13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: Security AdministrationSecurity LayersTransaction Description Dangerous Security PerformanceSE15 Data Dictionary Information SystemSE16 Data Browser XSE17 General Table display XSE38 ABAP workbench XSM49 External OS commands XSM59 Maintain RFC destinationsSM69 External OS commands XST05 SQL trace XSU12 Delete All Users X XThe following table shows dangerous transactions that probably cannot be locked becausethey are (or could be) used regularly. These transactions may have other valid reasons foruse in a production system—but because of the potential danger, need to have restrictedaccess.Transaction Description Dangerous Security PerformanceRZ10 Edit System Profiles XSA38 ABAP Workbench XSM04 User Overview XSM12 System Locks XSM13 Update Terminates XSM30 Table Maintenance XSM31 Table Maintenance XSTMS Transport Management System XSU01 User Maintenance XSU02 Profiles: Initial Screen XSU03Maintain Authorizations: ObjectClassesXTable TSTCT contains the transaction codes and the name of the transaction. The currentcontent is over 93,000 entries in the table, with over 48,000 in English.System Administration Made Easy11–21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!