ADM950. Secure SAP System Management COURSE OUTLINE. Course Version: 10 Course Duration: 2 Day(s)

Similar documents
BIT460. SAP Process Integration Message Mapping COURSE OUTLINE. Course Version: 15 Course Duration: 3 Day(s)

EWM125. Labor Management in SAP EWM COURSE OUTLINE. Course Version: 16 Course Duration: 4 Hours

ADM950. Secure SAP System Management COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

PLM210. Master Data Configuration in SAP Project System COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

BC100. Introduction to Programming with ABAP COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

AC507. Additional Functions of Product Cost Planning COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

MDG100 Master Data Governance

ADM100 AS ABAP - Administration

DEV523 Customizing and Extending PowerDesigner

DS50. Managing Data Quality with SAP Information Steward COURSE OUTLINE. Course Version: 10 Course Duration: 2 Day(s)

ADM900 SAP System Security Fundamentals

BOCE20. SAP Crystal Reports for Enterprise: Advanced Report Design COURSE OUTLINE. Course Version: 15 Course Duration: 3 Day(s)

BC430 ABAP Dictionary

BOC320. SAP Crystal Reports - Business Reporting and Report Processing Strategies COURSE OUTLINE. Course Version: 15 Course Duration: 3 Day(s)

NET311. Advanced Web Dynpro for ABAP COURSE OUTLINE. Course Version: 10 Course Duration: 4 Day(s)

BC410. Programming User Dialogs with Classical Screens (Dynpros) COURSE OUTLINE. Course Version: 10 Course Duration: 3 Day(s)

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

BOC310. SAP Crystal Reports: Fundamentals of Report Design COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

BC400 Introduction to the ABAP Workbench

EDB358. System and Database Administration: Adaptive Server Enterprise COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

BC480 PDF-Based Print Forms

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day

TBIT44 PI Mapping and ccbpm

HA150 SQL Basics for SAP HANA

EDB785 SAP IQ Administration

BC405 Programming ABAP Reports

BC400. ABAP Workbench Foundations COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

EDB367. Powering Up with SAP Adaptative Server Enterprise 15.7 COURSE OUTLINE. Course Version: 10 Course Duration: 2 Day(s)

BC404. ABAP Programming in Eclipse COURSE OUTLINE. Course Version: 15 Course Duration: 3 Day(s)

GRC100. GRC Principles and Harmonization COURSE OUTLINE. Course Version: 10 Course Duration: 2 Day(s)

BC490 ABAP Performance Tuning

AFA461 SAP Afaria 7.0 System Administration (SP03)

ADM920 SAP Identity Management

EP350. Innovated Content Management and Collaboration COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

EDB116. Fast Track to SAP Adaptive Server Enterprise COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

BW310. BW - Enterprise Data Warehousing COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

EDB377. Fast Track to SAP Replication Server Administration COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

EP200. SAP NetWeaver Portal: System Administration COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

BC401. ABAP Objects COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

SMP541. SAP Mobile Platform 3.0 Native and Hybrid Application Development COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

SMP521. SAP Mobile Platform - Native and Hybrid Application Development COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

TBW60. BW: Operations and Performance COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

TBIT40 SAP NetWeaver Process Integration

NET312. UI Development with Web Dynpro for ABAP COURSE OUTLINE. Course Version: 10 Course Duration: 4 Day(s)

Duet Enterprise: Tracing Reports in SAP, SCL, and SharePoint

TBW30 SAP BW Modeling & Implementation

SAP BusinessObjects Predictive Analysis 1.0 Supported Platforms

SAP NetWeaver Identity Management Identity Center Minimum System Requirements

Single Sign-on For SAP NetWeaver Mobile PDA Client

SAP AddOn Quantity Distribution. by Oliver Köhler, SAP Germany

Manual Activities of SAP Note Globalization Services, 2012/06/05

How to Handle the System Message in SAP NetWeaver Mobile 7.1

Configuring relay server in Sybase Control Center

HA200 SAP HANA Installation & Operations SPS10

How to Enable Single Sign-On for Mobile Devices?

Duplicate Check and Fuzzy Search for Accounts and Contacts. Configuration with SAP NetWeaver Search and Classification (TREX) in SAP CRM WebClient UI

Visual Composer Modeling: Data Validation in the UI

How to Find Suitable Enhancements in SAP Standard Applications

Enterprise Search Extension for SAP Master Data Governance

Crystal Reports 2008 FixPack 2.4 Known Issues and Limitations

Visual Composer for SAP NetWeaver Composition Environment - Connectors

Quick View Insider Microblog: Why Is There No Inbox?

How to Download Software and Address Directories in SAP Service Marketplace

Visual Composer Modeling: Migrating Models from 7.1.X to 7.2.0

Installing SAP NetWeaver Mobile Client (eswt) on a Storage Card

How to reuse BRFplus Functions Similar to R/3 Function Modules using BRF+ Expression Type Function Call

How to Set Up Data Sources for Crystal Reports Layouts in SAP Business One, Version for SAP HANA

Quick View Insider: Understanding Quick View Configuration

Testing Your New Generated SAP NetWeaver Gateway Service

Using JournalEntries and JournalVouchers Objects in SAP Business One 6.5

Message Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended

SAP Afaria Post- Installation Part 1

Quick View Insider: How Can I Change the Colors? (SNC 7.0)

BW Text Variables of Type Replacement Path

SAP Plant Connectivity 2.2

Using Default Values in Backend Adapter

How to Work with Analytical Portal

How to Check or Derive an Attribute Value in MDG using BRFPlus

SAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011

Visual Composer s Control Types

How to Guide to create Sample Application in IOS using SUP ODP 2.2

SAP ME Build Tool 6.1

The Dbmlsync API. A whitepaper from Sybase ianywhere Author: Joshua Savill, Product Manager Date: October 30 th, 2008

LO Extraction - Part 6 Implementation Methodology

Working with Data Sources in the SAP Business One UI API

Building a Real-time Dashboard using Xcelsius and Data Integrator

Quick View Insider: How Do I Set Quick View as SNC s Entry Screen?

Web Dynpro: Column Coloring in ALV

Remote Monitoring User for IBM DB2 for LUW

Upgrade MS SQL 2005 to MS SQL 2008 (R2) for Non-High-Availability NW Mobile ABAP System

Extending DME Transfer Files According to Spanish Banking Control Council to Support Non- Euro Payments

What s New / Release Notes SAP Strategy Management 10.1

Business Reasons For Mobilizing Oracle Databases Using SQL Anywhere. A whitepaper from Sybase ianywhere

BIT601. SAP Workflow - Build and Use COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

Building Blocks of the SAP Fiori Launchpad. An introduction to all the components that comprise the Fiori Launchpad

Architecture of the SAP NetWeaver Application Server

Personalizing SAP BusinessObjects Explorer Information Spaces

Business Objects Integration Scenario 2

Obtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2)

How to Package and Deploy SAP Business One Extensions for Lightweight Deployment

Transcription:

ADM950 Secure SAP System Management.. COURSE OUTLINE Course Version: 10 Course Duration: 2 Day(s)

SAP Copyrights and Trademarks 2013 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iseries, pseries, xseries, zseries, eserver, z/vm, z/os, i5/os, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company. Sybase and Adaptive Server, ianywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company.

All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. Copyright. All rights reserved. iii

iv Copyright. All rights reserved.

About This Handbook This handbook is intended to complement the instructor-led presentation of this course, and serve as a source of reference. It is not suitable for self-study. Typographic Conventions American English is the standard used in this handbook. The following typographic conventions are also used. This information is displayed in the instructor s presentation Demonstration Procedure Warning or Caution Hint Related or Additional Information Facilitated Discussion User interface control Example text Window title Example text Copyright. All rights reserved. v

vi Copyright. All rights reserved.

Contents ix Course Overview 1 Unit 1: Introduction to Internal Security Auditing 1 Lesson: Getting an Overview of Security Auditing 3 Unit 2: Customization and Usage of Audit Information System (AIS) 3 Lesson: Configuring the Audit Information System (AIS) 3 Lesson: Using the Audit Information System (AIS) 5 Unit 3: Users and Authorizations Audit 5 Lesson: Customizing the Role Maintenance Tools in SAP Solutions 5 Lesson: Securing User and Group Administration 5 Lesson: Securing Critical Authorization 5 Lesson: Securing the System by Logon-Related Parameters 7 Unit 4: System Audit 7 Lesson: Configuring and Using the Security Audit Log 7 Lesson: Securing System Administration Services 9 Unit 5: Repository and Table Audit 9 Lesson: Using Logs to Monitor the Application 11 Unit 6: Security in Change Management 11 Lesson: Securing Change Management 13 Unit 7: Security Assessment 13 Lesson: Using SAP Security Optimization Self-Service 13 Lesson: Using SAP Security Notes 13 Lesson: Implementing and Checking Technical Security Recommendation Copyright. All rights reserved. vii

viii Copyright. All rights reserved.

Course Overview TARGET AUDIENCE This course is intended for the following audiences: Development Consultant Systems Architect System Administrator Copyright. All rights reserved. ix

x Copyright. All rights reserved.

UNIT 1 Introduction to Internal Security Auditing Lesson 1: Getting an Overview of Security Auditing Give an overview of security auditing Copyright. All rights reserved. 1

Unit 1: Introduction to Internal Security Auditing 2 Copyright. All rights reserved.

UNIT 2 Customization and Usage of Audit Information System (AIS) Lesson 1: Configuring the Audit Information System (AIS) Explain the Audit Information System (AIS) Set up the AIS Lesson 2: Using the Audit Information System (AIS) Use the Audit Information System (AIS) Copyright. All rights reserved. 3

Unit 2: Customization and Usage of Audit Information System (AIS) 4 Copyright. All rights reserved.

UNIT 3 Users and Authorizations Audit Lesson 1: Customizing the Role Maintenance Tools in SAP Solutions Explain the creation of authorization by the role maintenance tool Customize the role maintenance tool in SAP solutions Lesson 2: Securing User and Group Administration Secure user and group administration Examine authorizations Lesson 3: Securing Critical Authorization Verify critical authorization Lesson 4: Securing the System by Logon-Related Parameters Check logon-related parameters Copyright. All rights reserved. 5

Unit 3: Users and Authorizations Audit 6 Copyright. All rights reserved.

UNIT 4 System Audit Lesson 1: Configuring and Using the Security Audit Log Explain the Security Audit Log Check the Customization for the Security Audit Log Lesson 2: Securing System Administration Services Secure background services Secure spool and other administration services Copyright. All rights reserved. 7

Unit 4: System Audit 8 Copyright. All rights reserved.

UNIT 5 Repository and Table Audit Lesson 1: Using Logs to Monitor the Application Use application logs Use WebFlow logs Use logs for changes to table data Use logs in user and authorization data Copyright. All rights reserved. 9

Unit 5: Repository and Table Audit 10 Copyright. All rights reserved.

UNIT 6 Security in Change Management Lesson 1: Securing Change Management Outline change management Configure the system landscape for changes Outline secure transports Protect security-critical objects Copyright. All rights reserved. 11

Unit 6: Security in Change Management 12 Copyright. All rights reserved.

UNIT 7 Security Assessment Lesson 1: Using SAP Security Optimization Self-Service Use the SAP Security Optimization Self-Service Lesson 2: Using SAP Security Notes Use SAP security notes Lesson 3: Implementing and Checking Technical Security Recommendation Use SAP Solution Manager to secure systems Copyright. All rights reserved. 13