Layer Seven Security ADVISORY
|
|
- Imogene Cook
- 6 years ago
- Views:
Transcription
1 Layer Seven Security ADVISORY SAP Security Notes May 01
2 There are two startling facts about SAP Security Notes released in May. The first is the sheer number of Notes issued by SAP, 57 to be exact. In comparison, March and April had just 46 and 33, respectively. The second is that almost 90 percent of the Notes were designed to provide greater protection for SAP systems against crosssite scripting attacks (XSS). There are several forms of XSS including stored, targeted at servers, and reflected, usually targeted at the client browser. The SAP patches released in May deal with both types of vulnerabilities. XSS is the most prevalent Web application security flaw and the most popular attack vector used by hackers. It works through the injection of malicious scripts into input fields used by Web applications. Encryption provides no defense against XSS. It merely encrypts the attack. XSS can be combated through a combination of code reviews (most XSS flaws can be detected by a trained eye) and input/ output validation. For the latter, refer to the OWASP XSS Prevention Guide at Vulnerability scanners such as those used by SAPSCAN greatly help with the detection of known XSS flaws in SAP systems. You can learn more about SAPSCAN at sapscan.html. SAP components are especially vulnerable to XSS since many rely upon Web-based (HTTP) communication. This includes SAP Business Suite software such as CRM and SRM and areas of the NetWeaver technology platform including the Enterprise Portal. Successful attacks can bypass SAP access controls and compromise the underlying data in such systems. SAP Security Notes May 01 Before installing the May patches, SAP customers should install the new encoding library introduced in Note (refer to Notes and ). Customers should also update Business Server Pages (BSP) (Notes , and
3 SAP Security Notes by Vulnerability Type ) and the Internet Transaction Server (ITS) (Notes and ). For more detailed instructions, follow the SAP checklist available at the SAP Marketplace. SAP also introduced a critical patch for certain Kernel functions in the month of May. The Kernel lies at the core of SAP systems and contains executable (.exe) files that support the so-called runtime environment. The Kernel is an abstraction layer between SAP systems and the underlying operating system and database layers. It supports the interoperability of SAP systems by enabling SAP to work with almost any enterprise-level OS and DB. Security Note patches a high-risk vulnerability effecting Transport Tools (BC- CTS-TLS) in the Kernel. Transport Tools includes utilities used to control releases and transfer data between SAP systems. This includes programs such as tp and R3trans that are called upon by the Change and Transport System (CTS) and Transport Management System (TMS). Missing authorization checks in this part of the Kernel could enable some users to access sensitive functions through the escalation of privileges.
4 Appendix: SAP Security Notes, May BC-CTS-TLS Missing authorization check in KERNEL BC-JAS-SEC Update 1 to security note BC-JAS-SEC-UME Update 1 to Security Note BC-BSP Update 1 to security note CRM-BF-TM Unauthorized modification of displayed content in CRM-BF-TM CRM-IC-ADR Unauthorized modificat. of displ. content in CRM-IC-ADR XAP-MBA-DSD Unauthorized modification of displayed content in MDSD Admin IS-M Unauthorized modification in ITS-Services in IS-M IS-M Unauthorized modification in BSP applications in IS-M CRM-IC-FRW Unauthorized modification of displayed content in IC_BASE PP-MES Unauthorized modification in SICF-services in PP-MES PPM-PRO Unauthorized modification of displayed content in PPM-PRO CA-GTF-SP-GEN Unauthorized modification in CA-GTF-SP-GEN SLC-REG Unauthorized use of application functions in SLC-REG CRM-IPS-BTX Unauthoried modification in BSP application in CRM-ISP-BTX CRM-MKT-SEG-IEX Unauthorized modification of displayed content in CRM_MKTIME SRM-SUS Unauthorized modification of displayed content in SRM-SUS SRM-EBP-BID Unauthorized modification of displayed content in SRM-EBP CRM-BF-CFG Unauthorized modification of displayed content in IPC UI CRM-IFS Unauthorized modification of displayed content in CRM-IFS EP-PCT-PUR-BP Unauthorized modification in BSP applicat. of EP-PCT-PUR-BP SRM-EBP-CA-ATT Malicious modification of SRM attachment url CRM-MD-PRO-OBJ Unauthorized modification of BSP in CRM-MD-PRO-OBJ
5 Appendix: SAP Security Notes, May CRM-IC-OBJ Unauthorized modification of BSP in CRM-IC-OBJ CRM-MD-PRO Unauthorized modification of BSP in CRM-MD-PRO IS-A-DP-VMS Unauthorized modification of BSP in Webdocuments IS-A-DP-SPP Unauthorized modification of BSP in Webdocuments IS-A-DP-WTY Unauthorized modification of BSP in Webdocuments FS-CD Unauthorized change of contents displayed in agency collctns CRM-BTX-PRV-DUI Unauthorized modificat. of displ. content in CRM-BTX-PRV-DUI EP-PCT-MGR-CO Unauthorized modification in BSP appl. in EP-PCT-MGR-CO CO-OM Unauthorized modification in BSP application in CO-OM EP-PCT-SD-S XSS: Source code commented out incorrectly on BSP pages SRM-EBP-CAT Unauthorized modification of displayed content in SRM-EBP PA-ER Unauthorized modification of stored content in E-Recruiting PLM-PPM-PDN Unauthorized modification of displayed content inplm-ppm-pdn CRM-IC-EMS Unauthorized modification in BSP application in CRM-IC-EMS SRM-ROS ROS: Unauthorized modification in BSP application CRM-MKT-MPL-CA Unauthorized modification in BSP application CRM-MKT-MPL-CA CRM-BF-SVY Unauthorized modification in BSP application in CRM-BF-SVY CRM-CHM Unauthorized modification of displayed content in CRM-CHM CRM-BTX-ACT Unauthorized modification in CRM Activity FIN-SEM-CPM-BSC Unauthorized modification in BSP application in FIN-SEM-CPM CRM-BF-BRF-RM Unauthorized modification in CRM Rule builder(crm-bf-brf-rm) CA-DMS Unauthorized modification of BSP in Webdocuments () CRM-IPS-ICM-ACT Unauthorized modification of displayed content in ICM IS-U-WA Unauthorized modification in ITS-Service in IS-U-WA PP-KAB Unauthorized modification in ITS-Service in KANBAN SCM-APO-CA-COP Unauthorized modification in ITS-Service in SCM-APO-CA-COP PA-ER Unauthorized use of application functions in HRRCF_START_EXT PPM-PRO Unauthorized modificatn of displayed content in PPM-PRO (1)
6 Appendix: SAP Security Notes, May BW-BCT-ISR-AA Unauthorized modif. of stored content in RSBCT_RFASH_ALI PLM-CFO Unauthorized modification of displayed content in PLM-CFO(9) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(8) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(7) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(6) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(5) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(4) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(3) PLM-CFO Unauthorized modification of displayed content in PLM-CFO() BC-FES-ITS Unauthorized modification of displayed content in ITS CRM-BF-WST Unauthorized modification of content in WS_DESIGN_TOOL CRM-MD-BP-CCP Unauthorized modification of the content in CRM-MD-BP-CCP CRM-MKT-SEG-TGR Unauthorized modification of displayed content in CRM_MKT CA-GTF-PCF Unauthorized modification of displayed content in CA-GTF-PCF CRM-IT Unauthorized modification of stored content in CRM_IT_DEALER CRM-BTX-BF Unauthorized modification in CRM Business Transactions CRM-IC-FRW Unauth. mod. of displayed content in Interaction Center Frw IS-U-CS Unauthorized modification of stored content in IS-UT CRM-IC-SCR Unauthorized modification of displayed content in CRM-IC-SCR CRM-BF-ML Unauthorized modification of displayed content in CRM CRM-BF Unauthorized modification of displayed content in CRM_BSP CRM-MKT Unauthorized modification of displayed content in CRM-MKT SCM-BAS-UIF Unauthorized modification of displayed content in ICH BC-CCM-MON-SLG Directory Traversal in SAP System Log CRM-IC-ABO Unauthorized modification of displayed content in CCMP_RABOX BW-PLA-BPS-WIB Unauthorized execution of application funcs. in BW-PLA-BPS PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO(13
7 Appendix: SAP Security Notes, May PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO( BW-BCT-CRM Unauthorized modification in BSP applications in BW-BCT-CRM PPM-PRO Unauthorized modification of displayed content in PPM PE-LSO-LPO Unauthorized modification in BSP application in PE-LSO-LPO CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR PA-EC-JP Unauth. modification of displayed content in Job Pricing PA-EC-BD Unauth. modification of displayed content in Budgeting SLC-SUP Unauthorized modification of displayed content in SLC-SUP CRM-CIC-CAM Unauthorized modification of content in CRM-CLM applications PPM-PFM Unauthorized modification on document url in PPM CRM-CIC Unauthorized modification of content in CRM-CIC applications PA-PD-PM Unauthorized modification of stored content in PA-PD-PM XX-PROJ-FI-CA Unauthorized modification of BSP in FI-CA CRM-MKT-MPL-CA- BRE Unauthorized modification in CRM-MKT-MPL-CA-BRE CRM-BTX-GWI Unauthorized modification of stored content in CRM-BTX-GWI EPM-BFC-TCL Potential remote code execution in Financial Consolidation CRM-MKT-MPL-CA- MOD Unauthorized modification in CRM-MKT-MPL-CA-MOD CRM-MKT-MPL-CA- BRE Unauthorized modification in component CRM-MKT-MPL-CA-BRE CRM-ANA-SRV-BW Unauthorized modification of disp. content in CRM-ANA-SRV-BW EP-PCT-MAN-M Unauthorized modification in BSP application in PlantManager CRM-IC-ABO Unauthorized modification of content in CRM_CIC_RABOX BC-BSP Unauthorized modification of displayed content in BSP BW-BCT-EPM Unauthorized modification of stored content in BI_CONT BW-BCT-PSM Unauthorized modification of displayed content in BW-BCT-PSM
8 Appendix: SAP Security Notes, May FIN-SEM-CPM Unauthorized modification of displayed content in FIN-SEMCPM FS-BA-TO-ME code injection vulnerability in module editor CA-SUR Unauthorized modification of displ content in Web Request BC-SEC-SSF Unauthorized modification of displayed content in BSP apps PA-EC-BD Unauthorized modification displayed content ECM_BSP_LIBRAY CRM-BTX-ACT Unauthorized modification of displayed content in Calendar BC-ABA-SC Potential denial of service in DIAG Processor CA-GTF-IC-BRO Unauthorized modification in BSP in CA-GTF-IC-BRO BW-BEX-ET-WEB Directory traversal with unauthorized modification in BW FI-FM Missing authorization check in FI-FM CRM-ISE-SRE Unauthorized mod. of displayed content in Web.Req. toolbox CRM-ISE-WBF Unauthorized mod. of displayed content in UAD_xx BC-DWB-WD-ABA Unauthorized modification of displayed content in Web Dynpro PA-PA-JP Unauthorized modification in ITS-Service PA-PA-KR Unauthorized Modification in ITS-Service in PA-PA-KR BC-FES-GUI Generic low level functionality in SAP GUI CRM-BTX-ERP Unauthorized modification of content in configuration CRM-BTX-BF-ATP Unauthorized modification of content in gatp pop-up BC-WD-JAV Unauthorized Modification of Displayed Content in Web Dynpro EP-PDK-HBJ Unauthorized Modification of Displayed Content in HTMLB CRM-BF-WFI Unauthorized modification in SICF-service in CRM-BF-WFI CRM-BTX-ERP Unauthorized modification of content in ERP print preview CRM-BF-ACI Unauthorized modification of content in order print preview SLL-LEG-CUS Cross-Site-Scripting (XSS) in GTS Dashboard possible CRM-BF-COM Unauthorized modification of displayed content in CRM CM CA-GTF-PCF Unauthorized modification of stored content in CA-GTF-PCF PLM-CFO Unauthorized modification of displayed content in PLM-CFO(1) BW-BEX-ET Unauthorized modification of displayed content in BW-BEX-ET
9 Appendix: SAP Security Notes, May SRM-SUS Unauthorized modification in BSP application/sicf Service FI-TV-PL Unauthorized modification of displayed content in FI-TV-PL CRM-BF-COM Unauthorized modification of displayed content in CRM CM CRM-MKT-DAM Unauthorized modification of BSP in CRM-MKT-DAM CRM-BF-COM Unauthorized modification of displayed content in CRM CM CRM-BF-ML Unauthorized modification of displayed content in CRM IS-M-AMC Cross site scripting vulnerability in BSP pages for AMC BC-SRV-RM Unauthorized modification of stored content in BC-SRV-RM SRM-EBP-CON Unauthorized modification of stored content in SRM-EBP-CON PA-PA-CN Security: XSS vulnerability in SAP GUI for HTML CRM-ISE-WBF Unauthorized mod. of displayed content in CRM-ISE-WBF CRM-BF-ML Unauthorized modification of displayed content in CRM CRM-BF-ML Unauthorized modification of displayed content in CRM CA-EPT-ANL-LST URL in Launchpad-Navigation can be malformed BC-SRV-SSF Unauth. modification of displayed content in BC-SRV-SSF BC-SRV-GBT-ALM Unauthorized modif. of displayed content in BC-SRV-GBT-ALM CRM-ANA-PS Unauthorized modification of displayed content in BW-CRM BC-SRV-KPR-RET Unauthorized modification of displayed content in BC-SRV-KPR BC-SRV-RM Unauthorized modification of stored content in BC-SRV-RM BC-MOB-MI Unauthorized modification of displayed content in BC-MOB-MI BC-DOC-TER Potential loss of integrity in web app Terminology Tools PA-PD-PM Unauthorized modification of stored content in PA-PD-PM BC-BSP Unauthorized modification of displayed content in BSP SCM-EWM-RF Unauthorized use of application functions in SCM-EWM-RF BW-BEX-OT-MDX MDX: SOAP / XMLA interface and Document Type Definitions BC-MOB-MI Unauthorized modification of displayed content in BC-MOB-MI BC-MID-ICF Unauth. modification of displayed content in ICF Recorder IS-CC Potential modification of persisted data in SAP CC
10 Appendix: SAP Security Notes, May EP-PCT-PUR-BP Buyer: Sec. note for cross-site scripting & BSP applications BC-DB-SDB Potential info. disclosure and code execution in sapdbctrl CA-GTF-TS-WSI Unauthorized modification of stored content in CA-GTF-TS-WSI BC-WD-ABA Unauthorized modification of displayed content in WebDynpro FS-CD Unauthorized modification of displayed content agency coll BC-BSP XSS vulnerability in BSP system BC-WD-UR Unauthorized modification of displayed content in UR CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR BC-BSP Unauthorized modification of displayed content in BSP pages CA-WUI-UI-TAG Unauthorized modification of stored content in WEBCUIF CRM-ISA Potential runtime problems after manipulation of isa_relogin BC-SRV-ARL Unauthorized modification of stored content in BC-SRV-ARL EP-PIN Portal XSS Encoding Library - StringUtils BI-BIP-CMC Unauthorized modification of displayed content in BOE BC-ESI-WS-ABA- CFG Unauthorized modification of displayed content in UDDIClient PLM-CFO Update # to Security Notes PLM-CFO Update # to Security Notes BI-BIP-OP Potential denial of service in BusinessObjects Enterprise CRM-IC-CAM Unauthorized modification in BSP in CRM-IC-CAM FI-AP Obsolete ITS services in FI-AR/AP BW-BCT-PLA-RAP Unauthorized modification of displayed content in BW-BCT-PLA SRM-EBP-CA-ATT Malicious modification of displayed SRM attachments SLC-SUP SLC: Unauthorized modification in BSP application SRM-EBP-BID Unauthorizd modification in ITS services SRM-EBP-TEC-ITS Unauthorized modification in ITS-Services in SRM CA-WUI-APF Unauthorized modification of content in transaction launcher IS-M-AMC Unauthorized modification of displayed content in IS-M-AMC CRM-ISE-WBF Unauthorized mod. of displayed content in BSP CRM_PS_SOA
11 Appendix: SAP Security Notes, May CO-OM Unauthorized modification in ITS-Services of ISR SRM-EBP-PRC Unauthorized modification in ITS-Service in SRM-EBP-PRC SRM-CMT Unauthorized modification in ITS-Service in SRM-EBP-CAT IS-HER-CM Unauthorized modification in BSP application in IS-HER-CM IS-HER-CM Unauthorized modification in BSP application in IS-HER-CM SRM-EBP-VE Unauthorized modification of displayed content in VE IS-M-AMC Unauthorized modification of displayed content in IS-M-AMC FI-AA Obsolete ITS services in FI-AA SRM-EBP-INV Unauthorized modification of ITS in SRM-EBP-INV PLM-PPM-PDN Unauthorized modification of displayed content PLM-PPM-PDN SRM-EBP-APM Unauthorized modification of displayed content in APM CRM-IC-EMS-RUL Unauthorized modification in BSP app in CRM-IC-EMS-RUL PS-CLM Unauthorized modification in ITS-Service in PS-CLM FIN-CGV-MIC Migration to new XSS-Library PS-CON Unauthorized modification in ITS-Service in PS FIN-SEM-CPM Unauthorized modification of displayed content in SEM-CPM SRM-EBP-CAT Unauthorized modification in ITS-Services in BBP EP-PIN-RTC Missing authorization check in RTC BC-WD-CMP-FPM Missing authorization check in BC-WD-CMP-FPM SRM-LA Unauthorized modification of displayed content in SRM-LA CRM-IC-FRW Unauthorized modification in BSP in CRM-IC CRM-IC-SCR Unauthorized modification in BSP in CRM-IC-SCR SRM-EBP-CGS BBP_PM01 ITS service vulnerable to XSS attack FI-AA Unauthorized modificatn of displayed content FI-AA (EA-APPL) CRM-ANA-MKT-CLV Unauthorized modification in BSP appl. in CRM-ANA-MKT-CLV CA-DMS Unauthorized modification of BSP in Webdocuments CRM-ANA Unauthorized modification of BSP in CRM-ANA SRM-EBP-PD Unauthorized modification of displayed content in SRM
12 Appendix: SAP Security Notes, May PPM-PFM Unauthorized modification of displayed content in PPM-PFM IS-A-SWP Unauthorized modification in ITS-Services in SWP CRM-IC-FCA Unauthorized modification of BSP in CRM-IC-FCA SRM-EBP-WFL Unauthorized modificat. of displayed content in SRM-EBP-WFL FIN-BA Unauthorized modification of displayed content in FIN-BA CRM-MD-BP-CCP Unauthorized modification of BSP in CRM-MD-BP-CCP SRM-EBP-PRO Unauthorized modification of stored content in SRM-EBP-PRO SRM-EBP-CA-SIG Unauthorized modification of BSP in SRM-EBP-CA-SIG CRM-IPS-BTX-APL Unauthorized modification of BSPs in CRM Grantor Management QM Unauthorized modification of ITS in QM FIN-FSCM-BD Unauthorized modification of displayed content in FSCM BD CRM-IU Unauthorized change of displayed content in CRM-IU IS-A-SWP Unauthorized modification in ITS-Services in SWP IS-OIL-DS-SSR Unauthorized modification in ITS-Service in IS-OIL-DS-SSR IS-ADEC-BOQ Unauthorized modification in ITS-Service in IS-ADEC-BOQ SRM-SUS SUS: Unauthorized modification in BSP application SRMSUS PA-PA-SG Security: XSS vulnerability in SAP GUI for HTML PPM-PRO Unauthorized modification of displayed content in PPM-PRO PA-PA-AU Security: XSS vulnerability in SAP GUI for HTML CRM-ANA-BOJ-UI Unauthorized modification of BSP in CRM-ANA-BOJ-UI CRM-MKT-ML Unauthorized modification of BSP in CRM-MKT-ML CRM-MKT-MPL Unauthorized modification of BSP in CRM-MKT-MPL CRM-MKT-MPL-TPM- TPO Unauthorized modification of displayed content in TPO CRM-MD-BP-PCU Unauthorized modification of BSP in CRM-MD-BP-PCU PA-PA-IN Security: XSS vulnerability in SAP GUI for HTML BC-SRV-BTF Unauthorized modification of displayed content in BTF-Editor CRM-IPS-ICM-CMG Unauthorized modification of displayed content in ICM CRM-MKT-MPL-CAL Unauthorized modification of display content in MKT Calendar
13 Appendix: SAP Security Notes, May SRM-EBP-ADM-USR Unauthorized modification of ITS in SRM-EBP-ADM-USR IS-HER-CM Unauthorized modification of ITS in IS-HER-CM BW-WHM Update 1 to security note PLM-CFO Update 1 to security note EPM-SA Missing Authorization check in OPMFND PP-MES Missing authorization check in PP-MES SV-SMG-SDD Code injection vulnerability in SV-SMG-SDD CRM-MW-MBX HTTP verb tampering issue in Java MapBox PE-LSO-LPO Security fix for BSP application HCM_LEARNING BC-JAS-ADM-ADM Missing authorization check in NWA BC-BMT-BRM-ENG Explicit Scope Declaration issues in BRMS-CORE
14 Layer Seven Security Layer Seven Security specialize in SAP security. We serve customers worldwide to protect information assets against internal and external threats and comply with industry and statutory reporting requirements. The company fuses technical expertise with business acumen to deliver unparalleled audit, consulting and vulnerability assessment solutions targeted at managing risks associated with contemporary SAP systems. Our consultants have an average of ten years of experience in field of SAP security and proficiency in regulatory compliance including Basel II, GLBA, HIPAA, FISMA, PIPEDA, PCI DSS and SOX. The company is privately owned and headquartered in Toronto, Canada. Address Westbury Corporate Centre Suite Upper Middle Road Oakville, Ontario L6H 0C3, Canada Web Telephone
15 Copyright Layer Seven Security 01 - All rights reserved. No portion of this document may be reproduced in whole or in part without the prior written permission of Layer Seven Security. Layer Seven Security offers no specific guarantee regarding the accuracy or completeness of the information presented, but the professional staff of Layer Seven Security makes every reasonable effort to present the most reliable information available to it and to meet or exceed any applicable industry standards. This publication contains references to the products of SAP AG. SAP, R/3, xapps, xapp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
Layer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes July 01 In July, SAP released a crucial update for a vulnerability in the Archiving Workbench originally patched in February 011. Note 1561545 contains
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes June 01 After the turbulence in May, normal business seems to have been resumed at Waldorf. SAP released just 6 Security Notes in June. Furthermore, there
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes June 01 SAP released several patches for multiple vulnerabilities effecting Sybase EAServer in June. EAServer is used to create, deploy and configure Java
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes January 01 There were several Security Notes released by SAP in January for directory traversal vulnerabilities affecting a number of application areas.
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes November 01 SAP issued a critical bulletin in November to raise awareness of three Security Notes related to SAProuter and a new malware variant that is
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes September 2014 September s corrections included a number of patches for missing authorization checks in critical applications and components, most notably
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes February 01 SAP Security Notes are rarely front page news. The exception was Note 1785761 which was singled out by SAP for a call to action in the Spotlight
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes May 2015 SAP released several significant patches in May for memory corruption vulnerabilities effecting multiple applications and components. Such weaknesses
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes January 01 There were several Security Notes released by SAP in January for directory traversal vulnerabilities affecting a number of application areas.
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes March 2015 SAP released an important announcement on Patch Tuesday in March to spotlight Security Notes 2134905, 2132584, 2125513 and 2108161. The Notes
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes August 2014 SAP released a Hot News fix in August for a critical vulnerability effecting the SAP Afaria Mobile Device Management (MDM) server. Note 2044175
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes July 2015 The most significant Security Note released by SAP in July deals with a critical missing authentication and authorization check in the XP Server
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes June 2014 SAP released an important notification in June to highlight a critical vulnerability in SAP Afaria, the Sybase platform that enables centralized
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes October 2015 SAP released a batch of emergency fixes for the Download Manager (SDM) application through Notes 2235412 and 2233617 in October. The Notes
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes April 2015 The most critical patch released by SAP in April corrected a missing authentication check in Sybase Adaptive Server Enterprise (ASE). ASE is
More informationLayer Seven Security ADVISORY. SAP Security Notes
Layer Seven Security ADVISORY SAP Security Notes August 2017 Note 2381071 patches a critical cross-site Ajax vulnerability in the Prototype JS library of BusinessObjects. Ajax is a method often used by
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes December 2013 SAP announced an important change to the release strategy for security patches in December. In order to respond more rapidly to externally
More informationLayer Seven Security ADVISORY
Layer Seven Security ADVISORY SAP Security Notes November 2014 SAP issued a total of 84 Security Notes in November. Approximately half were Support P a c k a g e N o t e s p roviding s w i t c h a b l
More informationSAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts
SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance
More informationSAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0
Welcome BIZEC Roundtable @ IT Defense, Berlin SAP Security BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0 February 1, 2013 Andreas Wiegenstein CTO, Virtual Forge 2 SAP Security SAP security is a complex
More informationAbout the company. What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle).
About the company 2 What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle). Agenda 3 Building a business case for SAP Vulnerability Management How to start
More informationAttacks based on security configurations
SAP Security 2014 Protecting Your SAP Systems Against Attacks based on security configurations Juan Perez-Etchegoyen jppereze@onapsis.com March 18 th, 2014 BIZEC Workshop Disclaimer This publication is
More informationInception of the SAP Platform's Brain Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen Etchegoyen jppereze@onapsis.com September 20 th, 2012 Ekoparty, Buenos Aires Disclaimer This publication is copyright
More informationSAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide
SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide SAP BusinessObjects XI3.1 Service Pack 4 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet,
More informationSAP Branch Agreement Origination V3.703: Software and Delivery Requirements
RDS BAO V3.703 May.2015 English Branch Agreement Origination V3.703: Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2 Date Copyright 2015 SE or
More informationTrigger-Based Data Replication Using SAP Landscape Transformation Replication Server
Installation Guide SAP Landscape Transformation Replication Server Document Version: 1.6 2017-06-14 CUSTOMER Trigger-Based Data Replication Using SAP Landscape Transformation Replication Server - For SAP
More informationObtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2)
Preparation Obtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2) 1. Reference the help for your UI5 application name 2. Launch SAP transaction SICF and enter
More informationPreventing vulnerabilities in HANAbased MARCH TROOPERS SECURITY CONFERENCE
Preventing vulnerabilities in HANAbased deployments MARCH 2016 - TROOPERS SECURITY CONFERENCE Disclaimer This presentation contains references to the products of SAP SE. SAP, R/3, xapps, xapp, SAP NetWeaver,
More informationDisclosure Management US SEC. Preview
Disclosure Management US SEC Preview TABLE OF CONTENT Introduction... 3 Creating the Preview... 4 Troubleshooting... 8 Alternative way of creating the Preview... 10 Useful Notes/KBAs... 14 2 Introduction
More informationQuality Inspection Engine (QIE) Security Guide
D O N. Q I E _ S E C G U I D E Quality Inspection Engine (QIE) Security Guide S AP E n h a n c e m e n t P a c k age 5 f o r S AP E R P 6. 0 Copyright Copyright 2010 SAP AG. All rights reserved. No part
More informationSAP BusinessObjects Enterprise Upgrade Guide
SAP BusinessObjects Enterprise Upgrade Guide SAP BusinessObjects Enterprise XI 3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business
More informationSAP Audit Guide for Basis
SAP Audit Guide for Basis This audit guide is designed to assist the review of middleware components that support the administration and integration of SAP applications, commonly referred to as SAP Basis.
More informationBW Text Variables of Type Replacement Path
BW Text Variables of Type Replacement Path Applies to: This article is applicable to SAP BI 7.0. For more information, visit the EDW homepage. Summary This document shows how to use and also helps in the
More informationCoreMax Consulting s Cyber Security Roadmap
CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows
More informationHow the Standard Integration between SAP EM and SAP TM Can Be Tested with SE37
How the Standard Integration between SAP EM and SAP TM Can Be Tested with SE37 Author: Daniel Härder Document Date: 04.02.2013 TABLE OF CONTENTS SUMMARY... 3 TESTING EM TM INTEGRATION WITH SE37... 3 DEFINING
More informationSAP Discovery System V5 Users and Passwords
SAP Discovery System V5 s and s SAP DISCOVERY SYSTEM V5 TABLE OF CONTENT SAP DISCOVERY SYSTEM USERS AND PASSWORDS... 3 PURPOSE... 3 USERS AND PASSWORDS... 3 1. OPERATING SYSTEM USERS AND PASSWORDS... 3
More informationADM920 SAP Identity Management
ADM920 SAP Identity Management. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
More informationCopyright
1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?
More informationSAP Security In-Depth
SAP Security In-Depth by Mariano Nunez Vol. 5 / May 2012 Abstract "SAP platforms are only accessible internally". While that was true in many organizations more than a decade ago, today, driven by modern
More informationDisclosure Management. Default font on styles in Disclosure Management
Disclosure Management Default font on styles in Disclosure Management DISCLOSURE MANAGEMENT DEFAULT FONT IS STYLES (V1.1) TABLE OF CONTENT Introduction... 3 An example... 3 What happens in the system...
More informationINTERNAL USE ONLY SAP BusinessObjects EPM Add-in for Microsoft Office Support Package 17 / Patch XX Installation Procedure
SAP BusinessObjects EPM solutions, add-in for Microsoft Office Document Version: 10.0 Support Package 17 / Patch XX - 2014-03-17 INTERNAL USE ONLY SAP BusinessObjects EPM Add-in for Microsoft Office Support
More informationWeb Applications Part 1 The Weak Link in Information Security Your Last Line of Defense
Web Applications Part 1 The Weak Link in Information Security Your Last Line of Defense Anthony Lim MBA FCITIL CISSP CSSLP Director, Security Rational Software - Asia Pacific 1 Hong Kong 17 Nov 2009 Welcome
More informationBusiness Objects Integration Scenario 2
SAP AG May 2010 - Prerequisites Abstract This presentation provides a step by step description how to create an Xcelsius dashboard based on a BI Query (using the SAP NetWeaver BW connection). Prerequisites
More informationSAP BusinessObjects Performance Management Deployment Tool Guide
SAP BusinessObjects Performance Management Deployment Tool Guide SAP BusinessObjects XI 3.1 XI3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,
More informationSAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011
SAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011 August 18th, 2011 Product Availability Matrix (PAM) Dashboard Design 2011 / Presentation Design
More informationUse Business Objects Planning and Consolidation (version for the Microsoft platform) BPF services in Xcelsius
How To Use Business Objects Planning and Consolidation (version for the Microsoft platform) BPF services in Xcelsius SAP Product Name: SAP Business Planning and Consolidation, version for Microsoft Applicable
More informationSAP Sybase Replication Server Change DATA Capture Configuration. Example Configuration
SAP Sybase Replication Server Change DATA Capture Configuration Example Configuration TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Scope... 3 1.2 Purpose... 3 2 CONFIGURATION... 4 2.1 Requeriments... 4 2.2
More informationSAP Plant Connectivity 2.2
SAP Plant Connectivity 2.2 PCo Functions / Destinations Release 2.2 Function / Destination Bidirectional Queries Software Development Kit (SDK) for custom agents RFC Destination to EWM RFC Destination
More informationPassing Parameters via Web Dynpro Application
Applies to: SAP ABAP Workbench that supports Web Dynpro development. For more information, visit the Web Dynpro ABAP homepage. Summary This article explains how to pass parameters via Web Dynpro Application.
More informationUsing Xcelsius 2008 with SAP NetWeaver BW
Using Xcelsius 2008 with SAP NetWeaver BW Applies to: Xcelsius 2008 Enterprise Service Pack 02 (and higher) SAP NetWeaver BW 7.0 Enhancement package 01 Service Pack 05 (and higher) Summary In this short
More informationSoftware and Delivery Requirements
SAP HANA Activity Repository rapiddeployment solution V2.10 April 2015 English SAP HANA Activity Repository rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
More informationSOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management
SOLUTION BRIEF CA API MANAGEMENT Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management 2 SOLUTION BRIEF ENABLE AND PROTECT YOUR WEB APPLICATIONS WITH CA API MANAGEMENT ca.com
More informationSAP Crystal Reports Viewer 2011 Release Notes
SAP Crystal Reports Viewer 2011 Release Notes 07/12/2010 Copyright: 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products
More informationQuick View Insider: How Do I Set Quick View as SNC s Entry Screen?
Quick View Insider: How Do I Set Quick View as SNC s Entry Screen? Applies to: SAP SNC (Supply Network Collaboration) release 7.0 enhancement pack 1. SAP SNC release 7.0 For more information, visit the
More informationMessage Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended
Message Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended Applies to SAP NetWeaver PI Advanced Adapter Engine Extended 7.30. Summary This article explains how to set up Message Alerting for
More informationCrystal Reports 2008 FixPack 2.4 Known Issues and Limitations
Crystal Reports 2008 FixPack 2.4 Known Issues and Limitations 1/5 Copyright Copyright 2010 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any
More informationADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)
ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2013 SAP AG. All rights reserved. No part of this publication
More informationSetup an NWDI Track for Composition Environment Developments
How-to Guide SAP NetWeaver 7.0 How To Setup an NWDI Track for Composition Environment Developments Version 2.00 January 2008 Applicable Releases: SAP NetWeaver 7.0 SP13 (Custom Development & Unified Life-Cycle
More informationSizing SAP Master Data Governance 9.0
Sizing Guide Document Version: 1.0 2016-12-14 Disclaimer Some components of this product are based on Java. Any code change in these components may cause unpredictable and severe malfunctions and is therefore
More informationADM950. Secure SAP System Management COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)
ADM950 Secure SAP System Management. COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may be reproduced
More informationUI Changes for SAP Portfolio and Project Management Depending on NW Release
UI Changes for SAP Portfolio and Project Management Depending on NW Release TABLE OF CONTENTS CHANGES IN RENDERING OF SAP PORTF. AND PROJ MGMT. WITH UI GUIDELINE 2.0... 3 Toolbars in Tables... 3 Toolbars
More informationExcerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt
Excerpts of Web Application Security focusing on Data Validation adapted for F.I.S.T. 2004, Frankfurt by fs Purpose of this course: 1. Relate to WA s and get a basic understanding of them 2. Understand
More informationDashboards Batch Utility User Guide
Dashboards Batch Utility User Guide Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and
More informationSolutions Business Manager Web Application Security Assessment
White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security
More informationSAP Directory Content Migration Tool
This document describes SAP directory content migration which is used for migration and mass change functionality for PI scenarios and channels from Dual Stack to Single Stack system. This document explains
More informationSAP Afaria Post- Installation Part 1
SAP Afaria 6.6FP1 March 2011 English Version 1.1 {03/29/2011:Changed the header to: Afaria Post- Installation Shival Tailor} SAP Afaria Post- Installation Part 1 Document for Afaria Post - Installation
More informationHow to Setup Notifications in Fiori 2.0 Step-by-Step
How to Setup Notifications in Fiori 2.0 Step-by-Step SAP S/4HANA 1610 Wilson Wei 2017 SAP AG. All rights reserved. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork,
More informationCyber Security Audit & Roadmap Business Process and
Cyber Security Audit & Roadmap Business Process and Organizations planning for a security assessment have to juggle many competing priorities. They are struggling to become compliant, and stay compliant,
More informationApplication and Data Security with F5 BIG-IP ASM and Oracle Database Firewall
F5 White Paper Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall Organizations need an end-to-end web application and database security solution to protect data, customers,
More informationDifferent Types of iviews in Enterprise Portal 7.0
Different Types of iviews in Enterprise Portal 7.0 Applies to: This Article applies to Enterprise Portal 7.0. For more information, visit the Portal and Collaboration homepage. Summary This document covers
More informationSAP BusinessObjects Dashboards 4.0 SP04 SAP Crystal Dashboard Design 2011 SP04 SAP Crystal Presentation Design 2011 SP04
SAP BusinessObjects Dashboards 4.0 SP04 SAP Crystal Dashboard Design 2011 SP04 SAP Crystal Presentation Design 2011 SP04 Product Availability Matrix (PAM) June 29th, 2012 SAP BusinessObjects Dashboards
More informationCube Designer User Guide SAP BusinessObjects Financial Consolidation, Cube Designer 10.0
Cube Designer User Guide SAP BusinessObjects Financial Consolidation, Cube Designer 10.0 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects
More informationHow to Use Context Menus in a Web Dynpro for Java Application
How to Use Context Menus in a Web Dynpro for Java Application Applies to: Web Dynpro for Java 7.11. For more information, visit the Web Dynpro Java homepage. Summary This tutorial explains the Web Dynpro
More informationSAP Landscape Transformation for SAP HANA (HA1)
SAP HANA 1.0 SP05 SAP Landscape Transformation SP04 October 2013 English SAP Landscape Transformation for SAP HANA (HA1) Building Block Configuration Guide SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany
More informationHow to Integrate Microsoft Bing Maps into SAP EHS Management
How to Integrate Microsoft Bing Maps into SAP EHS Management Applies to: Component Extension 1.0 for SAP Environment, Health, and Safety Management. For more information, visit the Sustainability homepage.
More informationHow to Set Up and Use Electronic Tax Reporting
How-To Guide SAP Business One 8.82 PL09 and higher Document Version: 1.0 2012-10-01 Country: Netherlands Typographic Conventions Type Style Example Description Words or characters quoted from the screen.
More informationData Handling in the SAP NetWeaver System Landscape Directory Step by Step
Data Handling in the SAP NetWeaver System Landscape Directory Step by Step Applies to: SAP NetWeaver System Landscape Directory (SLD). In this document all main SLD's mechanisms to retrieve and distribute
More informationADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day
ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may
More informationVisual Composer for SAP NetWeaver Composition Environment - Connectors
Visual Composer for SAP NetWeaver Composition Environment - Connectors Applies to: Visual Composer for SAP enhancement package 1 for SAP NetWeaver Composition Environment 7.1 For more information, visit
More informationHow to Find Suitable Enhancements in SAP Standard Applications
How to Find Suitable Enhancements in SAP Standard Applications Applies to: User Exits, Customer Exits, Business Add-Ins. For more information, visit the ABAP homepage. Summary ABAP developers will often
More informationAutomatic Deletion of Similar/Identical Requests from InfoCube after Update
Automatic Deletion of Similar/Identical Requests from InfoCube after Update Applies to: SAP BW 3.5/Business Intelligence 7.0 Summary This document explains the concept of automatic deletion of the overlapping
More informationCreate and run apps on HANA Cloud in SAP River RDE
SAP River Rapid Development Environment How-To Guide Provided by Customer Experience Group Create and run apps on HANA Cloud in SAP River RDE Applicable Releases: SAP River Rapid Development Environment
More informationScott Lowden SAP America Technical Solution Architect
SAP NetWeaver Training Overview - SAP Web Application Server Scott Lowden SAP America Technical Solution Architect SAP NetWeaver Components Detail SAP Web Application Server SAP AG 2003, Title of Presentation,
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue
More informationImplementing Business Objects in CAF and Developing Web Dynpro Application
Implementing Business Objects in CAF and Developing Web Dynpro Application Applies to: SAP Net Weaver CE 7.1.1 EHP1 (SP0, SP1, SP2 sand SP3). For more information, visit the Web Dynpro Java homepage. Summary
More informationWork with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006
How-to Guide SAP NetWeaver 04s How To Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006 Applicable Releases: SAP NetWeaver 04s SPS07 or greater Copyright 2006 SAP AG. All rights
More informationPortal Integration Kit User's Guide for SAP BusinessObjects Portlets
Portal Integration Kit User's Guide for SAP BusinessObjects Portlets SAP BusinessObjects Enterprise XI 3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge,
More informationEP350. Innovated Content Management and Collaboration COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)
EP350 Innovated Content Management and Collaboration. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication
More informationORACLE USER PRODUCTIVITY KIT PROFESSIONAL V6.3 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3)
ORACLE USER PRODUCTIVITY KIT PROFESSIONAL V6.3 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3) KEY FEATURES FEATURES OF ORACLE USER PRODUCTIVITY KIT Single, synchronized authoring session for
More informationFunctional Upgrade NetWeaver 7.0 BI - Java
DSAG - JAHRESKONGRESS `07 Functional Upgrade NetWeaver 7.0 BI - Java Roland Kramer, Platform Advisor, Office of the CTO EMEA, SAP AG Business Intelligence with SAP NetWeaver 7.0 DSAG-Jahreskongress 2007,
More informationInformation Design Tool User Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 4
Information Design Tool User Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 4 Copyright 2012 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,
More informationBC400 Introduction to the ABAP Workbench
BC400 Introduction to the ABAP Workbench. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be
More informationArchitecture Figure 3.
The popularity of SAP EP and its availability on the Internet makes it a desirable entry point for hackers who are choosing the spot to attack companies of various size and industry. Let s take a look
More informationVisual Business Configuration with SAP TM
SAP Transportation Management Visual Business Configuration with SAP TM CUSTOMER Document Version: 3.0 December 2013 SAP AG 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document
More informationMCAFEE FOUNDSTONE FSL UPDATE
2018-JAN-15 FSL version 7.5.994 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary
More informationQuick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment
SAP HANA 1.0 Predictive Analysis 1.0 August 2013 English Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment solution for Retail (EN) SAP AG Dietmar-Hopp-Allee 16 69190
More informationC1: Define Security Requirements
OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security
More informationBuilding a Real-time Dashboard using Xcelsius and Data Integrator
Building a Real-time Dashboard using Xcelsius and Data Integrator Applies to: BusinessObjects Data Integrator XI (11.7) Summary This white paper shows how to use certain features of Data Integrator (DI)
More informationSPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN
SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS
More informationQuick View Insider: How Can I Change the Colors? (SNC 7.0)
Quick View Insider: How Can I Change the Colors? (SNC 7.0) Applies to: SAP SNC (Supply Network Collaboration) release 7.0 For more information, visit the Supply Chain Management homepage. Summary This
More information