Security report

Hello,
I was asked to put together somewhat of a draft for a "security report", but I'm unsure as to what values might be useful to report. I'm sure many of you out there have done something similar in the past and I'm not asking for complete ready-made scripts, just ideas as to what to include. I'm thinking failed logins, maybe specific user login, maybe include information about latest CPU version?
We are already using an overall database report showing space usage, alert log messages, invalid objects and such. The security report should complement this.
Best regards.

We are already using an overall database report showing space usage, alert log messages, invalid objects and such. The security report should complement this.-object creation/modification (DDL) detail on daily/weekly basis.
-Terminal detail of user session if auditing enable.
-login time detail after business hrs or failed login attempt.
-password complexity implementation
-database growth if not included in overall database report.
Thanks
Kuljeet Pal Singh

Similar Messages

  • Error while exporting security report to Excel

    Hi
    We are using SAP BPC 7.5 MS sp07 version
    In our application , particular user is unable to download/export the User security report to Excel.
    I am able to do it successfully.
    User encounters following error:
    Unable to download …ed.ReportViewerWebControl.axd from servername.com
    Unable to open this internet side. The requested site is either unavailable or cannot be found.
    Please try again later.
    can anyone please suggest?
    Thanks,
    Vanashree.

    Thanks Roberto and Kalpana.
    This link solved the problem:
    http://social.msdn.microsoft.com/Forums/en-US/bcf792f4-4da3-4dac-b689-60168e695683/error-internet-explorer-cannot-download-edreportviewerwebcontrolaxd-from-site?forum=vsreportcontrols

  • How to add "Team leader" field in standard BPC security report

    BPC Expert,
    We are using BPC MS 5.0 version.
    There is a checkbox in the security setup to make someone a "Team Leader" when you add him/her to a team and this checkbox determines who can post data and who cannot.  When we run the user report we see which team the user is in but we do not have visibility to whether or not they are a "Team Leader" which is what business owner needs to see to approve user access.
    I figured out "dbo.userteamassign" is the table which hold team leader value. Can anyone please tell me all the steps of adding team leader field in the standard BPC 5.0 security report.
    Thanks,
    Ketan

    Roberto,
    Thanks for the response. I know associated steps to declare business user as a team leader but my original question is "how to add a column in standard BPC security report that says who is team leader or who is not".
    Do you know the Dtx package that is responsible to supply the data to Standard BPC security report? We can enhance standard data package to pull/display extra "Team leader" column in standard security report.
    Appreciate your inputs.
    Thanks,
    Ketan

  • Security Reports - Scheduling daily retrieval

    Hi,
    I have two questions regarding security reports.
    I do Not have Planning audit trails activated(client does not want that.) But I Do need a daily report of all the changes that the Hyperion admin does to the roles and provisioning of groups and users.
    Q1.
    Of the 3 reports-Security Reports,Artifact Reports,Config Reports ,that are available in Shared services, it seemed that the 'Security Reports' was my best bet as it made me select what I wanted reports on.(eg. Directory Managemet,UserProvisioning in Select Tasks).But when I run the report I see repetitive lines of useless info
    eg:
    Performed on      Performed by   Application            Artifact Type     Artifact Name   Task
    05/17/2011 admin@native Shared Services User admin@native Authenticate
    Attribute Name : Host Info
    New Value:UNKNOWN
    Access control report only gives me the user/group access and not the changes that were made to them. The Security team at the bank would want to monitor the activities of the Hyperion admin and see what changes were made by her.
    Which report shoould I use to get the required info?
    Q2.
    How do I automate the generation of reoprt such that the members of the security team get the report in their emails daily?
    I would appreciate any help that I get on this.
    Thanks

    Hi,
    are we talking about a single report object here or do more than one report objects (Have the same problem)?
    Is the empty instance been scheduled with the same user as the one you use to view the report in the infoview?
    Have you checked for any error messages in the log files residing in the logging directory in your BOBJ installation directory?
    Have you got any service packs (latest SP = SP4) installed on your BOBJ server?
    Regards,
    Stratos

  • List Database – Security Reporting and Administration Users

    Dear Expert,
    I’m working with BW 2004’s Security Component , I try to find a database table in SE16 that it contain the follow field: Role with your component by Authorization Object. My scope is identify what role is a Secure Reporting Users and Secure Administration Users.
    The role has  S_RS_COMP and S_RS_COMP1 are Reporting Users. Moreover, the role has Reporting Users S_RS_ADMIWB, S_RS_IOBJ, S_RS_ISOUR, S_RS_ISRCM and S_RS_MRPO
    Thank for your help,
    Luis

    se16-->AGR_HIER
    AGR_* will be tables for Roles. Tables SMEN_* are for user favorites.
    You can find the information you want in table AGR_HIER.
    In this table you can select the role,
    In the field REPORT, select RRMX ,this will show you all roles with their workbooks.
    AGR_NAME = ROLE (technical name)
    REPORT= RRMX
    Hope it Helps
    Chetan
    @CP..

  • Security Reports in Shared Services

    Hi guys,
    Could you please help me with a simple question (well, I believe it's easy, but I'm not able to answer it... :))
    I'd like to give a user the permission to run security reports, but it's seems he has to be "Shared Services admin" to do so. Is that correct? Can I give him permission to run this kind of reports without giving him the role of "admin"?
    I really appreciate your help.
    Thank yo!
    Regards,
    Lu.

    Only Shared Services Administrators can generate and view audit reports to track historical changes to the security data.
    Refer: Page 86 of http://download.oracle.com/docs/cd/E17236_01/epm.1112/hss_admin.pdf
    HTH-
    Jasmine.

  • Security report template

    I wanted to know some section details available in Security reports template in design doc
    i.e.
    overview
    reviewed\submitted by
    Data level
    object level
    Thanks in advance
    October 12, 2010 11:31 AM

    overviewWhat type of security you are applying.As the name suggests its overview of security model.
    reviewed\submitted byWho has submitted and who has reviewed.
    Data levelIt means whether you have applied data level scurity or not.If yes on which group and what are the filters for that group in RPD.You can check filters in permission tab.
    object levelIt means whether some of cata;log objects are hidden for some of the groups.You need to check permission in presentation layer as well as in manage previleges.
    Regards,
    Sandeep

  • Security report with native roles and the roles they have access to.

    We need a security report that shows the Native/Custom Roles and the roles that they have access to.
    So, an example would be the role US_Acct, and the report would show what roles that has access to (Post Journals, Consolidate, etc).Can this be done?

    Export the Provision report from Shared Services.
    Upload report to Excel or Access.
    Build Tables to show what tasks each Role has access to.
    Build a report that links the provision report and the xref tables.
    You should also do this with Security Classes.

  • Security Report VPN Graph is Blank

    VPN Bandwidth
    - Even though the VPN Bandwidth Bytes by Day contains data, the graphs are blank.
    - SSL VPN graph is working fine.

    We found the root cause it was because table "task" does not have records in APPSERVER Database.
    Once we updated task table. Security report SEC_LIST_MBR is displaying results correctly.
    Regards,
    Rajesh

  • HFM Security Report Automation?

    Is there a way to automate the running of the HFM (Hyperion Financial Management) Security Report in Shared Services.?
    version: 11.1.2.0
    Is this possible with using Task Automation? ---> If yes please provide details
    If this possible using other reporting tools like HFR, web analysis..etc ---> This is not recommended
    If any other way, Please provide details.
    Thanks All!!
    Regards,
    AVSR

    I think the best way to produce custom security files is using the HFM API. You can use this to report on group memberships and roles and class access. You can read all about it in the Web Developer's Guide Chapter 10. The chapter starts:
    The HFMwSecurity type library contains the HFMwSecurity component. This component
    provides methods that enumerate an application’s security classes, indicate whether a user has
    rights to perform a given task, and return other types of security information.
    I have seen these used to great effect.

  • FTP Error when running security reports

    Hi,
    When running the security report function from:
    Informer -
    |-Security Reports
    |
    |- Users,Roles,Profiles,Miscellaneous
    Tabs: I get the following msg displayed: FTP site Location, user name,
    password not defined
    I have requested my basis team to give me the detail, that I can add it
    to the config but had the following reply.
    Standardbank does not make use of the FTP protocol and thus would not
    be used/required.
    Please advise what the work around id that I can run these reports.
    Regards, Melvin

    Harleen
    I dont get your answer. This works perfectly in Foreground. What am I supposed to configure to make this work in Background?! Where do I make this config?
    Nesimi

  • Security report SEC_LIST_MBR is not displaying users list

    Hi,
    When we run security report SEC_LIST_MBR. It is not displaying list of users instead it is just displaying user id who ran the report all other columns Full Name, Teams, Task Profile and Member access are blank.
    Please suggest what is causing it not to display list of users.
    In database we loaded the following page  http://ReportServer/reports and ran report SEC_LIST_MBR. It also gave same result - one row with user id data only.
    Regards,
    Rajesh

    We found the root cause it was because table "task" does not have records in APPSERVER Database.
    Once we updated task table. Security report SEC_LIST_MBR is displaying results correctly.
    Regards,
    Rajesh

  • HFM Security Reports

    Does anyone know how to keep track of security in HFM as we can generate reports in Planning but i dont see how to manage the security in HFM. Thanks,Scorpio

    Scorpio,No there is no security reports option in HFM .If you have been using external authentication and NT groups ,I would advice you running a report on the NT groups .Thanksnaveen

  • ISA500 security report samples

    Are there any Onplus sample reports available from Onplus for the ISA500 security device?

    Hi Todd,
    I'll check and see if I can gather some reports that contain data and then I'll get back to you.
    Are you aware of the reports that are available? Here's a summary of the available reports:
    •Device Utilization: Percent utilization of the CPU, compact flash, and RAM on the ISA500 Security Appliance, presented in graph and table formats.
    •Network Usage: Network usage in bytes and packets by protocol: HTTP, HTTPS, Email, SSH, and FTP, presented in graph and table formats.
    •Bandwidth Summary: Graphical and tabular format report of inbound and outbound traffic in bytes, by type. When CSV is selected as the report format, the following additional data is provided: number of dropped packets (in), dropped packets (out), error packets (in), and error packets (out).
    •Device Logins: ISA500 Security Appliance administrator logins, user account logins, and failed logins.
    •WiFi Report: Reports WiFi usage. The duration column for an entry is empty if the VPN user is connected when the report is generated.
    •VPN Report: IPSec and SSL VPN login tracking. The duration column for an entry is empty if the VPN user is connected when the report is generated.
    •Firewall Attacks: Displays summary and detail information for firewall attack events detected by the Firewall Attack Protection Security Service on the ISA500 security appliance.
    •Web Usage: Displays summary and detail information for Web usage by category, top visited sites, top users, and blocked sites.
    •Web Threats: Displays summary and detail information for Web threats detected by the Web Reputation Filtering service or Security Policy Profile configured on the ISA500 appliance.
    •Virus Attacks: Displays summary and detail information for virus attack events detected by the ISA500 Anti-Virus Security Service.
    •Spam Filter: Displays summary and details for emails blocked by the Spam Filter service on the ISA500. An email is classified as spam if the sender's reputation is below the SPAM threshold configured on the ISA500.
    •IPS Threats: Displays summary and detail information about security threats blocked by the Intrusion Prevention System (IPS) on the ISA500. When CSV is selected as the report format, additional data is provided (for example, the source IP address of the blocked threat).
    •Custom: A Custom Security report can be generated by choosing sections from any of the Security reports listed in this section when generating the report.
    Thanks,
    The OnPlus Team

  • Security reports

    Hi folks
      I don’t know but could you please let me know the security reports and tables.
    I’ll appreciate your help
    Cheers
    Usman

    Usman ,
    You can see the reports Under t-code SUIM
    RSUSR000     Currently Active Users
    RSUSR002     Users by Complex Selection Criteria
    RSUSR002_ADDRESS     Users by address data
    RSUSR003     Check the Passwords of Users SAP* and DDIC in All Clients
    RSUSR004     Restrict User Values to the Following Simple Profiles and Auth. Ob
    RSUSR005     List of Users With Critical Authorizations
    RSUSR006     Locked Users and Users with Incorrect Logons
    RSUSR007     Display Users with Incomplete Address Data
    RSUSR008     Critical Combinations of Authorizations at Transaction Start
    RSUSR008_009_NEW     List of Users With Critical Authorizations
    RSUSR009     List of Users With Critical Authorizations
    RSUSR010     Transactions for User, with Profile or Authorization
    RSUSR011     Lists of transactions after selection by user, profile or obj.
    RSUSR012     Search authorizations, profiles and users with specified object va
    RSUSR020     Profiles by Complex Selection Criteria
    RSUSR030     Authorizations by Complex Selection Criteria
    RSUSR040     Authorization Objects by Complex Selection Criteria
    RSUSR050     Comparisons
    RSUSR060     Where-used lists
    RSUSR060OBJ     Where-Used List for Authorization Object in Programs and Transacti
    RSUSR061     Enter Authorization Fields
    RSUSR070     Roles by Complex Selection Criteria
    RSUSR080     Users by License Data
    RSUSR100     Change Documents for Users
    RSUSR101     Change Documents for Profiles
    RSUSR102     Change Documents for Authorizations
    RSUSR200     List of Users According to Logon Date and Password Change
    RSUSR300     Set External Security Name for All Users
    RSUSR301     Fill non-checking transactions with auth.object S TCODE
    RSUSR302     Delete authorization check on object S TCODE from table TSTCA
    RSUSR304     Reload Table TSTCA From Table TSTCA_C
    RSUSR400     Test Environment Authorization Checks (SAP Systems Only)
    RSUSR401     Report to give all SAPCPIC users profile S_A.CPIC
    RSUSR402     Download user data for CA manager from Secude
    RSUSR403     Assign Profile S_A.CPIC to User SAPCPIC in Current Client
    RSUSR404     Conversion Program for Authorizations of Basis Development Environ
    RSUSR405     Reset all user buffers in all clients (uncritical)
    RSUSR406     Automatically Generate Profile SAP_ALL
    RSUSR406_OLD     Automatically Generate Profile SAP_ALL
    RSUSR408     XPRA: Conversion of USOBX-OKFLAG, USOBX-MODIFIED for upgrade tool
    RSUSR409     Transfer all translated titles to generated transaction codes
    RSUSR421     Clean-up report: TSTC-CINFO if no check in TSTCA
    RSUSR500     User Administration: Compare Users in Central System
    RSUSR500D     Report RSUSR500D
    RSUSR998     Call Reporting Tree Info System
    RSUSREXT     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)
    RSUSREXTID     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)
    RSUSRLOG     Log Display for Central User Administration
    RSUSRSCUC     CUA: Synchronization of the Company Addresses
    RSUSRSUIM     User Information System
    RSUSR_S_USER_SAS     Activate Authorization Object S_USER_SAS
    RSUSR_S_USER_SAS_01     Complete Authorization Data for S_USER_SAS in Roles
    RSUSR_S_USER_SAS_02     Convert Authorization Defaults
    RSUSR_SYSINFO_PROFILE     Report cross-system information/profile
    RSUSR_SYSINFO_ROLE     Report cross-system information/role
    RSUSR_SYSINFO_ZBV     Report cross-system information/***
    Here`re the tables :
    User/Security tables
    DEVACCESS     Table of development users including dev access key
    USR02     Logon data
    USR04     User master authorization (one row per user)
    UST04     User profiles (multiple rows per user)
    USR10     Authorisation profiles (i.e. &_SAP_ALL)
    UST10C     Composit profiles (i.e. profile has sub profile)
    USR11     Text for authorisation profiles
    USR12     Authorisation values
    USR13     Short text for authorisation
    USR40     Tabl for illegal passwords
    OBJT     Authorisation objetc table
    <b>Hope this’ll give you some idea . I deserve 10 points now :)</b>
    Thanks
    Saquib Khan

Maybe you are looking for