to completing the transactions and transaction information.
Contact - Contact another department / business.
Reference – Refer to additional documentation. 3
1. Installation
The program is fully contained within a single program text. That is, the program requires no custom tables, or text elements etc.
eBeacon.ABAP.txt
Prior to transport into the production system; install the program in the development system, and then follow your own change request methodology Menu Path: Tools è ABAP Workbench è Development è SE 38 ABAP Editor
1. Start the transaction using the menu path or transaction code. 4
As required, complete/review the following header data:
Field Name R/O/C Description
Program Required Define the program name. Example: eBeacon
You can define your own program name
2. Click
Create program type “1”
3. Copy the text from this attachment, paste it into the program, and then activate the program. The screen prints in this installation guide are made in ECC 6.0,
You have completed this step 5
2. Program Execution
1. Start the transaction using the menu path or transaction code. SE38.
Enter the program name .
2. Click Execute
When the transaction is executed, the screen below will appear. 6
Input file – this is the file name of the data file that comprises the matrix.
1. Click Select the file
2. Click
Indicator Test only. With this option, the system checks only whether the preconditions exist for uploading the file successfully. The system displays the message.
Error Messages: The system displays the message, number of line in input file where this error occurred.
If you have any questions regarding this process, please do not hesitate to contact to Gregory Azbel 1647.801.15.17 or [email protected] 7
3. Clear check box
Select update mode function according to your business requirements. “Append to existing data” option makes changes or add new data. “Overwrite existing data” option deletes existing data and creates new data.
4. Click Execute
5. Click to confirm
The import generates a message 8
3. Transaction Execution 1. Start the transaction using the transaction code. S_BCE_68002111 - With Critical Authorizations
2. Click
3. Click
4. Double Click ZZCRITICAL_AUTH
The variant ZZCRITICAL_AUTH has been created by the program during upload. Change the variant name if it is required. 9
5. Click Execute
Use Sort and Filter function in order to analyze data.
You have completed this transaction. 10