Professional Documents
Culture Documents
Contents
1 Installation..........................................................................................................................3
2 Required rights in the SAP® System.................................................................................4
3 Executing Scans ................................................................................................................4
4 Securing data for the Presentation ....................................................................................5
5 Connections over router or firewall systems ......................................................................6
6 Important recommendations for optimization.....................................................................7
7 Contact ..............................................................................................................................8
For a live presentation of CheckAud® for SAP® Systems or an audit by IBS employees, it is
required that the data be prepared before the scheduled appointment.
CheckScan
- Reads the relevant data from the SAP System
CheckIns
- Prepares the data and creates a database structure
CheckAud
- The foundation of CheckAud® for SAP® Systems, offers diverse evaluation options for
the prepared data.
The preparation of the data consists of running the first two modules (CheckScan followed
automatically by CheckIns); once for each system and client.
1 Installation
The scan module of CheckAud® for SAP® Systems is ready for you to use in the download
area of our homepage: http://www.check-aud.de/95.0.html.
First, unzip the archive in any directory. Execute the installation with a double click on the
folder SETUP.EXE. At this point, you are free to select your own target path. The standard
path will be given:
C:\Program Files\ibs schreiber gmbh\CheckScanR3 version 3.1
No other changes are necessary.
The module CheckIns is automatically installed with the CheckScan installation.
Installation time: < 1 Minute.
Installation size: ca. 20 MB
So that the scan module works as fast as possible with the least amount of strain on the
SAP® system, the data is read from the SAP® system and saved in raw form. Between four
and eight data accesses take place for every SAP® object, which means there are between
four and eight million data accesses during the scan of an SAP® Version 4.6 system.
Virus scanners that check the write-access to the hard drive should be de-activated (see
“Important recommendations for optimization” in this document) at the workstation where the
scan is run. This will significantly decrease the run-time of the scan.
Computer requirements for ca. 500 users and R/3-Release 4.6x:
Processor: 1000 MHz
Memory: 500 MB
Free disk space: 500 MB
Operating system: Windows XP / 2000 / 2003 / Vista
3 Executing Scans
To execute the scan, start the file CHECKSCANR3.EXE by selecting the menu entries: Start
– Program – ibs schreiber gmbh – CheckAudR3 - scan module version 3.1 presentation –
CheckScanR3 version 3.1, scan module.
The following entries are required in the program window fields:
Host-Name: Name or IP address of an SAP® application server or an SAP router-
address:
System-Number: The number of SAP instances to be scanned which run on the server
Client: The client to be scanned
User name: The user under whose name the scan was run
Language: The language in which the system was scanned (select EN). This
pertains to documentation and long text for objects.
Password: Password of the user
Identifier for the scan:
Any descriptive name for the scan
Automatically transferred to the database:
Activate this item!
If you did not install CheckScanR3 on the standard path, then you can find the database in
the options of the scan module. Display the path by clicking on Define options.
The entire Database.CAR3 directory, including all of the sub-directories, is required. Beneath
the directory Database.CAR3, you will find the following directory structure:
Database.CAR3 (Æ Main directory, burn onto CD from here)
Database
Master
SAPaudit
Cache
The presentation will use the CD containing the .SDA and .SIX files, as well as the files found
in the Database.CAR3 directory shown above.
For example:
The router address is 192.192.168.23
The system (instance) you want to scan is number 99
The address of the SAP-server you want to scan to is 192.192.192.25
The string for this example would be as follows:
/H /192.192.168.23 /S /3299 /H /192.192.192.25
In the scan module you enter the string in the field host name:
Please note: the quoted port 3299 in this example is opened in your router (or firewall
system) for the machine from which you want to scan!
The scan module saves the scan data in two files with the file extensions .SDA and .SIX. In a
standard installation, these two files are located in the directory C:\Program Files\IBS Schrei-
ber GmbH\SCANFILE.CAR3. During a scan, these files can be accessed several million
times. The transfer module, CheckInsR3, generates a relational database from the two scan
files. This database will be stored in the directory \ibs Schreiber gmbh\DATABASE.CAR3.
The transfer module CheckInsR3, in the course of a transfer, accesses both the scan files
and the database directories several million times.
Optimization recommendation
The function of the virus scanner is to examine every “read from” or “write to” the hard drive.
The virus scanner is given high priority and can easily affect the performance (slow down) of
any program that repeatedly accesses the hard drive. Here is an example of the effect on
scan performance with and without the virus scanner, using 1,000 users and an average
number of authorizations:
Many organizations simply turn off their virus scanner during a CheckAud® scan. Because of
the ever-present danger of virus infection, we do not recommend this method!
With one simple modification to the virus program settings, the system will continue to be
protected and the CheckAud® programs will run at maximum speed. You will require adminis-
trative rights to make this change to the system virus software. Take the following steps:
Open the attributes of the virus scanner software. Enter the directories to be excluded (…\ibs
Schreiber gmbh\), including the subdirectories. Save.
NOTE:
Some virus scanners are administered on the server and contain profiles of individual clients.
Where this is the case, the virus scan program must be modified on the server. Once the
change is made, all accesses to the specified directories will be ignored by the virus soft-
ware, but the rest of the system will continue to be protected.
7 Contact
You can find the most current information about CheckAud® for SAP® Systems online at:
www.CheckAud.de
Please feel free to visit the IBS Schreiber GmbH internet pages (coming soon in English!):
www.ibs-hamburg.com
Zirkusweg 1 Zirkusweg 1
Fax: +49 40 69 69 85 31