Show TOC

Object documentationSecurity Dashboard Locate this document in the navigation structure

 

The Security apps are a special application type dealing with Solution Manager Configuration Validation, which can help to identify systems that are not compliant with respect to selected items.

If the security data in your system is not compliant, the system administrator has to rerun the configuration validation to change the corresponding data. For more information on configuration validation, see the documentation under the Configuration Check link below.

 

You can use the Security dashboard to get an overview of the compliance / non-compliance of your productive SAP systems, as related to certain security-specific settings. The following three categories are used for this:

  • Non-Compliant (NC, in red): A system or a category of a system is validated as non-compliant as soon as one configuration item (software level, setting, parameter or service) is rated as non-compliant.

  • Compliant (C, in green): This is the result after all checked items have been validated as compliant.

  • Undefined (U, in gray): This means that no non-compliant items were found, but that not all items have been validated as compliant.

The Security dashboard contains the following apps:

  • Security Overview app: This app counts the non-compliant, compliant and undefined systems in the system landscape.

  • Security Details app: This app validates the systems for the categories Software, Configuration and User and builds the sum of these categories.

  • Security List app: This app displays the systems involved, by extended SID, with the validation results displayed for each category.

The security apps are designed to use a target system based on the template 0SEC_NEW, which delivers the content of the corresponding config stores. Config stores added to the target systems are only validated if they also use the security app queries.

Integration

When you call the dashboard, all of the dashboard apps are initially minimized. To display an app full-screen, double-click it. You can add apps to the dashboard, or change their order or data source. For more information on configuration, see Configuring Security Apps and Configuring Dashboards.