HOWTO SAP SECURITY OPTIMIZATION WITH SAP SOLUTION MANAGER



Similar documents
How to Guide SAP Security Optimization Self-Service

Business Online Banking ACH Reference Guide

Crystal Print Control Installation Instructions for PCs running Microsoft Windows XP and using the Internet Explorer browser

Schools Remote Access Server

Process Document Approve Payable Time

Remote Storage Area (RSA) Basics

Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders

How to install and use the File Sharing Outlook Plugin


MS Outlook 2002/2003. V1.0 BullsEye Telecom

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

ADA Applicant Business Process Guide

Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7

Shasta College SharePoint Tutorial. Create an HTML Form

mystanwell.com Installing Citrix Client Software Information and Business Systems

GeneSys. Unit Six.Two: Administering a 360 Project. genesysonline.net. psytech.com

MyNetFone Virtual Fax. Virtual Fax Installation

Create and Manage Discussion Forums and Threads

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

How To Connect Your Transactions To Quickbooks Online From Your Bank Or Credit Card Account On A Pc Or Mac Computer Or Ipa Device

Blackboard Learn 9.1 Screencast Collaboration Tools in Blackboard 9.1

Remote Viewer Recording Backup

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

THE CHILDREN S HEALTH NETWORK CONTRACTING TOOL TRAINING MANUAL

Pharmacy Affairs Branch. Website Database Downloads PUBLIC ACCESS GUIDE

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

Working With Your FTP Site

Managing Documents in the Citrix XenApp Remote Desktop

Pacific Premier Bank s Business e- Banking Getting Started Guide with QuickBooks for Windows

SharePoint How To s / Team Sites 1of 6

Online Change of Major: Student Instructions

Converting Microsoft Access 2002 to Pipe-Delimited ASCII Text Files

Configuring your client to connect to your Exchange mailbox

ebookstorage.org Download 1001 Free Ebook

ICP Data Entry Module Training document. HHC Data Entry Module Training Document

USING MS OUTLOOK WITH FUS

Remedy ITSM Service Request Management Quick Start Guide

**Web mail users: Web mail provides you with the ability to access your via a browser using a "Hotmail-like" or "Outlook 2003 like" interface.

MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT S

Java. How to install the Java Runtime Environment (JRE)

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

FileZilla: Uploading/Downloading Files to SBI FTP

Global Image Management System For epad-vision. User Manual Version 1.10

Re-associating.ica file extension on Vista/Windows 7 machines

ParishSOFT Remote Installation

Maximizing the Use of Slide Masters to Make Global Changes in PowerPoint

USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Generating Open For Business Reports with the BIRT RCP Designer

Open a PDF document using Adobe Reader, then click on the Tools menu on the upper left hand corner.

User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date

Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source

Install MS SQL Server 2012 Express Edition

MICROSOFT OUTLOOK 2011 ORGANIZE MESSAGES

Lab 1: Windows Azure Virtual Machines

How To Use Textbuster On Android (For Free) On A Cell Phone

Installing S500 Power Monitor Software and LabVIEW Run-time Engine

Microsoft Office Access 2007 Basics

Schools CPD Online General User Guide Contents

FXCC MetaTrader 4 user guide

Having Fun with QNAP and your Home Automation

Frog VLE Update. Latest Features and Enhancements. September 2014

Self Service Time Entry Time Only

PubMed My NCBI: Saving Searches & Creating Alerts

Creating Student List from Agresso

How to recover IE Client

Page 1 of 14. MyAerospace. Order Status. Notifications

Web File Management with SSH Secure Shell 3.2.3

WebViewer User Guide. version PDFTron Systems, Inc. 1 of 13

How-to Guide: Creating a Mobile Website Using bmobilized

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

How to Configure Windows 8.1 to run ereports on IE11

QuickBooks 2016 Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group

Page Numbering for a Thesis or Dissertation

Remedy ITSM Service Request Management Quick Start Guide

P39 Financial USER MANUAL. Honor the Lord with your wealth, with the first fruits of your crops; Proverbs 3:9. Revision: 1

Service Desk R11.2 Upgrade Procedure - How to export data from USD into MS Excel

Knowledge Base Articles

GRS Advantage Website User Reference Guide

USING MS OUTLOOK. Microsoft Outlook

Guidelines for Creating Reports

OUTLOOK 2007 USER GUIDE

VPN User Guide. For Mac

Integrated Research Application System (IRAS)

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

Division of Student Affairs Quota Practices / Guidelines

1. What are popups? What if I have a problem with viewing popups? 1

Creating a Participants Mailing and/or Contact List:

Using the SimNet Course Manager

In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements.

Employee Guide to Web Time Entry (WTE) Employee s Guide to Web Time Entry (WTE) Page 1 of 14 12/09/08

Avaya Network Configuration Manager User Guide

ELECTRONIC DATA PROCESSOR (EDP) QUICKSTART FOR DATA PROVIDERS

Knowledgebase Article

Grand Blanc Community Schools

ProperSync 1.3 User Manual. Rev 1.2

This guide provides step by step instructions for using the IMF elibrary Data - My Data area. In this guide, you ll learn how to:

Citrix Client Install Instructions

Transcription:

HOWTO SAP SECURITY OPTIMIZATION WITH SAP SOLUTION MANAGER This document describes how to use the SAP Security Optimization Self Service in your local Solution Manager. Please also refer to SAP Notes 837490 and 696478 for further information www.service.sap.com/notes

1 SECURITY OPTIMIZATION WITH SAP SOLUTION MANAGER 1 Preconditions The system that should be tested needs to be prepared for Early Watch Alert sessions as the Early Watch Alert download is also the basis for the Security Optimization Service. Please check the SAP notes 837490 and 696478 before you start. A specific authorization has to be set up in the target system before you can collect the data for the Security Optimization Service 1 Creation of the Security Optimization Session Create an instance of a Security Optimization Session in your Solution Landscape. Solution: 1. Connect to the solution manager system and call the Solution Manager using the transaction code SOLUTION_MANAGER or using the correspondent entry in the Easy Access Menu. 2. Select your solution where you want to run the service.

3. Select Operations in the navigation bar on the left 4. Select Service Plan Sessions in the header menu of the main window. (The menu Service Plan has been renamed to Continuous Improvement in the latest Solution manager version.) 5. Select Create Service using the button on the right in the main window. 2 6. Mark the services SAP Security Optimization - Self Service and SAP Security Optimization - Self Service Questionnaire (scroll down to the bottom of the list)

7. Scroll back to the top of the list of the available services and select Create. Confirm the proposed date (current date). 3 You can then see the created Security Optimization Services in the service plan of your solution. Now a request is sent to the target system to create an Early Watch Alert download and send it back to the solution manager. This download is used to build up the service session and some profile parameter data is used for a part of the security checks. As soon as the sandglass disappears the download is available and you can continue with the next steps

4 2 Only if you want to add own authorization checks: Check the definition of the customer specific authorization checks. If you use the ST-A/PI Plug-In in his F-Version (ST-A/PI 01F*) you need to implement f SAP Note 873038 to use the customer specific checks. This is not necessary for later versions of the Plug In Solution: 1. In the satellite system call the transaction ST13 2. Select the tool SOS_CUSTOMER_DATA and press Execute 3. Do not select the SAP Entries in the next screen to have a better overview. 4. You will find an example of a check looking for users who are allowed to delete table change protocols.

5 3. Creation of the ST14 Download in the analyzed system Create the ST14download in the system that should be analyzed with the Security Optimization Service and send it to the Solution Manager. Solution: 1. Connect to the satellite system and call transaction ST14 2. Select the application Security Optimization 3. Press the pushbutton Schedule job 4. Complete the input parameters of the selection screen as described in the picture below (The input parameters are also explained in SAPNote 696478.) and press Schedule job.

5. In the main menu of transaction ST14 select Utilities Analysis browser 6. When the data collection has ended the status of the analysis will switch from INPROCESS to COMPLETED (There is no automatic refresh. You will need to call the analysis browser again to refresh the status). You can also use the job overview in the ST14 menu Utilities Job overview to survey jour job. The proposed default parameters for the job selection can be used. 7. If the job has finished after 2 or 3 seconds you probably did not have the authorization described in SAPNote 696478. Please check in the analysis browser using the pushbutton View data if the analysis tree of the GUID contains data. The size of the collected data is several KB minimum. 8. In the analysis browser make sure that the Solution Manager is selected as Remote system and send the analysis to the Solution Manager using the Send push button. Confirm the two dialog popups using the Send and the OK button. 6

4. Completing the Questionnaire for the Service Session The Questionnaire is used to influence the content and the look of the resulting service report. Include all known users with special authorizations (System Administrators, User Administrators, Key Users, etc.) so that they are excluded from the service report. Select the clients that should be checked Decide if the user names should appear on the report. Solution: 1. In your Solution Manager session: Double click on the session SAP Security Optimization - Self Service Questionnaire. 2. Check if the selected applications are correct (in our case only the application R/3 WebAs should be selected) and press Save. The questions corresponding to the selected applications show up when you open the corresponding sub tree in the menu on the left hand side. 7 3. Complete the questions

8 5. Include the ST14 download in your analysis session and create the service report Now we open the service session and create the service report. Solution: 1. In your Solution Manager session: Double click on the session SAP Security Optimization - Self Service. 2. Select the check Collect ST14 data into session. 3. Call the analysis browser with the push button Analysis browser and search for the correct GUID. Then Copy and Paste the GUID into the GUID field of the check table. You can now close the analysis browser again. (If you know the GUID you can also copy it directly into the check table without calling the Analysis Browser.) 4. Press Done. 5. Go to check Read St14 Download, set the flag in the column Execute in from of your GUID and press Save

9 6. The session should now look like this: 7. Now you can generate the service report using the push button Word Document. MS Word will start and the document will be generated. Please be patient until the report generation is finished.