logging of SAP GUI for Windows UI
10 Blog Posts
8 Contributors
-
Our customers apply SAP Enterprise Threat Detection to consume logging of SAP GUI for Windows (shortened further “UIL”) entries in their SIEM solutions thanks to standard connectors between UIL and SAP Enterprise Threat Detection and... Read More »0Comments3Likes
-
The Programming Language Python gives you many possibilities to use SAP in different ways. One of them is Logging into SAP without providing Client Number, User Name, or Password. You might be surprised how this is possible !! But, to use this kind... Read More »7Comments9Likes
-
Sorry to disappoint you, but no, NSA’s mission statement is not “In God We Trust, All the Others We Monitor” but something much less controversial, albeit more ambitious I find: “Defending our Nation. Securing the Future”. Regardless, I... Read More »2Comments1Like
-
There are a few definitions of Digital Trust out there, so I won’t create a new one. Instead I’ll simply refer to PwC’s that I think is very clear and straight forward: “the level of confidence in people, processes and technology to build a... Read More »0Comments0Likes
-
Hi All, In this post I would like to explain about Login to BSP application without any authentication. Description: If any one of user tries to access the BSP application in browser through SAP logon pad and it will ask for Login credentials .... Read More »0Comments0Likes
-
New to SAPUI5? You want to learn about it but don’t know how to start? Well, you don’t need to worry at all! Today we are going to discuss all the aspect of SAPUI5 and the reasons why should we pick SAPUI5 for web development. This blog will be... Read More »0Comments4Likes
-
Udaykumar Reddy Gavireddy posted on October 26, 2017The use of SE61 T.code use is, we can notice on the screen about system configuration and component details,client environment details and also technical support details as like as we described.The way we can find out easily the system... Read More »8Comments19Likes
-
Here I will try to give a explanation on what, how to generate the SAP Users license Usage during the year-cycle. Here I will try to demonstrate via a Single Development & Production System to do the job. Hope this document makes the... Read More »19Comments12Likes
-
InformationWeek’s offering for the “information security community” has recently published a commentary by Mike Tierney identifiying “The Insiders: A Rogues Gallery“, thought to help organiziations spot and prevent... Read More »0Comments0Likes
-
Security is never a sexy topic. It costs money without directly adding value to your business and processes. In the best case, it’s unobtrusive, not requiring huge efforts to run – like that dental insurance you hope you’ll never need. Alas,... Read More »0Comments0Likes