Problem Maintenance
Problems can be described using free-text descriptions and customized attributes, such as: problem type and subtype, locations, damages and causes. You can conduct searches based on this information, so when you maintain problems, it is best to describe them as fully as possible. For more information, see Problem and Solution Search.
You can create, change, and display problems. You cannot delete them.
Note
This function is available only on the SAP GUI.
You have configured the Solution Database. For more information, see Configuration Help for Solution Database.
Creating a Problem
On the SAP Easy Access
screen, choose (transaction IS01).
Choose Create
.
You
can also define a problem using a reference. For example, if the problem you
want to define is similar to an existing problem, you can copy the existing
problem's data and change it as required. You do this using the Create
From
field.
Choose a Problem Type
from the possible
entries and press Enter
.
A
problem number is assigned automatically. Depending on how the problem type
is configured in Customizing for the Solution Database
(SDB),
other fields are filled automatically.
The (short) description is created automatically from the first 40 characters of the long text.
Enter your data as required. For more information, see:
When you are ready, release the problem.
For problems to be returned in searches, the problems must be compiled (see Knowledge Base Compilation). If you compile the Solution Database, and subsequently change the problem, you must recompile the Solution Database, otherwise your change is not found in searches. For this reason, we recommend regular automatic delta compilation.
After compilation, when a knowledge administrator searches the Solution Database from within the Solution Database, both released and unreleased problems are returned. When a user searches the Solution Database from other applications (see Solution Database), the information security profile assigned to the user determines which problems and linked solutions are returned. For more information, see Assigning Information Security Profiles to Users.
Save your data.