What are the security post refresh procedures in general?

Hi,
Can anyone list me out What are the security post refresh procedures in general?
Thanks and Regards,
Damanaidu J

>
Damanaidu jawaharlal wrote:
> Hi,
>
> Can you cite with respect to CUA.
>
> Thanks and Regards,
> Damanaidu J
CUA
====
CUA behaves differently during a system/client copy and this is the approach we took and it was successful.  The goal is to take a backup of the source before CUA deletion then restore. Do not delete CUA and just attempt to rebuild it, all the roles will be gone.  Backup and restore will be the approach I recommend.
a1.  Take a snap shot of your QA user and role assignments before copy.
1.  (Basis) First make a backup of the source system.  This is important before step 2.
2.  After successful backup delete the CUA from the source system. 
3.  After successful copy to target system, restore backup to source system.
4.  Depending how the copy was done, users and passwords should be in the target system but all the role assignments will be gone. 
5.  Start assigning roles base on your requirements.  If you need to restore the old QA settings that is captured in a1.
Perhaps others can add in other steps I might have missed.
Good Luck!

Similar Messages

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What are the security risks for opening port 80 on workstations?

    Hello all,
    in our environment, there is an application which open port 80 on workstations when installed, but it is not allowed on preimeter FW
    could you please advise what are the security risks for leaving port 80 opened on the workstations? or it is considered secure unless it is not allowed on the preimeter FW?
    thanks alot & regards

    Hi R.Naguib.
    The 80 port is open by default through the firewall on Windows system, it is used by a http protocol by a browser.
    As for the network or hardware Firewall settings, I suggest to turn to the network administrator for details.
    Regards
    Wade Liu
    TechNet Community Support

  • What are the security options

    How can I have my mac air require a log in when opening it.

    Try System Preferences > Users & Groups > Login Options and turn off automatic Login. You then use your Admin Password to log in.
    Cheers
    Pete

  • What are the post instalation steps?

    hi,
    i am fresher in SAP.anybody plz send me postinstalation steps.
    regards,
    jana

    Hi All,
    Rewards if useful.
    Post Installation Steps For ECC 5.0
    What are the post installation steps after I have installed the Central Instance and Database instance?
    Initial Consistency Check
    SM28
    1.      Logon to the newly refreshed SAP system and run transaction SM28
    2.      Ensure that no errors are reported.  Otherwise, take the necessary steps to correct the problems.
    Edit Batch Jobs
    1.      Set the fields as follows
    Job name: RDDIMPDP*
    User name: *
    Job Status: Released and Ready checked off, all others unchecked
    Fr:  01/01/0001
    To:  12/31/9999
    Or after event: *
    2.      Press <F8> to execute the query
    3.      Highlight the first job in the list and press the <CTRL>+<F11> to change the job.
    4.      Examine the Exec Target field.
    a.      If the box is empty, press <F3> to exit
    b.      If the box is not empty, then clear out the contents so the field is blank and press <CTRL>+<S> to save
    5.      Repeat Steps 3 and 4 for each additonal job listed.
    Workbench Organizer Reconfiguration
    1.      Logon on to client 000 of the newly refreshed system with DDIC.
    SE06
    1.      Select the Database Copy or migration option
    2.      Press the Post-installation Processing button.
    3.      When prompted Do you want to re-install the CTS?, press the Yes button
    4.      When prompted for the Source System of Database Copy?, make sure that the <SID> of the production system is selected.  Press the checkmark button to continue.
    5.      When prompted Change originals from PRD to QUA?, press the Yes button
    6.      When prompted Delete TMS Configuration?, press the Yes button
    7.      When prompted Delete old TMS configuration?, press the Yes button
    8.      When prompted Delete Old Versions of transport routes?, press the No button
    TMS Configuration
    1.      Logon on to client 000 of the newly refreshed system.
    STMS
    1.      Upon starting STMS, a windows with the title TMS: Include System in Transport Domain should be displayed
    2.      The information on this screen is automatically filled out from information provided during the SAP installation and should be correct.  If it correct, then enter a description for the system and press <CTRL>+S to save.  Otherwise, press the Other configuration button  and manually configure.
    3.      From the Overview menu, select Transport Routes
    4.      From the Configuration menu, select Adjust with Controller
    5.      Press the Yes button when prompted if you want copy the transport routes from the controller.
    Import Printers
    1.      Logon on to the production client of the newly refreshed system. 
    STMS
    2.      Press <F5> to go to the import Overview.
    3.      Double click on the <SID> of the newly refresh system
    4.      From the Extras menu select Other Requests, then Add.
    5.      In the Transp. Request box, enter the transport number containing the printer definitions that was exported.  Press <Enter> to save.
    6.      Select the transport that was just added to the queue and press <CTRL>+<F11> to start the import.
    7.      In the Target client box, enter the productive client of the newly created system.  Press <Enter> to save.
    8.      Press the <Yes> button to start the transport.
    Client Configuration
    SCC4
    1.      From the Table view menu, select Display -> Change
    2.      When warned that the table is cross-client, press the checkmark button.
    3.      Double click on one of the non-system clients (i.e. not client 000, 001 or 066)
    4.      Define client as follows:
    Client role:  Test
    Changes and transports for client-specific object:  Changes without automatic recording
    Client-independent object changes:  Changes to repository and cross-client customizing allowed
    Protection: Client copier and comparison tool:  Protection level 0
    Restrictions when starting CATT and eCATT:  eCATT and CATT allowed
    5.      Press <CTRL>+S to save.
    6.      Repeat steps 4 through 6 for any additional clients
    Set System Change Option
    SE06
    1.      Press the System Change Option button.
    2.      Set the global setting to Modifiable
    3.      From the Edit menu, select Software Components Modifiable
    4.      From the Edit menu, select Namespaces Modifiable
    5.      Press <CTRL>+S to save.
    Import Users
    STMS
    1.      Press <F5> to go to the Import overview
    2.      Double click on the <SID> of the newly refreshed system.
    3.      Press <F5> to refresh the list of transports
    4.      Locate the transport in the list containing the user exports done before the start of the refresh.
    If the transport is NOT in the list, then from the Extras menu, select Other requests then Add.   Enter the transport number and press <Enter>.  Then press the Yes button to add the transport.
    5.      Highlight the transport and press the Import request icon .
    6.      At the client import screen, enter the target client and then press the Import button
    7.      Press <Enter> to confirm that the import will proceed
    SCC7
    1.      Run the Post Client Import Processing
    2.      The transport number should be the same as that of the transport started in STMS
    3.      Schedule the job to run in the background.  Do NOT schedule it to run immediately.  We need to modify the job before it can be released.
    4.      Press <CTRL>+S to save.
    SM37
    1.      Set the fields as follows
    Job name: CLIENTIMPORT*
    User name: *
    Job Status: All options checked
    Fr:  01/01/0001
    To:  12/31/9999
    Or after event: *
    2.      Highlight the job that was created by SCC7 and press <CTRL>+<F11> to modify the job.
    3.      Press the Step button.
    4.      Select the RSCLXCOP line and press <CTRL><SHIFT><F7> to modify that step.
    5.      In the User box, enter the background user for that particular system (i.e BGDUSER, SAPBATCH, BATCHSAP).
    6.      Press <CTRL>+S to save the changes
    7.      Press <F3> to go back to the main job screen.
    8.      Press the Start condition button.
    9.      Press the Immediate button.
    10.     Press <CTRL>+S to save the changes
    11.     Press <CTRL>+S again to save all the changes to the job.
    12.     Job will start immediately once saved.  Press <F8> to refresh the list of jobs
    13.     Continue to press <F8> every once in a while to update the status of the job.  Do not continue until the job is completed sucessfully.
    SCC4
    1.      From the Table view menu, select Display -> Change
    2.      When warned that the table is cross-client, press the checkmark button.
    3.      Double click on one of the non-system clients (i.e. not client 000, 001 or 066)
    4.      Set the Protection to Protection level 1
    5.      Press <CTRL>+S to save.
    6.      Repeat steps 3 through 5 for any additional clients
    Deleting Source System Profiles
    RZ10
    1.      From the Utilities menu, select Import Profiles then Of Active Servers. 
    (Note:  All application servers of the target system must be started)
    2.      If the Display Profile Check Log screen is displayed, press <F3> to leave this screen.
    3.      Select the Profile field and press <F4> to bring up a list of profiles.
    4.      From the list select one of the profiles associated with the source production system.
    5.      From the Profile menu, select Delete, then All versions, then of a profile.
    6.      When prompted, press the Yes button to delete all version of the profile
    7.      When prompted to delete the file at the operating system level, press the No button.
    8.      Repeat steps 3 through 7 for all additional profiles associated with the source system
    Reconfigure Operation Modes
    RZ04
    1.      From the Operation Mode menu, select Timetable
    2.      Select Normal Operation and press the Change button.
    3.      Highlight 00:00 in the left hand column and press the Delete Assignment button
    4.      If all the assignments are not deleted, then highlight the start time of the outstanding assignment and press the Delete Assignment button.
    5.      Once all the assignments are deleted, press <CTRL>+S to save.
    6.      If warned about an empty timetable, press the checkmark button and then press Yes to save the empty timetable.
    7.      Press <F3> to go back to the main RZ04 screen.
    8.      Right click on one of the listed Operation modes and select Delete
    9.      Press the Yes button to confirm the deletion.
    10.     Repeat steps 8 through 9 for any additional operation modes
    11.     Press <F5> to create a new operation mode.
    12.     Enter a name and short description for the operation mode
    13.     Press <CTRL>+S to save.
    14.     Press <F6> to create a new Instance
    15.     From the Settings menu, select Based on current settings, then New Instances, then Set
    16.     Press <F3> to go back to the main RZ04 screen.
    17.     Press the Yes button to save
    18.     From the Operation Mode menu, select Timetable
    19.     Select Normal Operation and press the Change button.
    20.     Highlight the 00:00 at the top and press <F2>
    21.     Highlight the 00:00 at the bottom and press <F2>
    22.     Press the Assign button.
    23.     Press <F4> to select the operation mode created above.
    24.     Press <CTRL>+S to save.
    Delete Update Failures
    SM13
    1.       Set the fields as follows
    Client:  *
    User: *
    From data: 01/01/0001
    From time: 00:00:00
    2.      Press <Enter> to display the list of outstanding update requests
    3.      If ALL the outstanding update requests have a status of ERR, then it is safe to delete these requests by pressing <F5> to select all records, then selecting the Update Records menu, then Delete.
    4.      Press the Continue button to confirm the deletion.
    Delete Batch Input Sessions
    SM35
    1.      From the Edit menu, select Select All
    2.      Press <Shift>+<F2> to delete all the batch input sessions.
    3.      Press the checkmark button to confirm
    4.      Press the Yes button to start the delete.
    Reorganize Spool
    SPAD
    1.      From the Administration menu select Clean-up Spool
    2.      Check all check boxes and enter 0 for minimum age
    3.      Press the Execute button
    4.      Once complete, press <F3> twice to get back to the main SPAD screen
    5.      From the Administration menu select Check Consistency
    6.      Press the Delete All button.
    SP12
    1.      From the TemSe database menu, select Consistency check
    2.      When the check is complete, press the Delete All button. 
    Delete Invalid Background Control Objects
    SM61
    1.      Press <F8> to switch in to change mode
    2.      Press the Cleanup List button.
    Restrict Outgoing Email and Faxes
    SCOT
    1.      Double click on the green Fax entry
    2.      From the Supported Address Types area, press the Set button that is beside Fax
    3.      In the Address area, ADJUST AS NECESSARY
    4.      Double click on the green SMTP entry
    5.      From the Supported Address Types area, press the Set button that is beside Internet
    6.      In the Address area, ADJUST AS NECESSARY
    Adjust RFC connections.
    SM59
    1.      Expand the TCP/IP connections section
    2.      Double click on the first entry listed
    3.      Check the gateway host and gateway server to make sure it points to the appropriate NON-PRODUCTION system.  
    Make changes as necessary.
    4.      Press the Test Connection button to test the connection
    5.      Press Press <CTRL>+S and then <F3> to save and return to the list of RFCs.
    6.      Repeat steps 1 through 5 for each additional RFC connection
    Convert Logical Systems
    Under no circumstances perform this procedure on a Production system
    BDLS
    1.      When warned to read the documentation, press the checkmark button.
    2.      In the Old logical system name box, press <F4>.
    3.      Select one of the production Logical System names that needs be changed (i.e. WIIPRD400)
    4.      In the New logical system name, enter what that logical system name should be called on this newly refreshed system (i.e.WIITRN400)   Note: Ignore Error/Warning about duplicate system by clicking on the check mark.
    5.      De-select the Test Run and Existence check on new names in tables options
    6.      From the Program menu, select Execute in background
    7.      Press the checkmark button when asked to select a spool device
    8.      Press the Immediate button when asked for the schedule
    9.      Press <Ctrl>+S to save
    10.     Use SM37 to monitor the job
    11.     When job is complete, repeat steps 2 through 10 for any additional logical system names that need to be changed.
    Adjust Logical Systems names
    SALE
    1.      Expand Sending and Receiving Systems, then Logical Systems
    2.      Click on the execute icon beside Define Logical System
    3.      Press the checkmark button to confirm that the change is cross client
    4.      …
    Allow Certains Settings to be modifiable
    (Refer to Note 356483 for more Details)
    SM54
    1.      Enter V_T001B in the Table/View box.
    2.      Select the Generated Objects option.
    3.      Press the Create/Change button.
    4.      Enter any access keys if requested
    5.      Change the Recording routine to no, or user, recording routine.
    6.      Press <Ctrl>+S to save
    7.      Press <Enter> if warned that you are changing a function group that doesn't belong to you.
    8.      You are prompted for transport.  Create a new local transport.
    9.      Repeat steps 1 through 8 for the following objects.  You can specify the same transport you created above.
    V_T001B_GL
    V_T093B_01
    V_T093B_02
    BSI Configuration (R3 HR Systems only)
    SM59
    1.      Expand TCP/IP Connections
    2.      Highlight BSI70-US-TAX and press the Change button
    3.      Change the program field to
    <hostname>\sapmnt\<SID>\SYS\EXE\RUN\TF60SERVER.EXE
    4.      Double check the target host and gateway point to the correct server
    5.      Press <CTRL>+S to save
    6.      Press the Test connection button to test.  If the connect is not successful, take the necessary steps to resolve the issue.
    SE38
    1.      In the Program field, enter RPUBTCU0
    2.      Press <F8> to execute
    3.      Select option BSI version 7.0
    4.      Press <F8> to execute
    5.      BSI should return tax calculations.  If there are errors, take the necessary steps to resolve.
    Reconfigure DB13 schedule
    DB13
    1.      Using the print out created before the refresh, recreate the DB13 calendar.
    Client Configuration
    SCC4
    1.      From the Table view menu, select Display -> Change
    2.      When warned that the table is cross-client, press the checkmark button.
    3.      Double click on one of the non-system clients (i.e. not client 000, 001 or 066)
    4.      Define clients as follows depending on client role
    Development
    Client role:  Customizing
    Changes and transports for client-specific object:  Automatic recording of changes
    Client-independent object changes:  Changes to repository and cross-client customizing allowed
    Protection: Client copier and comparison tool:  Protection level 0
    Restrictions when starting CATT and eCATT:  eCATT and CATT allowed
    Quality Assurance
    Client role:  Test
    Changes and transports for client-specific object:  No changes allowed
    Client-independent object changes:  No Changes to repository and cross-client customizing allowed
    Protection: Client copier and comparison tool:  Protection level 0
    Restrictions when starting CATT and eCATT:  eCATT and CATT allowed
    Training
    Client role:  Education
    Changes and transports for client-specific object:  No changes allowed
    Client-independent object changes:  No Changes to repository and cross-client customizing allowed
    Protection: Client copier and comparison tool:  Protection level 0
    Restrictions when starting CATT and eCATT:  eCATT and CATT allowed
    Sandbox
    Client role:  Test
    Changes and transports for client-specific object:  Changes without automatic recording
    Client-independent object changes:  Changes to repository and cross-client customizing allowed
    Protection: Client copier and comparison tool:  Protection level 0
    Restrictions when starting CATT and eCATT:  eCATT and CATT allowed
    5.      Press <CTRL>+S to save.
    6.      Repeat steps 4 through 6 for any additional clients
    Set System Change Option
    Skip this section of the system is a Development or Sandbox System.
    SE06
    1.      Press the System Change Option button.
    2.      Set the global setting to Not Modifiable
    3.      Press <CTRL>+S to save.
    Release Background Jobs
    Currently, all background jobs, except for system standard jobs have been placed on hold (status scheduled).
    Rewards if useful.
    Regards,
    Pherasath

  • What are the limitation of the 4 Port Gigabit ethernet Security Service Module (4GE SSM)?

    I was wondering if anyone can help me out. I am trying to create a redundancy topology which require several connections to an ASA 5510. I am looking at extending the connections to my ASA 5510 appliance with the four port gig ethernet security module (4GE SSM). I am trying to find out what the limitations are on this particular module.
    I have heard that there might be limitations to the 4GE SSM. Such as the interfaces on this module might process data separately from the ASA 5510 appliance. My question is does the ASA four port gig ethernet security module (4GE SSM) interfaces act as a extension of the ASA 5510 appliance or does it process and filter data separate from the ASA 5510 appliance ?
    My concerns are that the 4GE SSM does not utilize all the security features of the ASA 5510 appliance, and that it just separates traffic into security zones. I interpret that to mean that each interface can be placed in a separate security level in which case has a separate security algorithm and uses the security level to force security policies. Nothing more.
    My second question if relevant would be what are the limitations?
    Thank you for your help on this topic.
    mike

    The 4GE SSM just gives you the four additional ports. It doesn't increase the processing capacity of the 5510 (a relatively low end box whose replacement - the 5515X -  has been out since this past spring). It works off the same configuration script and CPU as all the built-in ports.
    The only limitation I can think of off the top of my head is that members of an Etherchannel cannot span the SSM and the built-in ports.

  • How can L identify what are the not null fields of a table in a stored procedure ?

    How can L identify what are the not null fields of a table in a stored procedure ?

    You could query the data dictionary:
    SELECT column_name
    FROM all_tab_columns
    WHERE owner = '...'
    AND table_name = '...'
    AND nullable = 'N'

  • What are the procedures for getting Apple to remotely wipe all my data off my ipad that was stolen? I have no hope of recovering it. Please advise asap...thanks!

    What are the procedures for getting Apple to wipe the data off my original ipad I bought two years ago. I had it stolen from a hotel room over the weekend and it is not password protected and no I did not download app to find it.
    Any hwlp would be greting appreciated!

    Apple can't do it, only you could potentially do it if you had enabled Find My iPad on it before it was stolen.
    If it was stolen then you should report it to the police. As a safety precaution you should also change your iTunes account password, your email account passwords, and any passwords that you'd stored on websites/emails/notes etc.

  • What are the required depreciation areas to post IFRS

    Hi,
    what are the required depreciation areas to post IFRS
    Thanks And Regards.
    Ramakrishna.K

    Hi,
    You should use the local rules for depreciation area 01 = local book and
    set up your group rules in another depreciation area such as 30 where you can use different GAAP.
    Regards
    Sunil
    Assign Points, if Useful

  • What are the 'must know' CO settings/procedures?

    Hello
    What are the most important CO settings/procedures every consultant must know?
    I am new to CO and just to be sure that course content includes all main points.
    Thanks

    There are no 'main' points; it all depends on the business requirements.
    The more you know, better it would be.
    The specified item was not found.

  • What are the important conditions in taxinn procedure

    hi all
    please tell what are the important condition types which capture excise and other taxes in taxinn procedure for a manufacturing company?
    and also the procedure to be used for sales from depot and relevant excise conditions?
    thanks a lot

    hi all
    please tell what are the important condition types which capture excise and other taxes in taxinn procedure for a manufacturing company?
    and also the procedure to be used for sales from depot and relevant excise conditions?
    thanks a lot

  • Please explain what are the various procedures to find user-eixts

    Hi,
    Please explain what are the various procedures to find user-eixts ?
    Ramana

    Hi,
    1. By executing this Program.
    *& Report  ZFIND_EXIT
    REPORT  ZFIND_EXIT.
    *report zbadi_find .
    tables : tstc,
    tadir,
    modsapt,
    modact,
    trdir,
    tfdir,
    enlfdir,
    sxs_attrt ,
    tstct.
    data : jtab like tadir occurs 0 with header line.
    data : field1(30).
    data : v_devclass like tadir-devclass.
    parameters : p_tcode like tstc-tcode,
    p_pgmna like tstc-pgmna .
    data wa_tadir type tadir.
    start-of-selection.
    if not p_tcode is initial.
    select single * from tstc where tcode eq p_tcode.
    elseif not p_pgmna is initial.
    tstc-pgmna = p_pgmna.
    endif.
    if sy-subrc eq 0.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'PROG'
    and obj_name = tstc-pgmna.
    move : tadir-devclass to v_devclass.
    if sy-subrc ne 0.
    select single * from trdir
    where name = tstc-pgmna.
    if trdir-subc eq 'F'.
    select single * from tfdir
    where pname = tstc-pgmna.
    select single * from enlfdir
    where funcname = tfdir-funcname.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'FUGR'
    and obj_name eq enlfdir-area.
    move : tadir-devclass to v_devclass.
    endif.
    endif.
    select * from tadir into table jtab
    where pgmid = 'R3TR'
    and object in ('SMOD', 'SXSD')
    and devclass = v_devclass.
    select single * from tstct
    where sprsl eq sy-langu
    and tcode eq p_tcode.
    format color col_positive intensified off.
    write:/(19) 'Transaction Code - ',
    20(20) p_tcode,
    45(50) tstct-ttext.
    skip.
    if not jtab[] is initial.
    write:/(105) sy-uline.
    format color col_heading intensified on.
    Sorting the internal Table
    sort jtab by object.
    data : wf_txt(60) type c,
    wf_smod type i ,
    wf_badi type i ,
    wf_object2(30) type c.
    clear : wf_smod, wf_badi , wf_object2.
    Get the total SMOD.
    loop at jtab into wa_tadir.
    at first.
    format color col_heading intensified on.
    write:/1 sy-vline,
    2 'Enhancement/ Business Add-in',
    41 sy-vline ,
    42 'Description',
    105 sy-vline.
    write:/(105) sy-uline.
    endat.
    clear wf_txt.
    at new object.
    if wa_tadir-object = 'SMOD'.
    wf_object2 = 'Enhancement' .
    elseif wa_tadir-object = 'SXSD'.
    wf_object2 = ' Business Add-in'.
    endif.
    format color col_group intensified on.
    write:/1 sy-vline,
    2 wf_object2,
    105 sy-vline.
    endat.
    case wa_tadir-object.
    when 'SMOD'.
    wf_smod = wf_smod + 1.
    select single modtext into wf_txt
    from modsapt
    where sprsl = sy-langu
    and name = wa_tadir-obj_name.
    format color col_normal intensified off.
    when 'SXSD'.
    For BADis
    wf_badi = wf_badi + 1 .
    select single text into wf_txt
    from sxs_attrt
    where sprsl = sy-langu
    and exit_name = wa_tadir-obj_name.
    format color col_normal intensified on.
    endcase.
    write:/1 sy-vline,
    2 wa_tadir-obj_name hotspot on,
    41 sy-vline ,
    42 wf_txt,
    105 sy-vline.
    at end of object.
    write : /(105) sy-uline.
    endat.
    endloop.
    write:/(105) sy-uline.
    skip.
    format color col_total intensified on.
    write:/ 'No.of Exits:' , wf_smod.
    write:/ 'No.of BADis:' , wf_badi.
    else.
    format color col_negative intensified on.
    write:/(105) 'No userexits or BADis exist'.
    endif.
    else.
    format color col_negative intensified on.
    write:/(105) 'Transaction does not exist'.
    endif.
    at line-selection.
    data : wf_object type tadir-object.
    clear wf_object.
    get cursor field field1.
    check field1(8) eq 'WA_TADIR'.
    read table jtab with key obj_name = sy-lisel+1(20).
    move jtab-object to wf_object.
    case wf_object.
    when 'SMOD'.
    set parameter id 'MON' field sy-lisel+1(10).
    call transaction 'SMOD' and skip first screen.
    when 'SXSD'.
    set parameter id 'EXN' field sy-lisel+1(20).
    call transaction 'SE18' and skip first screen.
    endcase.
    2. . Go to the screen>System>Status-->Program (Double
    click this program. It will take you to the program.
    2. Now, Goto-->Object Directory Entry.
    3. Make a note the package name.
    4. Now run the transactions SMOD, press F4 and enter the
    above noted package, press enter.
    5. It will display list of Exits.
    6. Now go back to the initial screen SMOD.
    7. Specify the exit name here and select the radio button
    Components.
    8. It will display four group boxes one for FM, second
    for Fcodes, thrid for Screen areas and last for
    includes.
    9. Goto transaction CMOD, create a new project, and
    click the button "Enhancement assignments" and
    specify your enhancements that you got in SMOD.
    10. Now bouble clikc the enhancement, it will take you to editor with some includes starting with Z, double clikc the include you want to edit and proceed.
    3. 1. in se11, goto table MODSAP
    View table contents
    in Type field, enter
    'E' (for user exit / Function Exit)
    OR 'S' (for screen exit)
    4. Calling Customer- fucntion in Main Program
    Thanks,
    Anitha

  • What are the advantages of idoc compare to flat file. how data is secure

    what are the advantages of idoc compare to flat file. how data is secure in idocs compare to flat file

    Hi Ramana,
    In simple words, Main advantage with idoc over flat file is security....
    I will explain you some scenario here U got a flat file with all the data...Now u r having the flat file if you want u can modify the data in it, or somehow any one can modify the data in it  if they were able to access this file. That means u maintained the file in the presentation server
    One level of higher security to the above level is maintaining the flat file in application server, at point also even though lot of people r not having the access to that file, super user who is  having  the access may modify the data or delete the data from it rite....
    so in both of those levels u don't have 100% security...
    So there come to the picture of idocs, Idocs simply data carriers, those r generated by a program but not manually...data will be divided into number of segments based upon ur program. So manually its not so easy to modify the data in these idocs. If any changes to be made in the data then u have to modify the data in the application and then u have to update the idoc or you have to generate the new idoc with that corresponding data. so in this case not even super user can manipulate the data directly in the idoc....
    I think u got my point what I mean to say.....
    If you find it useful mark the points
    ~~Guduri

Maybe you are looking for

  • Adobe Premiere Elements 10 Loading problem

    I have loaded Premiere elem 10 onto my laptop, it loaded without the activation code being requested, it failed to load a shortcut to the desktop and will not run. I have been onto the Adobe chat line, which was completely hopeless, no help what so e

  • Transaction CJI3 in portal Problem

    Dear Friends, We are working with CJI3 Transaction in Portal that is linked to a BW Report , the flow is BW report should flow to CJI3 by taking the Projects as Input and gives the Output along with Summarization of Cost Centers, The Problem now is w

  • 11.5.10: RETROACTIVE PRICING이 WORKFLOW를 통해 수행되지 않을 경우 처리 방법

    제품 : MFG_PO 작성날짜 : 2006-05-30 11.5.10: RETROACTIVE PRICING이 WORKFLOW를 통해 수행되지 않을 경우 처리 방법 =========================================================== PURPOSE 11.5.10: Retroactive Pricing이 workflow form을 통해 수행되지 않을 경우 처리 방법을 기술하고자 합니다. Problem Descrip

  • Updated Firefox and lost all toolbars, Hotmail, EVERYTHING!! How do I fix this?

    Updated Firefox last evening. Got up this morning to a whole new page on the computer. Clicked on Firefox and got a blank page with just a Firefox logo and a Google search line. There are no toolbars for me to use to get to my e mail, pictures or oth

  • Tool Tip Font Size

    Hello, Is it possible to change the font size of a tool tip? On Macintosh I have been using terminal to do this from the system, but it does not work. It does do some very odd things with labels in the open dialog. defaults write com.adobe.InDesign N