Start Level 1 Node: SAP Governance, Risk, and Compliance (GRC)SAP Governance, Risk, and Compliance (GRC)End Level 1 Node: SAP Governance, Risk, and Compliance (GRC)
   Start Level 2 Node: SAP Access Control 10.0 (AC)SAP Access Control 10.0 (AC)End Level 2 Node: SAP Access Control 10.0 (AC)
      Start Level 3 Node: DataStore ObjectsDataStore ObjectsEnd Level 3 Node: DataStore Objects
         Start Level 4 Node: Action RulesAction RulesEnd Level 4 Node: Action Rules
         Start Level 4 Node: Action UsageAction UsageEnd Level 4 Node: Action Usage
         Start Level 4 Node: Alert DetailsAlert DetailsEnd Level 4 Node: Alert Details
         Start Level 4 Node: Alerts Action LogAlerts Action LogEnd Level 4 Node: Alerts Action Log
         Start Level 4 Node: BRM Role RelationsBRM Role RelationsEnd Level 4 Node: BRM Role Relations
         Start Level 4 Node: BRM Role-Action MappingBRM Role-Action MappingEnd Level 4 Node: BRM Role-Action Mapping
         Start Level 4 Node: EAM FireFighter ID Log OnEAM FireFighter ID Log OnEnd Level 4 Node: EAM FireFighter ID Log On
         Start Level 4 Node: EAM FireFighter Role Log OnEAM FireFighter Role Log OnEnd Level 4 Node: EAM FireFighter Role Log On
         Start Level 4 Node: Function Action Permission RelationshipFunction Action Permission RelationshipEnd Level 4 Node: Function Action Permission Relationship
         Start Level 4 Node: HR Object Action ViolationsHR Object Action ViolationsEnd Level 4 Node: HR Object Action Violations
         Start Level 4 Node: HR Object Critical Role and Profile ViolationsHR Object Critical Role and Profile ViolationsEnd Level 4 Node: HR Object Critical Role and Profile Violations
         Start Level 4 Node: HR Object Mitigating Control AssignmentHR Object Mitigating Control AssignmentEnd Level 4 Node: HR Object Mitigating Control Assignment
         Start Level 4 Node: HR Object Permission ViolationsHR Object Permission ViolationsEnd Level 4 Node: HR Object Permission Violations
         Start Level 4 Node: Management AlertsManagement AlertsEnd Level 4 Node: Management Alerts
         Start Level 4 Node: Management Report Rule CountManagement Report Rule CountEnd Level 4 Node: Management Report Rule Count
         Start Level 4 Node: Management Risk DetailsManagement Risk DetailsEnd Level 4 Node: Management Risk Details
         Start Level 4 Node: Mitigation Control MonitorsMitigation Control MonitorsEnd Level 4 Node: Mitigation Control Monitors
         Start Level 4 Node: Mitigation Control ReportsMitigation Control ReportsEnd Level 4 Node: Mitigation Control Reports
         Start Level 4 Node: Mitigation Control RiskMitigation Control RiskEnd Level 4 Node: Mitigation Control Risk
         Start Level 4 Node: Organization Rule ItemOrganization Rule ItemEnd Level 4 Node: Organization Rule Item
         Start Level 4 Node: Profile Action ViolationsProfile Action ViolationsEnd Level 4 Node: Profile Action Violations
         Start Level 4 Node: Profile Critical Role and Profile ViolationsProfile Critical Role and Profile ViolationsEnd Level 4 Node: Profile Critical Role and Profile Violations
         Start Level 4 Node: Profile Level Violation Summary DataProfile Level Violation Summary DataEnd Level 4 Node: Profile Level Violation Summary Data
         Start Level 4 Node: Profile Management TotalProfile Management TotalEnd Level 4 Node: Profile Management Total
         Start Level 4 Node: Profile Mitigating Control AssignmentProfile Mitigating Control AssignmentEnd Level 4 Node: Profile Mitigating Control Assignment
         Start Level 4 Node: Profile Permission ViolationsProfile Permission ViolationsEnd Level 4 Node: Profile Permission Violations
         Start Level 4 Node: Request OwnersRequest OwnersEnd Level 4 Node: Request Owners
         Start Level 4 Node: Request UsersRequest UsersEnd Level 4 Node: Request Users
         Start Level 4 Node: Role Action ViolationsRole Action ViolationsEnd Level 4 Node: Role Action Violations
         Start Level 4 Node: Role Critical Role/Profile ViolationsRole Critical Role/Profile ViolationsEnd Level 4 Node: Role Critical Role/Profile Violations
         Start Level 4 Node: Role Level Management Violation CountRole Level Management Violation CountEnd Level 4 Node: Role Level Management Violation Count
         Start Level 4 Node: Role Management TotalRole Management TotalEnd Level 4 Node: Role Management Total
         Start Level 4 Node: Role Mitigating Control AssignmentRole Mitigating Control AssignmentEnd Level 4 Node: Role Mitigating Control Assignment
         Start Level 4 Node: Role Org Mitigating Control AssignmentRole Org Mitigating Control AssignmentEnd Level 4 Node: Role Org Mitigating Control Assignment
         Start Level 4 Node: Role Permission ViolationsRole Permission ViolationsEnd Level 4 Node: Role Permission Violations
         Start Level 4 Node: Role UsageRole UsageEnd Level 4 Node: Role Usage
         Start Level 4 Node: SOD Risk OwnersSOD Risk OwnersEnd Level 4 Node: SOD Risk Owners
         Start Level 4 Node: User Action ViolationsUser Action ViolationsEnd Level 4 Node: User Action Violations
         Start Level 4 Node: User Critical Role and Profile ViolationsUser Critical Role and Profile ViolationsEnd Level 4 Node: User Critical Role and Profile Violations
         Start Level 4 Node: User Level Management Violation CountUser Level Management Violation CountEnd Level 4 Node: User Level Management Violation Count
         Start Level 4 Node: User Management TotalUser Management TotalEnd Level 4 Node: User Management Total
         Start Level 4 Node: User Mitigating Control AssignmentUser Mitigating Control AssignmentEnd Level 4 Node: User Mitigating Control Assignment
         Start Level 4 Node: User Org Mitigating Control AssignmentUser Org Mitigating Control AssignmentEnd Level 4 Node: User Org Mitigating Control Assignment
         Start Level 4 Node: User Permission ViolationsUser Permission ViolationsEnd Level 4 Node: User Permission Violations
         Start Level 4 Node: User ProfileUser ProfileEnd Level 4 Node: User Profile
      Start Level 3 Node: InfoCubesInfoCubesEnd Level 3 Node: InfoCubes
         Start Level 4 Node: Access Request DetailsAccess Request DetailsEnd Level 4 Node: Access Request Details
         Start Level 4 Node: Action/Role UsageAction/Role UsageEnd Level 4 Node: Action/Role Usage
         Start Level 4 Node: Alerts DetailsAlerts DetailsEnd Level 4 Node: Alerts Details
         Start Level 4 Node: EAM FireFighter Log On InfoEAM FireFighter Log On InfoEnd Level 4 Node: EAM FireFighter Log On Info
         Start Level 4 Node: Management Violation Counts - User/Role/ProfileManagement Violation Counts - User/Role/ProfileEnd Level 4 Node: Management Violation Counts - User/Role/Profile
         Start Level 4 Node: Mitigation Controls DetailsMitigation Controls DetailsEnd Level 4 Node: Mitigation Controls Details
      Start Level 3 Node: InfoSetsInfoSetsEnd Level 3 Node: InfoSets
         Start Level 4 Node: Access Request OverviewAccess Request OverviewEnd Level 4 Node: Access Request Overview
         Start Level 4 Node: Alerts OverviewAlerts OverviewEnd Level 4 Node: Alerts Overview
         Start Level 4 Node: Mitigation Control OverviewMitigation Control OverviewEnd Level 4 Node: Mitigation Control Overview
         Start Level 4 Node: Organizational Rules OverviewOrganizational Rules OverviewEnd Level 4 Node: Organizational Rules Overview
         Start Level 4 Node: SOD Risk OverviewSOD Risk OverviewEnd Level 4 Node: SOD Risk Overview
      Start Level 3 Node: QueriesQueriesEnd Level 3 Node: Queries
         Start Level 4 Node: Action/Role Usage DetailsAction/Role Usage DetailsEnd Level 4 Node: Action/Role Usage Details
         Start Level 4 Node: Consolidated Action LogConsolidated Action LogEnd Level 4 Node: Consolidated Action Log
         Start Level 4 Node: Alert Details OverviewAlert Details OverviewEnd Level 4 Node: Alert Details Overview
         Start Level 4 Node: BRM Role Relations OverviewBRM Role Relations OverviewEnd Level 4 Node: BRM Role Relations Overview
         Start Level 4 Node: SOD Risks and Risk OwnersSOD Risks and Risk OwnersEnd Level 4 Node: SOD Risks and Risk Owners
         Start Level 4 Node: Organizational Rules OverviewOrganizational Rules OverviewEnd Level 4 Node: Organizational Rules Overview
         Start Level 4 Node: Critical Role OverviewCritical Role OverviewEnd Level 4 Node: Critical Role Overview
         Start Level 4 Node: Critical Profiles OverviewCritical Profiles OverviewEnd Level 4 Node: Critical Profiles Overview
         Start Level 4 Node: Mitigation Controls DetailsMitigation Controls DetailsEnd Level 4 Node: Mitigation Controls Details
         Start Level 4 Node: Management Summary - User TotalsManagement Summary - User TotalsEnd Level 4 Node: Management Summary - User Totals
         Start Level 4 Node: Management Summary - Role TotalsManagement Summary - Role TotalsEnd Level 4 Node: Management Summary - Role Totals
         Start Level 4 Node: Management Summary - Profile TotalsManagement Summary - Profile TotalsEnd Level 4 Node: Management Summary - Profile Totals
         Start Level 4 Node: Management Summary - Risk DetailsManagement Summary - Risk DetailsEnd Level 4 Node: Management Summary - Risk Details
         Start Level 4 Node: Management Summary - Rule CountManagement Summary - Rule CountEnd Level 4 Node: Management Summary - Rule Count
         Start Level 4 Node: Management Violation Counts - User/Role/ProfileManagement Violation Counts - User/Role/ProfileEnd Level 4 Node: Management Violation Counts - User/Role/Profile
         Start Level 4 Node: Management Summary - AlertsManagement Summary - AlertsEnd Level 4 Node: Management Summary - Alerts
         Start Level 4 Node: Access Request Items - OverviewAccess Request Items - OverviewEnd Level 4 Node: Access Request Items - Overview
         Start Level 4 Node: Workflow Request OverviewWorkflow Request OverviewEnd Level 4 Node: Workflow Request Overview
         Start Level 4 Node: EAM Firefighter Logon OverviewEAM Firefighter Logon OverviewEnd Level 4 Node: EAM Firefighter Logon Overview
   Start Level 2 Node: SAP GRC Access Control 5.3 (AC)SAP GRC Access Control 5.3 (AC)End Level 2 Node: SAP GRC Access Control 5.3 (AC)
   Start Level 2 Node: SAP GRC Foundation 3.0 (Common Objects)SAP GRC Foundation 3.0 (Common Objects)End Level 2 Node: SAP GRC Foundation 3.0 (Common Objects)
   Start Level 2 Node: SAP GRC Process Control 2.5 (PC)SAP GRC Process Control 2.5 (PC)End Level 2 Node: SAP GRC Process Control 2.5 (PC)
   Start Level 2 Node: SAP GRC Process Control 3.0 (PC)SAP GRC Process Control 3.0 (PC)End Level 2 Node: SAP GRC Process Control 3.0 (PC)
   Start Level 2 Node: SAP GRC Process Control Events 2.5 and 3.0SAP GRC Process Control Events 2.5 and 3.0End Level 2 Node: SAP GRC Process Control Events 2.5 and 3.0
   Start Level 2 Node: SAP GRC Risk Management 2.0 (RM)SAP GRC Risk Management 2.0 (RM)End Level 2 Node: SAP GRC Risk Management 2.0 (RM)
   Start Level 2 Node: SAP GRC Risk Management 3.0 (RM)SAP GRC Risk Management 3.0 (RM)End Level 2 Node: SAP GRC Risk Management 3.0 (RM)