Task 2 Specifications – Analyze SAP Security Audit Log Data.


ORDER NOW your custom paper to have it completed successfully on time.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Task 2 Specifications – Analyze SAP Security Audit Log Data.

 

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields: Field Description
USERID USERID identifies an unique user
YYYYMM YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month.
TCODE TCODE refers to the transaction (option on the menu) performed by the user.
TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.
TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).
TCD TCD is the same as TCODESTAT, except there is no -0 or -1.
TSTATUS TSTATUS indicates whether the action was successful or not (0/1).
TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM.
TTEXT TTEXT is the narrative description of the TCODE.

 ORDER NOW your custom paper to have it completed successfully on time.

Task 2 Requirements

Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are:

 

  1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
  2. List of users performing unsuccessful activities.
  3. List of transaction codes performed, with their frequency by each user.
  4. List of users engaging in security-related actions.
  5. Top 10 users in terms of frequency of activity.
  6. List of users who are dormant – in the range USER-001 to USER-050.
  7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format.

 ORDER NOW your custom paper to have it completed successfully on time.

TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings.

You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting.

Task 3 Requirements complete the following sub tasks:

Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature.

 

Table 1 SAP System-Wide Security Settings User-Defined Value System Default Value Recommended

Value

User-Defined Value
No auto user SAP* 0 0 0 0
Failed logins to end 0 3 3 0
Failed logins to lock 5 5 5 5
Auto failed unlock 0 0 1 0
Min password length 0 6 7 0
Password expiry (days) 0 0 40 0
Idle Screen logout (seconds) 1800 1800 900-1200 1800
No check on Tcodes 0 0 Y 0
Login client No 100 100 100 100

 

Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum.

 

1.      No auto user SAP*
2.      Failed logins to end
3.      Failed logins to lock
4.      Auto failed unlock
5.      Min password length
6.      Password expiry (days)
7.      Idle Screen logout (seconds)
8.      No check on Tcodes
9.      Login client No

 

Buy research paper on this assignment here (Email us: writersestate@gmail.com)
ORDER NOW your custom paper to have it completed successfully on time.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: