You are on page 1of 20

System Administration Made Easy 11

Chapter 1: Prerequisites and General


nformation
Contents
Target Audience......................................................................................................12
Whats New..............................................................................................................12
Prerequisites ...........................................................................................................13
User...........................................................................................................................13
Special Definitions..................................................................................................14
System ......................................................................................................................15
Who Is an R/3 System Administrator?..................................................................16
Roles of an R/3 System Administrator ......................................................................16
Requirements of an R/3 System Administrator.........................................................18
R/3 System Guidelines ...........................................................................................18
Protect the System....................................................................................................19
Do Not Be Afraid to Ask for Help ..............................................................................19
Keep It Short and Simple (KISS) ............................................................................110
Keep Proper Documentation...................................................................................110
Use Checklists ........................................................................................................111
Use the Appropriate Tool for the Job......................................................................112
Perform Preventive Maintenance............................................................................112
Do Not Change What You Do Not Have To ...........................................................113
Do Not Make System Changes During Critical Periods..........................................114
Do Not Allow Direct Access to the Database..........................................................114
Keep all Non-SAP Activity Off the R/3 Servers.......................................................115
Minimize Single Points of Failure............................................................................115
Network with Other Customers and Consultants....................................................116
Corollaries to Murphys Law....................................................................................117
Types of Tasks ......................................................................................................118
Regularly Scheduled Tasks ....................................................................................118
Nonscheduled Tasks ..............................................................................................119

Chapter 1: Prerequisites and General Information


Target Audience
Relese 4.0B
12
Target Audience
The target audience for this guidebook is:
< The customer person or team where:
The SAP R/3 administrator is of a small to mid-size company with a small (one to
three people) technical team.
Each person in the team has multiple job responsibilities.
The system administrator has a basic knowledge of the operating system and
database.
< The junior consultant
Senior consultants, experienced system administrators, and DBAs may find portions of this
guidebook very elementary, but hopefully useful.
Whats New
Philosophy
This Oracle on SAP R/3 Release 4.0B System Administration Made Easy Guidebook departs
from the direction of prior editions. Of primary focus here is the importance of the on-
going nature of system administration.
This book is written for an installed system, where all installation tasks have been
completed.
Installation and installation related tasks, which are usually performed one-time, have not
been included in this guidebook. These tasks are normally done by your Basis consultants.
Organization
An entire section of this guidebook is organized around the regularly scheduled tasks an
administrator would perform.
The last section is unscheduled tasks, or those performed as needed.
Content
Real world practical advice from consultants and customers has been integrated into this
book. Because of this real world perspective, some of the statements in this book are blunt
and to the point.
Because the subject area of system administration is so large and the pool of knowledge so
extensive, it has been very difficult to reduce the volume to what one may call Made Easy.
Although material was carefully chosen for inclusion, it is by no means comprehensive.
A disaster recovery chapter has been added at the beginning of the book, emphasizing its
real world importance.
Chapter 1: Prerequisites and General Information
Prerequisites
System Administration Made Easy
13
Two new features of Release 4.0B are:
< Transport Management System (TMS)
< 4.0 CCMS Alert Monitor
A listing of various SAP and third-party resources has been added in appendix A .
This guidebook is an evolution of previous guidebooks. As such, future printings will also
be different in response to customers and consultants technical needs and desires. We
welcome your comments on this edition.
What s Not Provided
This guidebook is not a trouble-shooting manual. Most problems are investigative, which
means you need to examine the clues to find out how to proceed. When you find a problem,
attempt to first solve it yourself using your own resources before contacting your Basis or
technical consultant. You will learn to better analyze the exceptions with time and
experience.
Prerequisites
To help you use this guidebook, and to prevent this guidebook from becoming as thick as
an unabridged dictionary, we defined a baseline for user knowledge and system
configuration.
The two following sections (User and System) define this baseline. Please review these
sections to determine how you and your system match up. If you are deficient in an area be
aware that this book is written with certain presumptions about your knowledge and
expectations that particular system requirements have been met.
User
We have assumed that you have a baseline knowledge of R/3, the operating system, and the
database. If you are deficient in any of the following points, we recommend that you consult
the many books and training classes that specifically address the operating system and
database you use.
You should know how to complete the following tasks at:
< The R/3 System level
Be able to log on to R/3
Know how to navigate within R/3 using both menus and transaction codes
There are transactions that do not have menu paths and the only way to get to them
is by using the transaction codes.
< Operating system level
Be familiar with the file and directory structure
Be able to use the command line to navigate and execute programs
Set up a printer
Chapter 1: Prerequisites and General Information
Special Definitions
Relese 4.0B
14
Perform a backup using standard operating system tools or third-party tools
Perform basic operating system security
Copy and move files
Properly start and stop the operating system and server
< Database level
Properly start and stop the database
Perform a backup of the database
R/3 runs on more than five different versions of UNIX. In many cases, significant
differences exist between these versions. These differences contributed to our decision not
to go into detail at the operating system level.
8pecial Definitions
There are terms used in this guidebook that have very specific meanings. To prevent confusion, they are
defined below:
Application server
This is where R/3 application runs. On a 2 tiered system, this would be combined with the
database server. Application servers can be dedicated to online users, batch processing or a
mix.
Database server
This is where the R/3 and the database resides. The system clock of the database server is
the master clock for the R/3 system.
nstance
An installation of R/3 on a server. Many instances (central, and dialog) make up a system.
More than one instance could exist on a physical server.
8ystem
The complete R/3 installation for a System ID (SID), for example PRD. This logically
consists of the R/3 central instance and dialog instances for that SID. This physically
consists of the database server and application servers for that SID.
Chapter 1: Prerequisites and General Information
Special Definitions
System Administration Made Easy
15
Three-tiered R/3 Configuration
Layers Physical Devices R/3 Instances What Runs on Each Layer
Presentation Desktop PC
many
N/A SAPgui
Application Application Server
none many
Dialog R/3
Database Database Server
- only one
Central Database
Oracle, SQL Server, DB2, Informix,
ADABAS
A two-tiered configuration combines the Application and Database layers on a single server.
8ystem
For an ongoing productive environment, we assume that R/3 is completely and properly
installed and the infrastructure set up and functional. The following checklist will help you
determine if your system is set up to the baseline assumptions of this book. If you can log on
to your system, most of these tasks have already been completed.
Hardware
< Is the server installed?
< Is the backup equipment installed and tested?
nfrastructure
< Is the Online Service System connection established and tested?
< Is the Uninterruptible Power Supply (UPS) installed?
< Is the network configured and tested?
< Is a master time server (clock) available?
< Is a server or system monitor available?
8oftware
< Is the operating system installed?
< Is the database installed?
< Are the following utility software installed (as appropriate)?
Backup program
FTP client
Hardware monitors
Job scheduler
System monitors
Time sync
UPS control
Chapter 1: Prerequisites and General Information
Who Is an R/3 System Administrator?
Relese 4.0B
16
< R/3 System
Is R/3 installed according to SAPs recommendation?
Is the kernel upgraded?
Are hot packs installed to bring you current (as of the installation date)?
Is the TPPARAM file configured?
Is the TMS/CTS configured?
Is the SAProuter configured?
Is the OSS1 transaction configured?
Is the ABAP workbench configured?
Has initial security been configured (default passwords changed)?
< Can users log on to R/3 from their desktops?
Desktop
For optimal results, we recommend that the minimum screen resolution be set as follows:
< For the users 800 600
< For the system administrator 1024 768
Who s an R/3 8ystem Administrator?
Depending on the size of the company and available resources, R/3 administrator(s) may
range from one person to several dozen specialized people in several departments.
Factors that affect an R/3 system administrators tasks, staffing, and roles:
< Size of the company
< Available resources (the size of the Basis group)
< Availability of infrastructure support for:
Desktop support
Database
Network
Facilities
Roles of an R/3 8ystem Administrator
The R/3 system administrator may wear many hats both within or directly related to R/3
and indirectly or external to R/3.
Within R/3
< User administrator
Set up and maintain user accounts
< Security administrator
Create and maintain SAP security profiles
Chapter 1: Prerequisites and General Information
Who Is an R/3 System Administrator?
System Administration Made Easy
17
Monitor and manage security access and violations
< System administrator
Maintain the health of the system
Monitor system performance and logs
< Transport administrator
Transport changes from one system to another
Manage change requests
< Batch scheduler
Create and manage the scheduling of batch jobs
< Backup operator
Schedule, run, and monitor backup jobs of the SAP database and any required
operating system level files
< Disaster recovery technical manager
Create, test, and execute the SAP disaster recovery plan
< Programmer
Apply Online Service System note fixes to programs
< Data Dictionary (DDIC) manager
Change the Data Dictionary (when applicable)
< Data Base Administrator (DBA)
External to R/3
< DBA for the specific database on which the system is running
Manage database specific tasks
Maintain the databases health and integrity
< Operating system administrator
Manage the operating system access and user IDs
Manage operating system specific tasks
< Network administrator
Manage network access and user IDs
Manage network support and maintenance
< Server administrator
Manage the servers
< Desktop support
Supports the users desktop PC
< Facilities
Manages facilities-related support issues, such as:
Power/utilities
Air conditioning (cooling)
Physical server access
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
Relese 4.0B
18
Requirements of an R/3 8ystem Administrator
An R/3 system administrator should:
< Have a proper attitude
Protect and safeguard the system.
The system administrator is the guardian of the system.
Know when to call for help.
The ability to know when you need to get help is a strength.
The weakness is not knowing when to get help and getting into trouble.
Be willing to work the hours required to support the system
Certain tasks must be done after hours or on weekends to avoid disrupting normal
business operations.
< Be technically competent.
When necessary, the company must invest in training for the Basis staff.
You must also take responsibility for your own training and education, whether
your company pays for it or not.
< Be a team-player.
The system administrator will have to work with various functional groups, users,
the IS staff, and others to successfully complete the necessary tasks.
R/3 8ystem Guidelines
When working on an R/3 System, remember to:
< Protect the system
< Ask for help
< Network with other customers and consultants
< Keep it short and simple (KISS)
< Maintain proper documentation
< Use checklists
< Use the appropriate tool for the job
< Perform preventive maintenance
< Not change what you do not have to
< Not make changes to the system during critical periods
< Not allow direct database access
< Keep all non-SAP activity off the SAP servers
< Minimize single points of failure
< Keep Murphys Law in mind
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
System Administration Made Easy
19
Protect the 8ystem
What
Everything you do as a system administrator should be focused on protecting and
maintaining the systems integrity.
Why
< If the systems integrity is compromised, the data in the system could be altered and
people could be making incorrect decisions based on invalid data.
< If the system cannot be recovered after a disaster, your company could be out of
business.
How
< The system administrator must have a positive, professional attitude.
If the system administrator has less than this, critical tasks may not be properly
completed (for example, backups may not be taken as scheduled and backup logs may
not be checked, thus putting at risk a successful recovery of the system in the event of a
disaster).
< System administrators should maintain a my job is on the line attitude.
This attitude helps to ensure that administrators focus on maintaining the integrity of
the system. The company may not survive if the system crashes and cannot be
recovered.
< The system must be protected from both internal and external sources.
One problem today is employees poking around in the network.
Do Not Be Afraid to Ask for Help
Why
< R/3 is so large and complex that no one person can be expected to know everything.
If you are unsure which task to complete or how to complete it, you could make a
mistake and cause a larger problem.
< Mistakes within the system can be very expensive.
Certain things cannot be undone, and once set, are set forever.
< The only way to learn is to ask.
There are no dumb questionsonly dumb reasons for not asking them.
How
< Online Service System notes
< Various Internet web sites and news groups
< Consultants
See also the section in this chapter on networking with other customers and consultants.
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
Relese 4.0B
110
Keep t 8hort and 8imple {K88}
Why
< Complex tasks are more likely to fail, especially as situations change.
A process with 27 steps has 27 chances to fail.
< Complex tasks are difficult to create, debug, and maintain.
< It is difficult to train people for complex tasks.
< If you have to explain a complex task to someone over the telephone, it is likely that
what is said will not be properly understood and an error will be made. If the error is
severe, you may have a disaster on your hands.
How
Keep tasks as simple as possible.
Keep Proper Documentation
What
Document processes, procedures, hardware changes, configuration changes, checks
performed, problems, errors, and so on. If in doubt about what to document, write it all
down.
Why
< As time passes, you will forget the details of a process or problem.
At some point in time, you may not remember anything about the process or problem.
Taken to an extreme, which happens with short-term memory, you can forget the
information in minutes.
< If you violate the KISS principle, then complete documentation becomes even more
important.
< If the process is complex, complete documentation reduces the chance of errors.
< If you are sick or otherwise unavailable, someone else may have to do the job.
< If it becomes necessary to undo the changes you have made, you will know exactly
what needs to be undone.
< Documentation helps train new people.
Turnover is a fact in every company, and you must plan for it. Proper documentation
makes the training and transition of new employees easier and faster.
When
< When documented items change, or when something changes which will affect your
documentation, you must update it.
Inaccurate documentation could be dangerous because it describes a process that should
not be followed.
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
System Administration Made Easy
111
< When changes are made to the system.
< When problems occur (this includes hardware failures, error log entries, and security
violations).
Hot projects or emergencies tend to take precedence over writing documentation. Do
not postpone writing documentation, or the task may never get done. Record everything
that is done to the systemas it is being done.
How
< Record everything done to the system, as it is being done, so details are not
forgotten.
< Document items clearly and sufficiently enough so that, without assistance, a
qualified person can read what you have written and perform the task.
< Re-read older documentation to see where you need to improve it. Obvious items
get fuzzy over time and are no longer obvious.
< Use graphics, flowcharts, and screenshots to clarify documentation.
Where
< Keep a log (notebook) on each server, and record everything that you do on the
servers.
< Keep a log for everything done remotely to any of the servers.
< Keep a diary/log for other related items.
Use Checklists
What
A checklist lists the steps required to complete a task. Each step requires the
acknowledgement of completion (a check) or an entry (date, time, size, and so on).
Why
< Checklists enforce a standardized process and reduce the chance that you will
overlook critical steps (for example, if you were to use a checklist every time you drive a
car, then you would remember to turn off your headlights when you park your car).
< Checklists force you to document events, such as run times, which may later become
important.
When
Checklists are especially useful for tasks that are:
< Complex or critical
If a step is missed or done incorrectly, the result could be serious (for example, inability
to restore the database.
< Done for the first time
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
Relese 4.0B
112
< Done infrequently
It is very difficult to remember how to do a complicated task that you do only once a
year.
How
See examples in Scheduled Tasks.
Use the Appropriate Tool for the Job
Sometimes a low-tech solution is the best. Depending on the situation, a paper-and-pencil
solution may work better and be more cost effective than a computerized solution. And,
paper and pencil still work during a power failure.
Perform Preventive Maintenance
What
Preventive maintenance is the proactive monitoring and maintenance of the system.
Why
< It is less disruptive and stressful if you can plan a convenient time to do a task,
rather than have it develop into an emergency situation.
< Fix a potential problem before it negatively impacts the system and company
operations.
An extreme situation is that the entire system is down until a particular task is
completed (for example, if the Oracle archive redo log file space goes down to zero (0),
the database will stop, and then R/3 stops too. Until sufficient file space is cleared out,
R/3 will not run. When this happens, certain business operations, such as shipping, may
stop).
When
< Checking for problems should be a part of your regular routine.
< The scheduling of tasks to fix a problem should be based on your situation, and
when least disruptive to your users.
How
< Monitor the various logs and event monitors
< Obtain additional disk storage before you run out of room
< Regularly clean the tape drive(s)
< Check the database for consistency and integrity
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
System Administration Made Easy
113
Do Not Change What You Do Not Have To
What
< If the system works, leave it alone.
< Do not change something just to upgrade to the latest version.
Why
< Risk
When something changes, there is a chance that something else may break.
< Cost
Upgrading is expensive in terms of time, resources, cost, consulting, and so on.
< When to Change
A business need exists.
Legal requirements call for an update.
This really is not an option. If you do not keep up you will be out of compliance with
legal requirements. Penalties associated with this could be very expensive.
If the hardware or software release is no longer supported by the vendor.
The new release offers a specific functionality that offers added business value to
your company.
Fixing a problem requires an upgrade.
A fix is unavailable in a patch or an advance release.
Patches are available to solve known problems.
How
< If the change fails or causes problems, make certain you can recover to a before-the-
change condition.
< All changes must be regression tested to make sure that nothing else has been
impacted by the change. In other words, everything still works as it is supposed to.
Regression testing of R/3 involves the functional team and users.
< Stage the change and test it on the:
Test system (a Sandbox system)
Development system
Quality Assurance system
Production system
By the time you reach the production system, you should be comfortable that nothing
will break.
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
Relese 4.0B
114
Do Not Make 8ystem Changes During Critical Periods
What
A critical period is when system disruptions could cause severe operational problems.
Why
If a problem occurs during a critical period, there may be a severe impact to the business.
For example, a system administrator changes a printer in Shipping at the end of the month.
If R/3 cannot send output to the new printer, then the users cannot print shipping
documents and the company cannot ship their products.
End resultrevenue for the month is reduced.
When
A critical period is any time where the users and the company may be severely impacted
by a system problem. These periods differ depending on the particular industry or
company. What is a critical period for one company may not be critical for another
company.
The following are real examples of critical periods:
At end of the month, when Sales and Shipping are booking and shipping as much as
they can to maximize revenue for the month
At the beginning of the month, when Finance is closing the prior month
During the last month of the year, when Sales and Shipping are booking and
shipping as much as they can to maximize the revenue for the year
During the beginning of the year, when Finance is closing the books for the prior
year and getting ready for the financial audit
How
Always coordinate potentially disruptive system events with the users.
Different user groups in the company, such as Finance and Order Entry, will have
different quiet periods that will need to be coordinated.
Plan all potentially disruptive systems-related activities during quiet periods when a
problem will have minimal user impact.
Do Not Allow Direct Access to the Database
What
Direct access to the database is allowing a user to run a query/update directly against the
database without going through R/3.
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
System Administration Made Easy
115
Why
< By not going through R/3, there is the risk of corrupting the database.
< Directly updating the database could put the database out of sync with the R/3
buffers.
How
< When R/3 writes to the database, it could be writing to many different tables. If a
user writes directly to the tables, missing a single table may corrupt the database by
putting the tables out of sync with each other.
< With direct database access, a user could accidentally execute an update or delete,
rather than a read.
Keep all Non-8AP Activity Off the R/3 8ervers
What
< Do not allow users to directly access (telnet, remote access, etc.) the R/3 server(s).
< Do not use the R/3 server as a general file server.
< Do not run programs that are not directly related to R/3 on an R/3 server.
Why
< Security
Not allowing users to have access to the R/3 server reduces the chance of files being
accidentally deleted or changed.
< Performance
Using the production R/3 sever as a file server creates resource contention, where
performance is a primary concern. Programs running on the R/3 servers will contend
for the same resources that R/3 is using, which affects the performance of R/3.
How
Use other servers to perform functions not related to R/3.
Minimize 8ingle Points of Failure
What
A single-point failure is when the failure of a single component, task, or activity causes
the system to fail, or creates a critical event.
Why
Each single-point failure increases the chances of a system failure or other critical event or
condition. For example:
< If you have only one tape drive, and it fails,
then you cannot back up your database.
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
Relese 4.0B
116
< If you rely on utility line power, and do not have a UPS,
then the server will crash during a power failure, possibly corrupting the database.
< If you are the only one who can complete a task, and you go on vacation,
then the task will not be completed until you return or you will be on call while on
vacation.
To guard against single-point failure, consider the following options:
< Redundant equipment, such as dual power supplies
< On-hand spares
< Systems configured with a built-in backup, or a redundant process
< Sufficient personnel
< Cross-training
< On-call consultants
< Outsourcing
Network with Other Customers and Consultants
What
Get to know R/3 Basis and system administrators in other companies.
Why
< Other customers may be able to provide solutions to your problems.
< Customers who help each other reduce their consulting expenses.
< The more people you know, the better your chances of finding someone to help you
solve a problem.
When, Where, and How
When you have the opportunity, meet:
< Other SAP customers and consultants, especially those in your specialty area
< Others using your operating system or database
Where to network:
< Training classes
< SAP functions
Technical Education Conference (TechEd)
SAPPHIRE
< Participate in user groups:
Americas SAP Users Group (ASUG)
Regional SAP users groups
Database user groups, such as those for Oracle, Microsoft SQL Server, Informix, or
DB2
Operating system user groups, such as those for Unix (the various versions), NT, or
IBM (AIX, AS400 or OS390)
Chapter 1: Prerequisites and General Information
R/3 System Guidelines
System Administration Made Easy
117
< Participate in professional organizations.
Participation means getting involved in the organization. The more you participate, the
more people you meet and get to know.
Whenever you attend an event, carry a stack of business cards.
Set the goal of handing out and collecting at least ten business cards.
Do not forget to ask the old-timers. Decades ago, the mainframe community may have
solved many of the issues and problems you now face.
Corollaries to Murphys Law
Murphys Law states: Whatever can go wrong will go wrong.
The following are some corollaries to Murphys Law:
< Without telling you, someone will change something in the infrastructure and crash
the system.
< Upgrades to fix a problem will break something else.
< When the power fails, you find out that the battery in your UPS is dead.
< If you have only one tape drive, it will fail.
< The one thing that you did not test is where the problem is.
< Someone will need a network jumper cable, and will remove it from your server.
< When disaster strikes, you will be out of town or unavailable .
< Disaster will strike at the worst time.
< Problems always happen at 2:00 AM
< Problems come in clusters.
< The latest full backup tape will be bad.
< The one time you did not check the backup log will be the time when the backup
fails.
< You will need a tape from the backup that failed.
< The computer room will be destroyedalong with all your backup tapes.
< What you did not write down, and forgot, is what you need to know.
< User transparent, is not.
< The Peter Principle will strike. (Peter Principle states: In a hierarchy every employee
tends to rise to his level of incompetence.)
< A shortcut is the longest distance between two points.
< When you need to send an alpha page, a link in the e-mail system will fail.
< When a disaster strikes, and you need to be found, you will be out of the pager or
cell phone coverage area.
Chapter 1: Prerequisites and General Information
Types of Tasks
Relese 4.0B
118
< When a disaster strikes, and you need to be contacted, the battery in your pager will
be dead.
Types of Tasks
Regularly 8cheduled Tasks
Chapters 48
This section lists regularly scheduled tasks that the system administrator should complete:
< Daily
< Weekly
< Monthly
< Quarterly
< Annually
Depending on your company and your companys situation, some of these tasks may be
done more or less frequently than suggested. You and your Basis consultant should review
the schedule together to make the necessary adjustments, additions, and deletions for your
environment.
Those of you with Ready-to-Run-R/3 systems will find this section similar to your Online
System Administration Assistant, transaction SSAA (or Tools Administration, then Monitor
System Administration Assistant).
8ample Checklists
The checklists are organized in the following order:
< Critical tasks (daily only)
< R/3 tasks
< Database tasks
< Operating system tasks
< Other
For your convenience, we have provided these checklists in Microsoft Word 97 and Word
95 file formats on the CD inside the back cover of this guidebook. You should tailor these
checklists to your companys environment. Operating system and database-specific items
that do not apply should be removed where appropriate. For example, if you are running
Oracle on NT, you should remove entries that are specific to Oracle on UNIX and MS-SQL
Server. If you have other tasks that should be completed, modify the appropriate checklist
to include them.
< When you use a checklist, indicate the:
System (DEV, PRD, or QAS)
Date
Administrator who completed the checklist
Chapter 1: Prerequisites and General Information
Types of Tasks
System Administration Made Easy
119
< Each task should document:
Completion of the task
Entry of relevant or applicable data (for example, size, number, users, and so on)
A detailed description of any problems
The entire error message should be written down, because there can sometimes be
several similar messages.
< File the completed checklist in a binder, first by system (DEV, QAS, PRD), and then
by date.
Nonscheduled Tasks
Chapters 914
There are additional tasks that a system administrator must perform. These tasks are
completed on an as needed basis.
Nonscheduled tasks are divided into the following major categories:
< User administration
< System administration
< Special maintenance
< Task management
< Remote services
User Administration
The following is a list of nonscheduled tasks for user administration:
< New user setup
< Maintain a user
< Reset a password
< Lock or unlock a user
< Maintain a table of prohibited passwords
8ystem Administration
The following is a list of nonscheduled system administration tasks:
< Create a system message
< Start or stop the system
< Create and schedule a batch job
< Transport objects
Chapter 1: Prerequisites and General Information
Types of Tasks
Relese 4.0B
120
Maintenance
The following is a list of important nonscheduled maintenance tasks:
< Changing system profile parameters
< Applying hot packages or legal change patches
< Upgrading the kernel
< Production refresh strategies (refreshing system[s] from the production system)
< Client copy (create, copy, and delete)
Task Management
Task management is the tracking and management of:
< Online Service System notes that are applied to your system
< Transporting objects from system to system
Remote 8ervices
Remote services deals with utilizing SAP services remotely (Online Service System and
SAPSERV4) and the EarlyWatch system check function.

You might also like