2008 Jan 10 4:33 AM
Hiya
I want to trace a culprit who is trying to delete the my customization data..
He/she has deleted my ent. stc, and now yesterday my credit control area was deleted......
Please help my to find that _ _ _ ..
Regards..
2008 Jan 10 10:27 AM
Hi Ranjeet!
There are many reports in the change documents by the SUIM, you can have analyze data for the users, roles assignment, profile and authorization.
As i understand from your question that customization data is deleted. you can have many options to analyze.
check the system log by the SM21
check the transport request against of your customized data deleted
you can enable security audit log by the sm20/sm19 to analyze the further log.
REgards
Anwer Waseem
SAP BASIS
2008 Jan 10 8:16 AM
Hi,
Please use SUIM to find who has changed the access of your account.
SUIM -- change documents - For users.
You can also use SM19 and SM20.
Regards,
Imran
2008 Jan 10 10:27 AM
Hi Ranjeet!
There are many reports in the change documents by the SUIM, you can have analyze data for the users, roles assignment, profile and authorization.
As i understand from your question that customization data is deleted. you can have many options to analyze.
check the system log by the SM21
check the transport request against of your customized data deleted
you can enable security audit log by the sm20/sm19 to analyze the further log.
REgards
Anwer Waseem
SAP BASIS
2008 Jan 10 12:54 PM
1.) changes in customizing will not appear in syslog (SM21)
2.) transport requests will only show the culprit if the system is set to 'transport request for changes' in tx. SCC4
3.) SM19 and SM20 will not work, because you have to set these transactions to monitor (up to 16) users which you must name - this would mean, he knows who it is already, so why search?
i would suggest you check in tx. RZ10 whether the parameter rec/client is alredy set. if not, set it and restart the instance. all changes to customizing tables will then be recorded. refer to note 1916 for details and search service.sap.com/notes for other notes on the topic. the protocols can be evaluated using tx. SCU3.
2008 Jan 10 4:25 PM
If the logging mentioned by Mylene is not active, you could try to search for the report generated by the maintenance view and see who used it (in addition to your self).
If you are the only person... no, user ID... who has used it, then it will become more difficult.
Cheers,
Julius
PS: Have you been doing any cross-system or cross-client customizing comparisons to this client...?
2008 Jan 14 10:51 PM
Any update on this issue? I'm curious to see if you got the culprit FIRED!
2008 Jan 15 4:06 AM
actually we don't have the MDM tracking implemented and was in process of getting help to implement the same i am also trying other options but for now i working working of fixing the server then finding him....
but will eventually and keep it posted
Thanks for your concern
Regards
Ranjeet
2008 Jan 17 12:38 PM
Hi,
You can view the change history of auths in table UST12 using SE16.