Urgent Assignment Help

Report on Sap security

    Task 1 Specifications – Analyze SAP Security Audit Log Data.
    You are provided with a data file – Userdata.xls.
    Userdata.xls is a summarized record of user activity on a client’s SAP system. Each record contains the following fields:
    USERID
    YYYYMM
    TCODE
    TEXT
    TCODESTAT
    TCD
    TSTATUS
    TCOUNT
    TTEXT
    YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user. TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.
    Task 1 Requirements
    You can use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data (Userdata.xls), generate appropriate reports and provide an analysis of your findings (hint this assignment 2 task 1 can be done using excel pivot tables or Microsoft Access database SQL queries). Of particular interest are the following reports:
    1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
    2. List of users performing unsuccessful activities.
    3. List of transaction codes performed, with their frequency by each user.
    4. List of users engaging in security-related actions.
    5. Top 10 users in terms of frequency of activity.
    6. List of users who are dormant – in the range USER-001 to USER-050.
    7. You should also produce at least 3 reports/charts/plots based on any of the above previous reports that summarise activity over time using YYYYMM.
    TASK 2 Specifications – Analyze SAP System-Wide Security Settings.
    You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client’s system (Note you should open this file using excel spreadsheet to view the system-wide security settings with the fields aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file RSPARAM.txt.
    You required to produce a report for Task2 of Assignment 2 summarizing the current user settings, default settings and recommended settings based on the RSPARAM.txt file.
    Your report will consist of a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). The report should take the following form:

Express

48-72 Hours

300$

25$ per page

Fast

4-10 Days

240$

20$ per page

Standard

11+ days

180$

15$ per page

Looking for a Solution to the Assignment above, we have a team of experts who have a complete expertise in completing this assignment within your specified deadline. The assignment will be uniquly made for you and will be delivered along with Turntin Plagiarism report.

Get A Quote:


Why Us?

Features

Money Back Guaraantee
in case of missed deadline
No Plagiarism
Guarantee
Emergency delivery
within few hours.
Whatsapp contact