Search Results
43 results found with an empty search
- SAP NFe | (CV) SAP FICO Arquiteto de Soluções
Somos movidos pelo propósito de criar valor e gerar impacto para nossos clientes. Ajudando empresas a atingirem seus objetivos e construírem um futuro melhor. Disponivel para projetos: 100% Remotos SAP S/4 HANA FICO Arquiteto de Soluções, Lider ou Consultor Senior Modelo PJ Baixar CV Disponibilidade Taxa/Hora SAP S/4 HANA FI 1909 SAP Design Thinking Deloitte Lean Six Sigma Belt SAP S/4 HANA FI 1909 1/6 Arquiteto de soluções SAP S/4 FICO com 18+ anos de experiência em implementação e integração de negócios, adequação e cumprimento de projetos de grande porte com alta complexidade, capaz de implementar e resolver desafios de negócios de missão crítica. Tenho um currículo repleto de projetos entregues com sucesso, fornecendo consultoria técnica qualificada e treinamento personalizado. Experiência Finance 20 Years ▇▇▇▇▇▇▇▇▇ Controlling 20 Years ▇▇▇▇▇▇▇▇▇ Material Ledger 20 Years ▇▇▇▇▇▇▇▇▇ CO-PC 20 Years ▇▇▇▇▇▇▇▇▇ CO-PA 20 Years ▇▇▇▇▇▇▇▇▇ Cash Mgnt 20 Years ▇▇▇▇▇▇▇▇▇ Credit Mgnt 10 Years ▇▇▇▇▇ Tax 16 Years ▇▇▇▇▇▇ FM 04 Years ▇▇▇▇ ABAP 05 Years ▇▇▇ CFIN 03 Years ▇▇▇ FI-CA 01 Years ▇ Retail 04 Years ▇▇▇▇ Número de Projetos Full Lifecycle 05 Prjs ▇▇▇▇▇ S/4 HANA 07 Prjs ▇▇▇▇▇▇▇ Greenfield 06 Prjs ▇▇▇▇▇▇ Rollout 10 Prjs ▇▇▇▇▇▇▇▇▇ Improvements 09 Prjs ▇▇▇▇▇▇▇▇ Blueprints 02 Prjs ▇ QA 02 Prjs ▇▇ PoC 01 Prj ▇ Upgrades 01 Prj ▇ Indústrias Agribusiness 03 Prjs ▇▇▇ Automotive 01 Prj ▇ Beverage 02 Prjs ▇▇ Biotech 01 Prj ▇ Chemical 06 Prjs ▇▇▇▇▇ Cons. Goods 01 Prj ▇ Finance 01 Prj ▇ Food 02 Prjs ▇▇ Healthcare 01 Prj ▇ Manufacture 03 Prjs ▇▇▇ Media 01 Prj ▇ Mining 01 Prj ▇ Oil & Gas 01 Prj ▇ Paper 01 Prj ▇ Pharma 04 Prjs ▇▇▇▇ Metals 01 Prj ▇ Public Sector 01 Prj ▇ Retail 03 Prjs ▇▇▇ Tech. / Serv. 03 Prjs ▇▇▇ Missão Ajudar as empresas a executar melhor o SAP Melhorando processos, executando soluções custo efetivas e criando valor Aplicando as melhores práticas e trazendo o sistema de volta ao padrão Portfolio de Consultorias Accenture | Capgemini | Cast Group | Deloitte | Engineering | Everis | EY | iGate | Infosys | PwC | SAP Integrações Integração com MM, SD, PP, PS, QM, PM, BW/BI, PI/PO e PLM cProjects, para projetar soluções integradas SAP e sistemas legados. Soluções SAP Solutions for Tax Engine, Country versions, Revenue Recognition, Legal statements, Bank communication and Consolidation. Migração de Dados Coleta de dados | Limpeza de dados | Transformação de dados | Migração de dados SAP CFIN Central Finance Transformation LSMW Legacy System Migration (com código ABAP incorporado) LMTC Legacy Transfer Migration Cockpit Indústrias Agronegócio | Aeroespacial | Automotivo | Bebidas | Biotecnologia | Química | Bens de consumo | Finanças | Alimentos | Fracking | Assistência médica | Fabricação | Mídia | Metais e mineração | Petróleo e gás | Metais preciosos | Setor público | Papel e celulose | Farmacêutico | Varejo | Serviços | Tecnologia | Telecomunicações SAP IS-Solutions SAP PSCD Public Sector Collection and Disbursement | SAP FI-CA Contract Accounting | SAP POS-DM (Retail/Varejo) Gestão de Dados de Ponto de Venda Educação 2016 MBA Strategic Management in Information Technology FGV 2015 Alumni Program Technology, Organizations and Innovation MIT 2015 Bachelor’s Degree Economics (Leave of Absence) Paulista University 2011 Bachelor’s Degree Accounting Paulista University 2004 Bachelor’s Degree Business Administration Mackenzie University Certificações 2021 Design Thinking [+] SAP Certified Associate Design Thinking SAP 2020 SAP S/4 FI [+] SAP S/4 HANA 1909 for Financial Accounting Associates SAP 2013 ITIL [+] ITIL v3 Foundation Certification EXIN 2012 COBIT COBIT 4.1 Foundation Certification ISACA 2009 Lean/Six Sigma Lean/Six Sigma Certification (Yellow Belt) Deloitte 2008 SAP FI SAP ECC 6.0 for Financial Accounting Associates SAP Qualificação e Atividades Profissionais 2020 Agile Agile with Jira (SCRUM and KANBAN) Coursera 2020 SAP TRM SAP TRM Tax and Revenue Management Capgemini 2020 SAP PSCD SAP PSCD Public Sector Collection and Disbursement Capgemini 2020 SAP S/4 FI SAP S/4 Financial Accounting in S/4HANA 1909 SAP 2017 SAP ABAP SAP ABAP Academy SAP 2015 SAP Simple FI SAP HANA Simple Finance, S/4 HANA Migration SAP 2014 SAP NF-e SAP NF-e Nota Fiscal Eletronica 3.10 with GRC Tech Consulting 2013 ITIL ITIL V3 Foundations KA Solution 2012 SAP Material Ledger SAP CO Brazil Localization (Material Ledger) SAP 2012 SAP NF-e GRC SAP NF-e 10.0 with GRC, WBRNFE_10 SAP 2012 SAP NewGL SAP NewGL (New General Ledger) SAP 2012 COBIT COBIT 4.1 Foundations KA Solution 2012 SQL SQL, Microsoft SQL Server Writing Queries KA Solution 2011 SAP CO SAP CO Academy (Controlling Accounting) SAP 2010 HPQC HP Quality Center SAP 2010 SAP InfoPak SAP InfoPak, Documentation Tool SAP 2009 Lean/Six Sigma Lean/Six Sigma (Green Belt Academy) Deloitte 2009 IFRS IFRS, Concepts and Preparation Deloitte 2008 SAP FI SAP FI Brazil Localization SAP 2008 SAP SolMan SAP Solution Manager Deloitte 2008 HPQC HP Quality Center, Mercury HP 2007 SAP FI SAP FI Academy (Financial Accounting) SAP 2007 SAP R/3 SAP BootCamp R/3 4.6c, FI,CO,MM,SD,PP Modules Deloitte
- SAP NFe | (CV) SAP FICO Solution Architect
We are driven by the purpose of creating value and generating impact for our clients. Helping businesses to achieve its goals and building better future. Available for SAP FI/CO Projects Greenfields, Rollouts, Improvements, POCs and Upgrades As Consultant, SME, Team Leader or Solution Architect New technologies like S/4 HANA are preferable Download CV Availability Phone SAP S/4 HANA FI 1909 SAP Design Thinking Deloitte Lean Six Sigma Belt SAP S/4 HANA FI 1909 1/6 I'm SAP S/4 FICO Solution Architect with 20 years of experience in implementation and business integration, fitment and fulfillment for big sized projects with high complexity, able to implement and solve mission-critical business challenges. I have a full resume with successful delivered projects by providing skilled technical consulting and custom training. Years of Experience Finance 20 Years ▇▇▇▇▇▇▇▇▇ Controlling 20 Years ▇▇▇▇▇▇▇▇▇ Material Ledger 20 Years ▇▇▇▇▇▇▇▇▇ CO-PC 20 Years ▇▇▇▇▇▇▇▇▇ CO-PA 20 Years ▇▇▇▇▇▇▇▇▇ Cash Mgnt 20 Years ▇▇▇▇▇▇▇▇▇ Credit Mgnt 10 Years ▇▇▇▇▇ Tax 16 Years ▇▇▇▇▇▇ FM 04 Years ▇▇▇▇ ABAP 05 Years ▇▇▇ CFIN 03 Years ▇▇▇ FI-CA 01 Years ▇ Retail 04 Years ▇▇▇▇ Number of Projects Full Lifecycle 05 Prjs ▇▇▇▇▇ S/4 HANA 07 Prjs ▇▇▇▇▇▇▇ Greenfield 06 Prjs ▇▇▇▇▇▇ Rollout 10 Prjs ▇▇▇▇▇▇▇▇▇ Improvements 09 Prjs ▇▇▇▇▇▇▇▇ Blueprints 02 Prjs ▇ QA 02 Prjs ▇▇ PoC 01 Prj ▇ Upgrades 01 Prj ▇ Industry Sectors Agribusiness 03 Prjs ▇▇▇ Automotive 01 Prj ▇ Beverage 02 Prjs ▇▇ Biotech 01 Prj ▇ Chemical 06 Prjs ▇▇▇▇▇ Cons. Goods 01 Prj ▇ Finance 01 Prj ▇ Food 02 Prjs ▇▇ Healthcare 01 Prj ▇ Manufacture 03 Prjs ▇▇▇ Media 01 Prj ▇ Mining 01 Prj ▇ Oil & Gas 01 Prj ▇ Paper 01 Prj ▇ Pharma 04 Prjs ▇▇▇▇ Metals 01 Prj ▇ Public Sector 01 Prj ▇ Retail 03 Prjs ▇▇▇ Tech. / Serv. 03 Prjs ▇▇▇ My Mission To help companies run SAP better Improving processes, running cost-effective solutions and creating value Applying best practices and bringing the system back to standard Consultancies in my Portfolio Accenture | Capgemini | Cast Group | Deloitte | Engineering | Everis | EY | iGate | Infosys | PwC | SAP Integration Skills Integration with MM, SD, PP, PS, QM, PM, BW/BI, PI/PO and PLM cProjects, to design architectural solutions in SAP and also legacy systems. Solution Skills SAP Solutions for Tax Engine, Country versions, Revenue Recognition, Legal statements, Bank communication and Consolidation. Data Migration Data Collection / Data Cleansing / Data Transformation / Data Migration SAP CFIN Central Finance Transformation LSMW Legacy System Migration (accelerated with embedded ABAP code) LMTC Legacy Transfer Migration Cockpit Industry Solutions Agribusiness | Aerospace | Automotive | Beverage | Biotechnology | Chemical | Consumer Goods | Finance | Food | Fracking | Health Care | Manufacture | Media | Metals & Mining | Oil & Gas | Precious Metals | Public Sector | Paper & Cellulose | Pharmaceutical | Retail | Services | Technology | Telecommunication | Utilities SAP IS-Solutions SAP PSCD Public Sector Collection and Disbursement | SAP FI-CA Contract Accounting | SAP POS-DM (Retail) Point of Sale Data Management Education 2016 MBA Strategic Management in Information Technology FGV 2015 Alumni Program Technology, Organizations and Innovation MIT 2015 Bachelor’s Degree Economics (Leave of Absence) Paulista University 2011 Bachelor’s Degree Accounting Paulista University 2004 Bachelor’s Degree Business Administration Mackenzie University Certification 2021 Design Thinking [+] SAP Certified Associate Design Thinking SAP 2020 SAP S/4 FI [+] SAP S/4 HANA 1909 for Financial Accounting Associates SAP 2013 ITIL [+] ITIL v3 Foundation Certification EXIN 2012 COBIT COBIT 4.1 Foundation Certification ISACA 2009 Lean/Six Sigma Lean/Six Sigma Certification (Yellow Belt) Deloitte 2008 SAP FI SAP ECC 6.0 for Financial Accounting Associates SAP Qualifications and Professional Activities 2020 Agile Agile with Jira (SCRUM and KANBAN) Coursera 2020 SAP TRM SAP TRM Tax and Revenue Management Capgemini 2020 SAP PSCD SAP PSCD Public Sector Collection and Disbursement Capgemini 2020 SAP S/4 FI SAP S/4 Financial Accounting in S/4HANA 1909 SAP 2017 SAP ABAP SAP ABAP Academy SAP 2015 SAP Simple FI SAP HANA Simple Finance, S/4 HANA Migration SAP 2014 SAP NF-e SAP NF-e Nota Fiscal Eletronica 3.10 with GRC Tech Consulting 2013 ITIL ITIL V3 Foundations KA Solution 2012 SAP Material Ledger SAP CO Brazil Localization (Material Ledger) SAP 2012 SAP NF-e GRC SAP NF-e 10.0 with GRC, WBRNFE_10 SAP 2012 SAP NewGL SAP NewGL (New General Ledger) SAP 2012 COBIT COBIT 4.1 Foundations KA Solution 2012 SQL SQL, Microsoft SQL Server Writing Queries KA Solution 2011 SAP CO SAP CO Academy (Controlling Accounting) SAP 2010 HPQC HP Quality Center SAP 2010 SAP InfoPak SAP InfoPak, Documentation Tool SAP 2009 Lean/Six Sigma Lean/Six Sigma (Green Belt Academy) Deloitte 2009 IFRS IFRS, Concepts and Preparation Deloitte 2008 SAP FI SAP FI Brazil Localization SAP 2008 SAP SolMan SAP Solution Manager Deloitte 2008 HPQC HP Quality Center, Mercury HP 2007 SAP FI SAP FI Academy (Financial Accounting) SAP 2007 SAP R/3 SAP BootCamp R/3 4.6c, FI,CO,MM,SD,PP Modules Deloitte
- SAP NFe | Methodologies
A method is a structured procedure for bringing about a certain goal, like acquiring knowledge or verifying knowledge claims. This normally involves various steps, like choosing a sample, collecting data from this sample, and interpreting the data. Methodologies In its most common sense, methodology is the study of research methods. However, the term can also refer to the methods themselves or to the philosophical discussion of associated background assumptions. A method is a structured procedure for bringing about a certain goal, like acquiring knowledge or verifying knowledge claims. This normally involves various steps, like choosing a sample, collecting data from this sample, and interpreting the data. The study of methods concerns a detailed description and analysis of these processes. It includes evaluative aspects by comparing different methods. This way, it is assessed what advantages and disadvantages they have and for what research goals they may be used. These descriptions and evaluations depend on philosophical background assumptions. Examples are how to conceptualize the studied phenomena and what constitutes evidence for or against them. When understood in the widest sense, methodology also includes the discussion of these more abstract issues. Methodologies to Save Time Eat The Frog The idea is that you identify one challenging task (the frog) and complete the task first thing in the morning (eating it). To put it simply, eating the frog is the process of identifying your most difficult task of the day and completing it before you do any other work. 3-3-3 Method 3 Hours Deep Work: Most critical and important things 3 Hours Shorter Tasks: Urgent tasks that you've been avoiding but need to be completed 3 Hours Maintenance Tasks: Activities to keep life in order Warren Buffett's 5/25 Rule Identify the top 25 important tasks Prioritize them by importance Only focus on the top 5 tasks Ignore the remaining 20 tasks 80/20 Rule (Pareto Principle) The 80/20 rule maintains that 80% of outcomes comes from 20% of causes. The 80/20 rule prioritizes the 20% of factors that will produce the best results. A principle of the 80/20 rule is to identify an entity's best assets and use them efficiently to create maximum value. Identify the vital 20% that will produce the best results That 20% will eliminate or reduce the trivial 80% Pomodoro Technique Decide Task Set timer 25 minutes Stop when timer goes off Take 5 minutes break After 4 cycles take 15-30 minutes break ABCDE Method Categorize tasks and execute by importance A - Most Important B - Important C - Nice To Do D - Delegate E - Eliminate MSCW Method Must-Have: Critical for project success Should-Have: Important but not critical Could-Have: Desirable, if time and resource Won't-Have: Deferred for future phases Pickle Jar Method (Glass Jar) The idea is that you should always start with your rocks (high-priority tasks), followed by your pebbles (medium-priority tasks), and then your sand (low-priority tasks). Finish off by filling the jar with water (“off” time). Do major tasks first Slot in minor tasks around the major ones Continuously assess and reprioritized tasks 1-3-5 Method The 1-3-5 Rule is a structured technique by which you can categorize your tasks into a to-do list that is proven to increase productivity. This rule asks you to accomplish 1 big mission, 3 medium tasks, and 5 small things. 1 Major Task 3 Medium Tasks 5 Small Tasks Eisenhower Matrix The Eisenhower Matrix is also known as the time management matrix, the Eisenhower Box, and the urgent-important matrix. This tool helps you divide your tasks into four categories: the tasks you'll do first, the tasks you'll schedule for later, the tasks you'll delegate, and the tasks you'll delete. Important /Urgent: Do - Tasks with clear deadlines and significance consequences if not completed in a timely fashion Important /Not Urgent: Schedule - Tasks with no set deadline but that bring you closer to your long-term goals Not Important / Urgent: Delegate - Tasks that need to get done, but don't need your expertise in order to be completed Not Important / Not Urgent: Delete - Tasks that distract you from your preferred course, and don't add any measurable value Getting Things Done Method (GTD) GTD method operates with the belief that the more information you're mentally keeping track of, the less productive and focused you are. Instead of relying on your brain, the GTD methodology encourages you to store all of your work information in an external, organized source of truth. Capture Tasks Clarify Their Meaning Organize Them Into Lists Reflect On Progress Engage With Action 2-Minute Rule The 2-Minute Rule was created to help reducing procrastination by enabling you to tackle small tasks that often get overlooked. If task is less than 2 minutes do it now If task is greater than 2 minutes delegate or defer Task Batching Technique Task batching is a productivity strategy that involves grouping similar tasks together to complete all at once. This technique can help you avoid multitasking and increase the amount of time you have to focus on tasks. Sort Similar Tasks Block Deliciated Time Do Tasks In Batches Time Batching Technique Time blocking is a time management technique where you schedule how you'll spend each day, one block at a time. For every task you need to complete, decide how much time (roughly) it'll take, and add that amount of time to your calendar. 08:00am - 11:00am: Deep Work (Your most important tasks) 11:00am - 11:30am: Quick Tasks (Emails, phone calls, etc) 11:30am - 12:30pm: Break (eat, exercise, relax) 12:30pm - 02:00pm: Important Tasks (Projects, planning, etc) 02:00pm - 04:00pm: Meetings (one-on-ones, follow ups) Agile Methodology The Agile methodology is a project management approach that involves breaking the project into phases and emphasizes continuous collaboration and improvement. Teams follow a cycle of planning, executing, and evaluating. Kanban
- Firewall
pfSense is a free, open-source firewall and router computer software distribution based on FreeBSD. The open source pfSense Community Edition and pfSense Plus is installed on a physical computer or a virtual machine to make a dedicated firewall/router for a network. Up Firewall pfSense pfSense | Forgotten Password pfSense | SNMP pfSense | IPv6 | Disabling IPv6 pfSense | Notifications pfSense | OpenVPN | NordVPN pfSense | WireGuard | NordVPN (Nordlynx Protocol) pfSense | Bufferbloat pfSense | DNS over TLS | DNS Resolver pfSense | DNS Setup Firewall Logs | Messages > WPAD | Web Proxy Auto-Discovery pfSense pfSense is a free, open-source firewall and router computer software distribution based on FreeBSD. The open source pfSense Community Edition and pfSense Plus is installed on a physical computer or a virtual machine to make a dedicated firewall/router for a network. Features: pfSense offers a range of features, including a firewall, VPN, router, DHCP server, DNS server, and WAN load balancer Management: pfSense is managed through a web interface, so there's no need to use the command line or manually edit rule sets Distribution: pfSense is based on the FreeBSD operating system and includes third-party software packages for additional functionality Versions: There are two versions of pfSense: pfSense Community Edition (CE), which is free and open-source, and pfSense Plus, which is used by businesses, governments, educational institutions, and service providers Use cases: pfSense is used in a variety of settings, including small home networks, large corporations, universities, and government agencies Performance: pfSense is designed to provide high levels of performance and stability Development: pfSense is developed and hosted by Rubicon Communications, LLC (Netgate) What is FreeBSD? FreeBSD is a free, open-source operating system that's based on the Berkeley Software Distribution (BSD) and is used in many different environments. Features: FreeBSD is known for its stability, reliability, security, and performance. It has many features, including jails, virtualization, and ZFS boot environments Uses: FreeBSD is used to power modern servers, desktops, and embedded platforms. It's the platform of choice for many of the busiest web sites and most pervasive embedded networking and storage devices History: The first version of FreeBSD was released in 1993, and the latest release is 14.1 (4 June 2024) Development: The FreeBSD Project is supported and promoted by the FreeBSD Foundation. A large community has continually developed FreeBSD for more than thirty years. Architecture: FreeBSD runs on IA-32, x86-64, ARM, PowerPC, and RISC-V processors pfSense | System General Setup System | pfSense Path: System > General Setup Hostname: pfSense (Default) Domain: home.arpa (Default) pfSense recommends to not end the domain name with '.local' as the final part (Top Level Domain, TLD), because 'local' TLD is widely used and it will not network correctly. That is why it recommends "home.arpa" (Acronym ARPA stands for Address and Routing Parameter Area Domain) Admin Access WebConfigurator | Path: System > Advanced > Admin Access If you want to access your pfSense web interface outside your internal network, you may face a error. This happens because pfSense blocks the Browser HTTPS_REFERER. You can disable this feature: Browser HTTP_REFERER enforcement | Disable HTTP_REFERER enforcement check: Check pfSense | Forgotten Password The firewall administrator password can easily be reset using the firewall console if it has been lost. Access the physical console (Connect to the Console) Use option "3" (Reset admin account and password) to change the password for the admin account This option can also reset the "admin" account if it is disabled or expired. pfSense | SNMP The SNMP (Simple Network Management Protocol) daemon enables remote monitoring of certain pfSense software parameters. The SNMP daemon supports monitoring: Network Traffic Network Flows PF Queues General System Information CPU Memory Disk Usage Additional Information SNMP Version: SNMPv1/v2 Memory usage: Using the SNMP service can increase memory usage by an average of 7% How to use it: The easiest way to see the available data is to run 'snmpwalk' against the firewall from another host with 'net-snmp' or an equivalent package installed Configuring SNMP Services Go to | Services > SNMP Enable the SNMP Daemon and its controls | Check Polling Port | 161 System Location | firewall System Contact | @gmail.com Read Community String | Public SNMP modules | Check MibII, Netgraph, PF, Host Resources, UCD ,Regex Internet Protocol | IPv4 Bind Interfaces | LAN Save it Services > SNMP Services > SNMP 1/1 SNMP Daemon Settings Polling Port | SNMP connections are made using only UDP, and SNMP clients default to using UDP port 161 System location | A string to return when an SNMP client requests the system location. Any text may be used here. For some devices a city or state may be close enough System contact | A string defining contact information for the system. It can be a name, an e-mail address, a phone number, or whatever is needed Read Community String | The community string acts as a kind of username and password in one. SNMP clients will need to use this community string when polling. The default value of public is common, so the best practice is to use a different value in addition to restricting access to the SNMP service with firewall rules Modules Loadable modules allow the SNMP daemon to understand and respond to queries for additional system information. Each loaded module consumes additional resources. As such, ensure that only required modules are loaded. MibII | This module provides information specified in the standard MIB II tree, which covers networking information and interfaces. Having this module loaded will provide network interface information including status, hardware and IP addresses, the amount of data transmitted and received, and much more Netgraph | The netgraph module provides netgraph-related information such as netgraph node names and statuses, hook peers, and errors PF | The PF module provides a wealth of information about the pf packet filter. The MIB tree covers aspects of the ruleset, states, interfaces, tables, and ALTQ queues Host Resources | This module provides information about the host itself. This includes uptime, load average and processes, storage types and usage, attached system devices, and even installed software (This module requires MibII. If MibII is unchecked when this option is checked, MibII will be checked automatically) UCD | This module provides various system information knows as the ucdavis MIB, or UCD-SNMP-MIB. It provides information about memory usage, disk usage, running programs, and more. Regex | The Regex module is reserved for future use or use by users customizing the code to their needs. It allows creating SNMP counters from log files or other text files Interface Binding Binding to a specific local interface can ease communication over VPN tunnels as it eliminates the need for workarounds like static routes. It also provides extra security by not exposing the service to other interfaces. It can also improve communication over multiple local interfaces, since the SNMP daemon will reply from the “closest” address to a source IP address and not the IP address to which a client sent its query. Internet Protocol | This controls whether the SNMP daemon will listen for queries on IPv4, IPv6, or both Bind Interfaces | This option configures the SNMP daemon to listen only on the chosen interface or virtual IP address. All interfaces with IP addresses, CARP VIPs, and IP Alias VIPs are displayed in the drop-down list pfSense | IPv6 | Disabling IPv6 You can disable IPv6 on your pfSense, if your ISP does not provide IPv6 services for you. Normally IPv6 is enabled by default on pfSense and there is no problem with that. But sometimes you want to use only IPv4 or you may have some problems with IPv6, such as: The Windows Network Bridge adapter may stop working properly after some updates, because it is also enabled on the adapter (You can choose to disable IPv6 on the Bridge adapter) You may have too many blocking entries in the firewall log, making analysis difficult How to disable IPv6 Blocking IPv6 traffic | System > Advanced > Networking | Allow IPv6: Uncheck Save and Apply Turning on Logging Firewall Default Blocks | Status > System Logs > Settings | Log firewall default blocks: Check all Log Packets Save Disabling DHCPv6 Relay | Services > DHCPV6 Relay | Enable DHCPv6 Relay: Uncheck Save and Apply Disabling DHCPv6 on WAN Interface | Interface | Select your WAN interface | IPv6 Configuration Type: None Save and Apply Disabling DHCPv6 Server | Services > DHCPv6 Server | Enable DHCPv6 server on LAN interface: Uncheck (Optional) If you have several interfaces, repeat this step for all interfaces Save and Apply Disabling Router Advertisement | Services > Router Advertisement | Router Mode: Disabled Save Disabling DHCPv6 on LAN Interface | Interface | Select your LAN interface | IPv6 Configuration Type: None (Optional) If you have several interfaces, repeat this step for all interfaces Save and Apply Removing Default Gateway | System > Routing > Gateways | Default gateway IPv6: None Save and Apply pfSense | Notifications The firewall can notify administrators of important events and errors by displaying an alert in the menu bar, indicated by the fa-"bell" icon. In addition to GUI notifications, the firewall also supports the following notification methods: Remote: E-mail using SMTP Telegram notification API Pushover notification API Slack notification API Local: LED indicators on supported hardware (not configurable) Sounds using a PC speaker Setup Notification via E-Mail using GMail SMTP On pfSense Go to System > Advanced > Notifications Disable SMTP | Uncheck E-Mail server | smtp.gmail.com SMTP port of E-Mail server | 465 Secure SMTP Connection | Enable SMTP over SSL/TLS | Check Validate TLS/SSL | Validate the SSL/TLS certificate presented by the server | Check From e-mail address | Notification E-Mail address | Notification E-Mail auth username (optional) | Notification E-Mail auth password | Confirm the password | Notification E-Mail auth mechanism | PLAIN Save Test SMTP Settings | Click the "Test SMTP Settings" button System > Advanced > Notifications Notifications via E-Mail SMTP System > Advanced > Notifications 1/2 Tips "From e-mail address" Field | This is the sender's address of the email "Notification E-Mail address" Field | This is the recipient's email address. You can use GMail "Plus Addressing". Check it here Example: +@gmail.com / johnsmith+pfsense@gmail.com "Notification E-Mail auth username (optional) |Account email to access GMail "Notification E-Mail auth password" Field | You cannot use the same password that you use to log into your Gmail account. You need to generate the "App Password" pfSense | OpenVPN | NordVPN NordVPN Steps Find the best server for you connection or select manually NordVPN Server Tool: https://nordvpn.com/servers/tools/ Check the protocols and download the Config File Open the file using Notepad Find your Access Token (User and Password) NordVPN Account: https://my.nordaccount.com/ pfSense Configuration Steps Create the Certificate (System -> Certificate -> Authorities) Crete the OpenVPN Client (VPN -> OpenVPN -> Clients) Check Instance (Status -> OpenVPN) Assign Interfaces (Interfaces -> Interface Assignments) Create Aliases (Firewall -> Aliases -> IP) Update NAT Outbound (Firewall -> NAT -> Outbound) Update LAN Rules (Firewall -> Rules -> LAN) Update Gateway IP Monitoring (System -> Routing -> Gateways) Check Gateway Status (Status -> Gateways) Install Watchdog Service (System -> Package Manager -> Available Packages) Add NordVPN as a Service in Watchdog (Services -> Service Watchdog) pfsense_NordVPN_01 pfsense_NordVPN_02 pfsense_NordVPN_07 pfsense_NordVPN_01 1/7 pfSense | WireGuard | NordVPN (Nordlynx Protocol) High Level Steps (Summary) Get NordVPN API Information | Private Key, Public Key and IP Address Install WireGuard Package | System > Package Manager > Available Packages Configure WireGuard | VPN > WireGuard Assign and Configure Interface | Interfaces > Interfaces Assignments Create Alias | Firewall > Aliases Configure Firewall NAT | Firewall > NAT > Outbound Configure Firewall Rules | Firewall > Rules > LAN (Optional) Add WireGuard as Service in Watchdog | Services > Service Watchdog NordVPN API Information Create an Access Token | Hyperlink: https://my.nordaccount.com/dashboard/nordvpn/manual-configuration/ Get your Private Key | Command: curl -s -u token: https://api.nordvpn.com/v1/users/services/credentials | jq -r .nordlynx_private_key Get Server Info and Public Key| Command: curl -s "https://api.nordvpn.com/v1/servers/recommendations?&filters\[servers_technologies\]\[identifier\]=wireguard_udp&limit=1" | jq -r '.[]|.hostname, .station, (.locations|.[]|.country|.city.name), (.locations|.[]|.country|.name), (.technologies|.[].metadata|.[].value), .load' WireGuard Configuration Steps Install WireGuard Package | System > Package Manager -> Available Packages Search for 'WireGuard' and Install it Configure WireGuard Tunnel | VPN > WireGuard > Tunnels Enable Tunnel | Check it Description | Listen Port | 51820 Interface Key | Interface Address (NordVPN Address)| 10.5.0.2 / 32 Description | Save it Configure WireGuard Peers | VPN > WireGuard > Peers Enable Peer | Check it Tunnel | tun_wg0 Description | Dynamic Endpoint | Uncheck it Endpoint | Port| 51820 Keep Alive | 25 Allowed IPs (Allow all IPs)| 0.0.0.0 / 0 Description | Save it pfSense WireGuard Package Manager pfSense WireGuard Package Manager 1/1 Configure WireGuard Settings | VPN > WireGuard > Settings Enable WireGuard | Check it Keep Configuration | Check it Save it pfSense | Bufferbloat Before starting, use a "Bufferbloat Test Site" to determine if changes are necessary. If the firewall already receives a high score the circuit may not be prone to bufferbloat and thus may not require these limiters. Bufferbloat Test Site: https://www.waveform.com/tools/bufferbloat Configuring CoDel Limiters for Bufferbloat This configuration requires a limiter and queue for both download and upload, plus a floating rule to apply the limiters to outgoing traffic. Create Download Limiter and Queue (Firewall -> Traffic Shaper -> Limiters) Create Upload Limiter and Queue ( Firewall -> Traffic Shaper -> Limiters) Create Floating Rule (Firewall -> Rules -> Floating) pfsense_bufferbloat_01 pfsense_bufferbloat_01_02 pfsense_bufferbloat_25 pfsense_bufferbloat_01 1/26 Create Download Limiter and Queue Navigate to Firewall > Traffic Shaper, Limiters tab Click + New Limiter Configure the limiter with the following settings: Enable: Checked Name: WANDown Bandwidth: 95 (Set equal to WAN download bandwidth. Confirm via speed test first) Mask: None Description: WAN Download Queue Management Algorithm: Tail Drop Scheduler: FQ_CODEL (The page will display FQ_CODEL options and their default values after saving this limiter, but leave them at defaults) Queue Length: 1000 (Can vary depending on the speed of the link, but 1000 should be a safe default for most high speed WANs (100Mbit/s). For very high speed WANs (e.g. 1Gbit/s+), consider increasing further to 3000-5000) ECN: Checked Click Save Click + Add New Queue under WANDown Configure the queue with the following: Enable: Checked Name: WANDownQ Mask: None Description: WAN Download Queue Queue Management Algorithm: Tail Drop Leave the other fields at their default values Click Save Create Upload Limiter and Queue Navigate to Firewall > Traffic Shaper, Limiters tab Click + New Limiter Configure the limiter with the following settings: Enable: Checked Name: WANUp Bandwidth: 95 ( Set equal to WAN download bandwidth. C onfirm via speed test first ) Mask: None Description: WAN Upload Queue Management Algorithm: Tail Drop Scheduler: FQ_CODEL ( The page will display FQ_CODEL options and their default values after saving this limiter, but leave them at defaults) Queue Length: 1000 ( Can vary depending on the speed of the link, but 1000 should be a safe default for most high speed WANs (100Mbit/s). For very high speed WANs (e.g. 1Gbit/s+), consider increasing further to 3000-5000 ) ECN: Checked Click Save Click + Add New Queue under WANUp Configure the queue with the following: Enable: Checked Name: WANUpQ Mask: None Description: WAN Upload Queue Queue Management Algorithm: Tail Drop Leave the other fields at their default values Click Save Create Floating Rule Navigate to Firewall > Rules, Floating tab Click Add to create a new rule at the bottom of the list Configure the rule as follows: Action: Pass Quick: Checked Interface: WAN Direction: Out Address Family: IPv4 (If the WAN can carry both IPv4 and IPv6, make a separate rule for each address family) Protocol: Any Source: WAN Address (It is important not to match too loosely on the source, especially when a firewall has multiple WANs) Destination: Any Description: CoDel Limiters Gateway: WAN_DHCP (Must be set to the gateway for this WAN interface) In / Out Pipe: WANUpQ / WANDownQ (On WAN floating rules in the outbound direction, “in” traffic is upload, and “out” traffic is download, from the perspective of LAN clients.) Save Apply Changes Reset states to force all traffic to use new limiters What is jitter? Jitter is a measure of the variation in latency over time. If your connection suffers from bufferbloat, you'll often also see higher jitter. Too much jitter can cause issues with realtime video and audio calls and online games. What is ECN? Explicit Congestion Notification is a means to do network congestion control without dropping packets. What is CoDel? CoDel (the name comes from “controlled delay”) was a fundamental advance in the state of the art of network of Active Queue Management (AQM). How does bufferbloat negatively affect your connection? Bufferbloat can make web browsing slower, make video calls stutter, and cause VoIP calls will break up. Real-time games will lag. Bufferbloat causes degraded connectivity anytime your Internet connection is under heavy use by any user or application. If a large upload or download of data is happening, other applications and users will slow down. How often is someone on your network really under heavy use? You'd be surprised! Many apps are bandwidth-hungrier than you might imagine. For example, most smartphone's photo-taking apps backup all photos and videos to the cloud as soon as they're taken. Video Calls: If you suffer from bufferbloat during video calls then your call will suffer from delays and occasional dropouts. Gaming: Latency is incredibly important for many online games. When your network is suffering from bufferbloat, the latency will spike, causing noticeable delays, or “lag.” Severe bufferbloat will affect your performance against the other players and your enjoyment of the game. Despite this impact, many routers that advertise themselves as “gaming routers” lack the critical feature to address bufferbloat. How do you determine which services will work well on my connection? You can use the following criteria to determine if a particular service will work on your Internet connection. (This is just a general guideline). Web Browsing: Download speed > 2 Mbps Upload speed > 100 Kbps Latency < 500 ms Audio Calls: Download speed > 100 Kbps Upload speed > 100 Kbps 95th Percentile Latency < 400 ms 4K Video Streaming: Download speed > 25 Mbps Video Conferencing: Download speed > 10 Mbps Upload speed > 5 Mbps 95th Percentile Latency < 400 ms Low Latency Gaming: Download speed > 10 Mbps Upload speed > 3 Mbps 95th Percentile Latency < 40 ms Source: https://docs.netgate.com/pfsense/en/latest/recipes/codel-limiters.html pfSense | DNS over TLS | DNS Resolver Configuring DNS over TLS This prevents intermediate parties from viewing the content of DNS queries and can also assure that DNS is being provided by the expected DNS servers This feature is only supported by the DNS Resolver Navigate to System -> General Locate the DNS Server Settings Section Add or replace entries in the DNS Servers section such that only the chosen DNS over TLS servers are in the list Address: (e.g. 1.1.1.1 ) IP address of an upstream DNS Server providing DNS over TLS service Hostname: (e.g. cloudflare-dns.com ) Hostname of the same upstream DNS Server in the Address field, used for TLS certificate validation DNS Server Override: Uncheck "Allow DNS server list to be overridden by DHCP/PPP on WAN" (This could add DNS servers to the configuration which do not support DNS over TLS) DNS Resolution Behavior: Set "Use local DNS (127.0.0.1), ignore remote DNS Servers" (This makes the firewall itself use only the DNS Resolver and it will not attempt to contact the DNS servers directly. This prevents DNS requests from the firewall being leaked unencrypted on port 53 if the resolver is temporarily unavailable (DNS Resolution Behavior)) Click Save Warning : About Hostname - The hostname is technically optional but dangerous to omit. The DNS Resolver must have the hostname to validate that the correct server is providing a given response. The response is still encrypted without the hostname, but the DNS Resolver has no way to validate the response to determine if the query was intercepted and answered by a third party server (Man-in-the-Middle attack). Enable DNS over TLS for Forwarded Queries Configure the DNS Resolver to use DNS over TLS for outgoing queries The DNS Resolver will now send queries to all upstream forwarding DNS servers using SSL/TLS on the default port of 853 Navigate to Services -> DNS Resolver Enable DNSSEC Support: Uncheck (DNSSEC is not generally compatible with forwarding mode, with or without DNS over TLS) Enable Forwarding Mode: Check Use SSL/TLS for outgoing DNS Queries to Forwarding Servers: Check Click Save Click Apply Changes Warning (Caveats) : Blocking External Client DNS Queries : Clients can make their own connections to DNS over TLS servers, so block them on TCP/UDP ports 53 and 853 to ensure they only query the DNS Resolver Redirecting Client DNS Requests : Redirecting DNS over TLS queries to the DNS Resolver may or may not work, depending on the clients. Setup the DNS over TLS server and add port forward redirects for TCP/UDP ports 53 and 853 to redirect DNS queries to the firewall Redirecting Client DNS Requests To restrict client DNS to only the DNS Resolver or Forwarder on pfSense® software, use a port forward to capture all client DNS requests. With this port forward in place, DNS requests from local clients to any external IP address will result in the query being answered by the firewall itself. Access to other DNS servers on port 53 is impossible. Tip : This can be adapted to allow access to only a specific set of DNS servers by changing the Destination network from “LAN Address” to an alias containing the allowed DNS servers. The Invert match box should remain checked. Warning : Either The DNS Resolver or DNS Forwarder must be active and it must bind to and answer queries on Localhost, or All interfaces. The following example uses the LAN interface but the same technique will work with any local interface. Navigate to Firewall > NAT, Port Forward tab Click Add to create a new rule Fill in the following fields on the port forward rule: Interface: LAN Protocol: TCP/UDP Destination: Invert Match checked, LAN Address Destination Port Range: DNS (53) Redirect Target IP: 127.0.0.1 Redirect Target Port: DNS (53) Description: Redirect DNS NAT Reflection: Disable Warning : Clients using DNS over TLS or DNS over HTTPS could circumvent this protection. Redirecting or blocking port 853 may help with DNS over TLS, depending on the clients. (See "Blocking External Client DNS Queries" for additional advice) Blocking External Client DNS Queries This procedure configures the firewall to block DNS requests from local clients to servers outside the local network. With no other accessible DNS servers, clients are forced to send DNS requests to the DNS Resolver or DNS Forwarder on pfSense® software for resolution. Warning : If DNS requests to other DNS servers are blocked, such as by following Blocking External Client DNS Queries, ensure the rule to pass DNS to 127.0.0.1 is above any rule that blocks DNS. Navigate to Firewall > Rules, LAN tab Create the block rule as the first rule in the list: Click Add to create a new rule at the top of the list Fill in the following fields on the rule: Action: Reject Interface: LAN Protocol: TCP/UDP Destination: Any Destination Port Range: DNS (53) Description: Block DNS to Everything Else Create the pass rule to allow DNS to the firewall, above the block rule: Click Add to create a new rule at the top of the list Fill in the following fields on the rule: Action: Pass Interface: LAN Protocol: TCP/UDP Destination: LAN Address Destination Port Range: DNS (53) Description: Pass DNS to the Firewall Click Apply Changes to reload the ruleset Warning : When complete, there will be two rule entries, and the pass rule should be above the block rule. Blocking External Client DNS Queries | DNS over TLS Another concern is that clients could use DNS over TLS to resolve hosts. DNS over TLS sends DNS requests over an encrypted channel on an alternate port, 853. This traffic can be blocked with a firewall rule for port 853 using the same procedure used for 53. Though if the firewall will not be providing DNS over TLS service to clients, do not add the pass rule. Blocking External Client DNS Queries | DNS over HTTPS Similar to DNS over TLS, clients may also use DNS over HTTPS (DoH). This is harder to block as it uses port 443. Blocking port 443 on common public DNS servers may help (e.g. 1.1.1.1, 8.8.8.8). Some browsers automatically attempt to use DNS over HTTPS because they believe it to be more secure and better for privacy, though that is not always the case. Each browser may have its own methods of disabling this feature. Firefox uses a “canary” domain use-application-dns.net by default if the user has not manually enabled DNS over HTTPS. If Firefox cannot resolve this name, Firefox disables DNS over HTTPS. To prevent Firefox from using DNS over HTTPS, add the following to the DNS Resolver custom options: server: local-zone: "use-application-dns.net" always_nxdomain pfSen se | DNS Set up System → General Settings -> DNS Server Settings Firewall Logs | Messages WPAD | Web Proxy Auto-Discovery Web Proxy Auto-Discovery (WPAD) offers organizations a way to automatically configure a proxy server on your system. Organizations can put WPAD config file in a standard manner which if detected by your system having WPAD enabled, your machine will be automatically align to settings prescribed in WPAD auto-config file. WPAD setting is enabled by default on Windows. WPAD On | Windows | Settings > Network & Internet > Proxy > Automatic Proxy Setup > On WPAD Off | Windows | Settings > Network & Internet > Proxy > Automatic Proxy Setup > Off References: Palo Alto Networks (www.paloaltonetworks.com ); Wikipedia (www.wikipedia.org); Google (www.google.com ); Oracle (www.oracle.com ); Raspberry PI (www.raspberrypi.org ); Microsoft (www.microsoft.com ); CloudFlare (www.cloudflare.com ); NordVPN (nordvpn.com )
- SAP NFe | US Localization
Topics: USGAAP, Financial Accounting, US Treasure, Bank Communication, US Taxation US Localization Overview The complexity of US localization is medium and supported by SAP. General Information ISO Codes: US / USA Country Codes: +1 Capital: Washington, D.C. Official Language(s): English Currency: USD (United States Dollar) Complexity Information Complexity Ranking: Medium Frequency of Legal Changes: Dynamic Interpretation of Law Text: Difficult Main SAP localization points Financial Accounting Treasure Taxation References: SAP (www.sap.com )
- SAP NFe | Windows
Topics: Operating Systems | Windows | AVMA Key | Network Protocols Up Windows Windows Windows Activation | Product Key License Windows Server 2022 | Roles and Features Creating a VHD Virtual Hard Disk Remote Access / Remote Desktop Timezone (NTP Server) CMD Prompt Powers hell Storage Drive | Formatting and Allocation SSD vs HDD Windows Microsoft Windows is a computer operating system developed by Microsoft. It was first launched in 1985 as a graphical operating system built on MS-DOS. The initial version was followed by several subsequent releases, and by the early 1990s, the Windows line had split into two separate lines of releases: Windows 9x for consumers Windows NT for businesses and enterprises In the following years, several further variants of Windows would be released: Windows CE in 1996 for embedded systems Pocket PC in 2000 (renamed to Windows Mobile in 2003 and Windows Phone in 2010) for personal digital assistants and, later, smartphones Windows Holographic in 2016 for AR/VR headsets And several other editions Windows | Local Users and Groups Manage Local Users and Group | Application: lusrmgr.msc Use the Print Screen Button to open Screen Snipping Activating Print Screen Shortcut | Windows Settings > Easy of Access > Keyboard | Print Screen Shortcut On Windows Activation | Product Key License Windows Activation Mechanism Evaluation Grace Period License Key: Provided automatically by Microsoft to test their products Retail Licensing: You only need the applicable retail key License Key: Transferable, more expensive, support from software publisher OEM - Original Equipment Manufacturer License Key: Tied to hardware, non-transferable, cheaper, support from manufacturer ESD - Electronic Software Delivery License Key: Delivered electronically, can be transferable, pricing varies MAK - Multiple Activation Key Volume Licensing Activation Method: Volume license agreement KMS - Key Management Services Licensing Activation Method: Activates a variety of Microsoft Products for free. You just need a KMS server AVMA - Automatic Virtual Machine Activation Activation Method: Activates Virtual Windows Servers (using Hyper-V) for free. Windows Host needs a valid license key (paid) and the guest needs a generic public key (free) ESD | Electronic Software Delivery | Windows Server Standard or DataCenter Activation steps from Evaluation Edition to Retail Edition using ESD License Key, using Powershell. Check your Current Edition | Command: DISM /online /Get-CurrentEdition If you have an evaluation edition, you need to change it. Your edition will show "Eval" at the end Check your allowed target editions | Command: DISM /online /Get-TargetEditions It will show the possible target editions Salve License Agreement | Command: DISM /online /Set-Edition: /GetEula:C:\license.rtf In this step you change to the target edition Change Product Key | Command: DISM /online /Set-Edition: /ProductKey: /AcceptEula Use your ESD License Key acquired to activate your Windows Server AVAMA | Automatic Virtual Machine Activation | Windows Server DataCenter On virtualization hosts, AVMA offers several benefits. Server data center managers can use AVMA to: Activate VMs in remote locations Activate VMs with or without an internet connection Track VM usage and licenses from the virtualization host, without requiring any access rights on the virtualized systems AVMA requires a Windows Server Datacenter edition with the Hyper-V server host role installed AVMA does not work with other server virtualization technologies How to implement On the server that hosts the VMs, install, and configure the Microsoft Hyper-V Server role Create a virtual machine and install a supported Windows Server operating system on it After installing Windows Server on the VM, install the AVMA key on the VM. From PowerShell, run the following command: Check your Current Edition | Command: DISM /online /Get-CurrentEdition If you have an evaluation edition, you need to change it. Your edition will show "Eval" at the end Check your allowed target editions | Command: DISM /online /Get-TargetEditions It will show the possible target editions Salve License Agreement | Command: DISM /online /Set-Edition: /GetEula:C:\license.rtf In this step you change to the target edition Change Product Key | Command: DISM /online /Set-Edition: /ProductKey: /AcceptEula You can use a generic key just to change the product, but that is not the activation (e.g.: VDYBN-27WPP-V4HQT-9VMD4-VMK7H) Change AVMA Key| Command: slmgr /ipk Check AVMA public key for activation at Microsoft page ( https://learn.microsoft.com/en-us/windows-server/get-started/automatic-vm-activation?tabs=server2022 ) Activate the AVAM Key | Command: slmgr /ato AVMA Public Keys Edition: Datacenter | Key: W3GNR-8DDXR-2TFRP-H8P33-DV9BG Edition: Datacenter Azure Edition | Key: F7TB6-YKN8Y-FCC6R-KQ484-VMK3J Edition: Standard | Key: YDFWN-MJ9JR-3DYRK-FXXRW-78VHK System Requirements Server Host Version: Windows Server 2022| Server Guest VM: Server 2022; Server 2019; Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2019 | Server Guest VM: Server 2019; Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2016 | Server Guest VM: Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2012 R2 | Server Guest VM: Server 2012 R2 Activation Errors Error: 0xC004F069 AVMA Activation falling for Windows Server 2022 Eval (Evaluation Edition), When you are traying to activate Windows Server 2022 Virtual Machine (Hyper-V) on Windows Server 2022 DataCenter. Solution: You need to change the Eval status of your edition. Please follow the steps above. The solution are in the initials steps, checking the target edition, saving the license agreement and changing product key. Windows Server 2022 | Roles and Features Activating WiFi (Wireless LAN Services) Go to Service Manager Add roles and features Role-based or feature-based installation Select the "Server" Select nothing in the "Server Roles" In the features, select "Wireless LAN Services " In the confirmation, click in install Wait until finish Restart the server If the Wireless LAN Service has not started: Open PowerShell Command: net start WlanSvc Wireless Lan Service Add Roles and Features Wireless Lan Service Role-based or Feature-Based Wireless Lan Service Wireless Available Wireless Lan Service Add Roles and Features 1/9 Creating a VHD Virtual Hard Disk Create a Virtual Hard Disk | Windows 11 Windows Settings | System > Storage > Advanced Storage Settings > Disks & Volumes > Create VHD Create and Attach Virtual Hard Disk Name Location Size Format | VHDX Type | Dynamically Click Create Initialise Disk Partition Style | GPT Click Initialise Format New Volume Label Drive Letter File System | NTFS Click Advance Allocation Unit Size | Default Click Format Windows11_CreateVHD_01 Windows11_CreateVHD_02 Windows11_CreateVHD_05 Windows11_CreateVHD_01 1/5 Remote Access / Remote Desktop What is Remote Desktop? Remote desktop is the ability to connect with and use a faraway desktop computer from a separate computer. Remote desktop users can access their desktop, open and edit files, and use applications as if they were actually sitting at their desktop computer. Employees often use remote desktop software to access their work computers when they are traveling or working from home. What is RDP (Remote Desktop Protocol)? The Remote Desktop Protocol (RDP) is a protocol, or technical standard, for using a desktop computer remotely. Remote desktop software can use several different protocols, including RDP, Independent Computing Architecture (ICA), and virtual network computing (VNC), but RDP is the most commonly used protocol. RDP was initially released by Microsoft and is available for most Windows operating systems, but it can be used with Mac operating systems too. The RDP protocol opens a dedicated network channel for sending data back and forth between the connected machines (the remote desktop and the computer currently in use). It always uses network port 3389 for this purpose. Mouse movements, keystrokes, the desktop display, and all other necessary data are sent over this channel via TCP/IP , which is the transport protocol used for most types of Internet traffic. RDP also encrypts all data so that connections over the public Internet are more secure. Pros and Cons of using RDP Pros It does not require a VPN It keeps data stored securely on the user's desktop, instead of storing it on cloud servers or on the user's unsecured personal devices RDP enables companies with a legacy on-premises IT setup to allow their employees to work from home Cons It may cause users to experience lag, especially if their local Internet connection is slow It has some serious security vulnerabilities that leave it open to cyber attacks Preparing the Client Computer Open Settings, go to System > Remote Desktop Set Remote Desktop to "On" Make sure you Network Profile is set as "Private" Check the topic about changing the "Network Profile" Accessing the Computer On the host computer, open the Remote Desktop Connection You can type "Remote Desktop Connect" on search bar On the computer field, you can insert the IP or Hostname (if the computer is in the same network) Confirm that you want to connect Inform the "User" and "Password" from the Client Computer Saving Credentials (User and Password) for Quick Connection Due to a security Windows policy, the Windows Defender Credential Guard does not allow to save credentials anymore. But you can bypass this, without changing any policy or editing any register. Open the Powershell Check all Credentials stored | Command: cmdkey /list Check the Terminal Server Credentials | Command: cmdkey /list:TERMSRV/* Delete Old Credentials | Command: cmdkey /delete: (Optional) You can delete the Remote Access credentials | Command: cmdkey /delete /ras Create a New credential with Password | Command: cmdkey /generic: /user: /pass: Do Not Use the Command "/add: ", or the credential will be blocked by Windows Defender Credential Guard Example: cmdkey /add: /user: /pass: Timezone (NTP Server) What is NTP? NTP stands for 'Network Time Protocol', a networking protocol that allows devices to synchronize their clocks over the internet. It's used by many devices, including computers, phones, clocks, and payment terminals. What is Clock Strata? NTP uses a hierarchical, semi-layered system of time sources. Each level of this hierarchy is termed a stratum and is assigned a number starting with zero for the reference clock at the top. A server synchronized to a stratum n server runs at stratum n + 1. Stratum 0 | These are high-precision timekeeping devices such as 'Atomic Clocks ' Stratum 1 | These are computers whose system time is synchronized to within a few microseconds of their attached stratum 0 devices Stratum 2 | These are computers that are synchronized over a network to stratum 1 servers. Often a stratum 2 computer queries several stratum 1 servers Hint : The upper limit for stratum is 15. Stratum 16 is used to indicate that a device is unsynchronized. List of Top Public Time Servers NIST Internet Time Service | time.nist.gov Google Public NTP | time.google.com Public Amazon Time Sync Service |time.aws.com Cloudflare NTP | time.cloudflare.com Microsoft NTP server | time.windows.com Apple NTP server | time.apple.com Facebook NTP | time.facebook.com How to change the Windows NTP server Go to 'Control Panel ' Select 'Date and Time ' Go to 'Internet Time ' tab Click on 'Change Settings ... ' Insert the new NTP | Server: Example: time.nist.gov CMD Prompt To access the "Command Prompt" you just need search for "CMD'. Automount | Automatic Mounting of New Disks and Drives When you restart your computer and you MicroSD disk is not automatic mounted (showed as a driver), you can activate with these two options. CMD - Open Command Prompt DISKPART - Open the Windows Diskpart prompt AUTOMOUNT - Display if the automount is enable or disabled AUTOMOUNT ENABLE - Enable the automount AUTOMOUNT DISABLE - Disable the automount Restart the computer Registry Editor Option Search for "Regedit" and open it Search for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mountmgr "NoAutoMount" DWORD "0" Enable "1" Disable Powershell To access the "Powershell Prompt" you just need search for "Powershell'. Driver Signing Policy | How to Install Unsigned Windows Drivers on Hardware Disabling driver signature enforcement | Command: bcdedit /set NOINTEGRITYCHECKS ON You will receive the message "The operation completed successfully" Disabling load test-signed kernel-mode drivers enforcement | Command: bcdedit /set TESTSIGNING ON You will receive the message "The operation completed successfully" Restart the Windows Update your hardware driver using the "Device Manager" (Using Search Bar) Accept the pop-up and the driver will be installed After the installation don't forget to turn on the Windows Policy Enforcement using the same commands with "OFF" at the end Working with Hyper-V and Windows PowerShell Return a list of Hyper-V commands | Command: Get-Command -Module hyper-v | Out-GridView Get Help information about the Get-VM Hyper-V command | Command: Get-Help Get-VM Return a list of virtual machines | Command: Get-VM Windows Server 2022 | Network profile | Changing Public to Private Open PowerShell Check the network profile by looking at Name, Alias or Index | Command: Get-NetConnectionProfile You can change the Profile using | Command: Set-NetConnectionProfile -InterfaceIndex -NetworkCategory Example, Category Private using Name : Set-NetConnectionProfile -InterfaceAlias Network -NetworkCategory Private Example, Category Private using Alias: Set-NetConnectionProfile -InterfaceAlias Ethernet -NetworkCategory Private Example, Category Private using Index : Set-NetConnectionProfile -InterfaceIndex 19 -NetworkCategory Private Network Commands Resolve-DnsName | Command: Resolve-DnsName -Name Example: Resolve-DnsName -Name www.bing.com Functionality: The Resolve-DnsName cmdlet performs a DNS name query resolution for the specified name. This cmdlet is functionally similar to the nslookup tool which allows users to query for names NSLookUp | Command: nslookup Example DNS records: nslookup -type=any google.com Example A record: nslookup google.com Example TXT record: nslookup -type=txt google.com Example NS records: nslookup -type=ns google.com Example SOA record: nslookup -type=soa google.com Example MX record: nslookup -type=mx google.com Example debug mode: nslookup -debug google.com Example Reverse DNS: nslookup 8.8.8.8 Functionality: Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The nslookup command-line tool is available only if you have installed the TCP/IP protocol. Alternatives: Dig: (Domain Information Groper) / Host (The host command in Linux is a simple utility for performing DNS lookups) Traceroute | Command: tracert Example: tracert 8.8.8.8 Functionality: A traceroute provides a map of how data on the internet travels from its source to its destination. When you connect with a website, the data you get must travel across multiple devices and networks along the way, particularly routers IPConfig | Command: IPCONFIG Example "/?" Display the help message with all commands: IPCONFIG /? Example "/All" Display full configuration information (MAC Addresses): IPCONFIG /ALL Example "/Release" Release IPv4 address: IPCONFIG /RELEASE Example "/Renew" Renew IPv4 address: IPCONFIG /RENEW Functionality: IPConfig is a console application program that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain Name System settings Storage Drive | Formatting and Allocation File System A file system is a framework for organizing files in an operating system or external storage device. It lays out what information can be stored and what filenames, permissions, and other attributes can be attached to the files you save. Allocation Unit Size Allocation Unit Size, also known as "Cluster Size" or "Block Size", refers to the size of the chunks that a solid state drive (SSD) or hard disk drive (HDD) is divided into. When you increase the size of the allocation unit, the "chunk," you decrease the total number of allocation units on your drive. If you decrease the size of the allocation unit, the opposite happens, you increase the number of allocation units on the drive. Example: If you have a disk with: Disk: 16 Mb (or 16,384 Kb) And format it with: Allocation Unit Size for NTFS: 4069 bytes (or 4 Kb) You will have this number of clusters: Clusters: 16.384 kb / 4 Kb = 4.096 Clusters (or Units) If you reformat it to: Allocation Unit Size for NTFS: 32 Kb You will have this number of clusters: Clusters: 16.384 kb / 32 Kb = 512 Clusters (or Units) Important : If a file is too big to fit in a single block, then it will be split and span multiple blocks. If a file is smaller than the block size, then it will be stored in that block, but the entire block volume will be used up. This can result in inefficient storage in some extreme cases. Hint: If you are not sure, sure the "default allocation size" File Formats As Microsoft-developed formats, Windows supports: FAT32 (File Allocation Table 32-bit version) exFAT (Extensible File Allocation Table) NTFS (New Technology File System) They also work on Apple devices, though some of these formats are read-only, meaning you won't be able to save files on a Mac, just look at them. FAT32 FAT32, part of the File Allocation Table family of file systems, is the oldest of the three, having been originally created for floppy disk storage. It was introduced in Windows 95, but remains the most common file system today thanks to its usage in memory cards and flash drives. FAT32 isn’t as efficient as newer systems, but it is compatible with a wide range of new and old devices. Since it’s been around for so long, FAT32 has become the de facto standard for a lot of machines, so much so that many flash drives are still sold with FAT32 formatting by default for maximum compatibility. Works With: Windows, macOS, Linux, game consoles, just about anything with a USB port Storage Limitations: 4GB file size and 8TB partition size limit. Best For: Storing small files on removable storage for use with a range of devices Partition Volume / Allocation Unit Size 32 MB - 64 MB / 0.5 KB (512 Bytes) 64 MB - 128 MB / 1 KB 128 MB - 256 MB / 2 KB 256 MB - 8 GB / 4 KB 8 GB - 16 GB / 8 KB 16 GB - 32 GB /16 KB exFAT The Extended File Allocation Table (exFAT) file system was introduced in 2006, and added to Windows XP and Vista operating systems via a software update. It exists as a middle ground between the older FAT32 and the more modern NTFS formats. ExFAT was made to be very portable and optimized for flash drives. It’s lightweight like FAT32, but without the same file size restrictions. That said, it lacks some of the features of the NTFS file system. Overall, it's not as widely compatible as FAT32, but more broadly compatible than NTFS. Works With: All versions of Windows and modern versions of macOS. Older Linux versions need additional software, but any Linux distribution running Linux Kernel 5.7 or newer—like Ubuntu 22.04—has native exFAT support. Storage Limitations: 128 petabyte maximum file size, 128 petabyte maximum partition size. Lacks some of the newer features that come with NTFS. Best For: Storing and writing larger files you need to use on multiple devices. Partition Volume / Allocation Unit Size 7 MB - 256 MB / 4 KB (4096 Bytes) 256 MB - 32 GB / 8 KB 32 GB - 256 TB / 16 KB NTFS The New Technology File System (NTFS) is Microsoft’s main file system. All recent Windows machines use it by default, and if you install a newer version of Windows on a drive, it will format that drive in NTFS. It differs from FAT32 and exFAT in that it's a journaling file system, meaning it tracks changes before they're written to help with data recovery in the event of a system failure. Works With: All Windows versions. Read-only on Mac and some Linux distributions. Supported on Xbox One, X/S Limitations: Limited cross-platform compatibility. Best For: Internal drives running newer Windows operating systems or removable storage for Windows PCs. Partition Volume / Allocation Unit Size 7 MB - 16 TB / 4 KB (4096 Bytes) 16 TB - 32 TB / 8 KB 32 TB - 64 TB / 16 KB 64 TB - 128 TB / 32 KB 128 TB - 256 TB / 64 KB 256 TB - 512 TB / 128 KB 512 TB - 1 PB / 265 KB SSD vs HDD SSDs and HDDs are both storage devices, but the way they work is quite different. The main difference between a solid state drive (SSD) and a hard disk drive (HDD) is how data is stored and accessed. Pros and Cons Speed : (SSD) Faster x (HDD) Slower Price : (SSD) More Expensiver x (HDD) Cheaper Hardware : (SSD) Non-mechanical (Flash) x (HDD) Mechanical (Moving parts) Resistance : (SSD) Shock-Resistant x (HDD) Fragile Purpose : (SSD) Best for storing Operating Systems and Gaming Apps x (HDD) Best for storing extra Data, like Documents, Photos and Movies Speed Solid-state drives are much faster than hard disk drives, and the speed difference between the two types is significant. On the paper performance: HDDs: It can copy 30 to 150 MB per second (MB/s) SATA SSDs (Standard): Perform the same action at speeds of 500 MB/s NVMe SSDs (Newer): It can get up to astounding speeds of 3,000 to 3,500 MB/s Real performance for an average user: SDD Read 3000 MB/s Write 2000 MB/s HDD Read 60 MB/s Write 30 MB/s Warning : If you are transferring files from an HDD to an SSD (or vice versa), speed will be the bottleneck of the lower speed one (HDD) Lifespan These days, the lifetime of an SSD is nearly the same as that of an HDD: around five years on average. A bad device may fail after three years, but a good one can last you ten or more. SSDs used to have shorter lifespans, but SSD technology has improved substantially. While it’s true that SSD cells can’t be written to as many times as the disk in an HDD, this isn’t really an issue in practice. In theory, if more data is written to a cell, it wears out faster. But thanks to wear leveling, the SSD spreads write operations evenly across all cells to minimize cell death and prolong the lifespan of the drive. Additionally, modern SSDs contain spare cells that replace dead cells. This is called bad block management, and it’s why the larger the SSD, the longer its lifespan. If you were to write data to an SSD 24/7, it would still take decades for the drive to break down. SSD vs. HDD lifespan is now about equal. But if you’re worried, you can always run a hard drive test to monitor your drive’s health. Reliability Since SSDs don’t contain moving parts, they’re less prone to damage if you drop or bang your computer. This also makes SSDs more reliable in extreme environments and in high or low temperatures. You can typically expect a modern SSD to last at least as long as an HDD. SDDs fare better than HDDs in laptops because they’re portable; the rough handling of a laptop can more easily damage the intricate moving parts of an HDD. You can safely run Windows CHKDSK on an SSD so that it avoids the parts that have decayed and died, but never try to defrag an SSD. Defragmenting the drive writes and rewrites data, which can age your SSD faster. If you’re still working with an HDD, it’s good to know how to defrag on Mac or PC. Security and data recovery If your drive fails, you can usually recover the data on it. This is true with both HDDs and SSDs, though with a few key differences. Since SSDs are newer, many data recovery services charge more to work with them. But since they’re faster, you might be able to recover your data faster than with an HDD. SSDs use the TRIM command to destroy data when files are deleted. This is part of how SSDs equalize wear across all cells, but it also makes it harder to recover deleted files. You should keep this in mind when considering SSD or HDD for storage. Data recovery for SSDs is best handled by professionals in a lab with specialized equipment and software. Whichever type of drive you use, the best way to protect your data is with regular backups to external storage devices or cloud storage. Look up how to clone your hard drive so you have everything handy in case of an emergency. You won’t need to worry about SSD data recovery when you already have a fresh copy. Capacity If you’re concerned about how much information you can store on each type of drive, don’t worry. There are no differences in storage capacity. You can get HDDs and SSDs from as small as 128 GB up to 20 TB or more. However, one of the biggest differences between HDDs and SSDs is the price per gigabyte, so the SSD will be much more expensive. Prices The market for flash storage is volatile and varies based on supply and demand. While SSDs are much cheaper than they used to be, there is still a significant price difference. 1 TB internal HDD costs roughly $60 1 TB internal SSD averages around $120 Additional Information Energy Consumption: With no mechanical components, SSDs draw less power than their spinning counterparts. That means better battery life, and it’s one reason why most newer laptops come with SSDs. Hard disk drives require more power because they’re constantly in motion. Noise: You’re probably familiar with the sound of an HDD spinning up as it gets to work — 7200 RPMs to be exact — or perhaps the clicking sound that indicates an impending hard drive failure. SSDs, by contrast, don’t have moving parts and are completely silent. Best For HDD: Those looking to back up and store large amounts of data that they don’t need to access frequently People with modest computing needs Those buying or building a PC on a budget SSD Those who use resource-intensive programs like multimedia editing suites Gamers who want to play anything new Anyone who opens and copies files from their drive often References: Wikipedia (www.wikipedia.org ); Google (www.google.com ); Oracle (www.oracle.com ); Raspberry PI (www.raspberrypi.org ); Microsoft (www.microsoft.com ); CloudFlare (www.cloudflare.com )
- SAP NFe | SAP Links
SAP Links SAP Support Portal - OSS Notes Search | https://support.sap.com SAP Universal ID Account Manager | https://account.sap.com/manage/accounts SAP Training | https://training.sap.com SAP Certifications Available | https://training.sap.com/certification/validity
- SAP NFe | About us
We are driven by the purpose of creating value and generating impact for our clients. Helping businesses to achieve its goals and building better future. SAP NFe To Help Companies Run SAP Better Mission We are driven by the purpose of creating value and generating impact for our clients. Helping businesses to achieve its goals and building better future. Purpose We have a clear purpose: to help companies run SAP better, which reflects our mission to generate positive and significant impacts History Since 2006, we have almost 2 decades of history, we offer services in business consulting, financial advisory, risk management and tax consulting for clients of the most diverse profiles and sectors, always focusing in SAP.
- SAP NFe | SAP Fiori Apps & T-Codes
Topics: Transactions for Consultants and Key Users | Hidden Programs and Functions | SAP Tips and Tricks | Fiori Apps X T-Codes | Fiori Mapping | SAP Expert Mode and More ... SAP Transaction Codes, Menus, Programs and Functions SAP Transaction Codes | Consultants SAP Transaction Codes | Key Users SAP Programs and Functions Mapping Table for Modified Transaction Codes in Menu Areas Fiori Mapping (Fiori Apps x TCodes) (Full List) SAP Transaction Codes | Consultants Relevant for SAP Consultants Transactions Names Area Use Explanation /n/uia/flp SAP Fiori Launchpad All You can use launch the Fiori Launchpad web version, or to launch and see the HTTP path for Fiori Launchpad. Enter the transaction code with the "/n", and the browser will be launched automatically. 3KEH EC-PCA: Default Profit Center CO For EC-PCA. For New GL is "FAGL3KEH" ACSET Account Assignment Objects for Assets FI-AA Check the Account Assignment Fields for Assets ARAL Analyze Application Log FI-AA Analyze Log for Asset Depreciation CG3Y Download file Basis Download files direct from SAP Server CG3Z Upload file Basis Upload files direct to SAP Server CKM9 Display of ML-Relevant Custmizing Settings CO-ML EWCT Currency Test Converter FI You can use it to check the exchange rate convertion. Inform the parameters: currencies, date, exchange rate type, and the amount to see the convertion. EWK1 Cust. Development: Curr. In Report Txt ABAP It can be used to check where a specific set is used F.80 Mass Reversal of Documents FI You can use to reverse noted items posted from F110 in accounts receivables process for some countries, like Brazil FAGL3KEH General Ledger: Default Profit Center CO For New GL. For the EC-PCA is "3KEH" FAGLACC_CHECK Check Inconsistency for GL Account Master in Company Code FI FAGL_CHECK_ACCOUNT Check GL Accounts for Doc. Splitting FI Derivation and Check of Assignment of GL Account to Item Category FAGL_CHECK_DOC_SPLIT Check Document Splitting FI Check on Document Splitting Regarding Current Customizing Settings FIBF Maintenance Transaction BTE ABAP Implement BTEs FILE Logical Fiel Path Definition Basis You can use it to check the logical file path available in the SAP Instance (it is a cross-client transaction) Cross-Client File Names/Paths GCX2 Client-dependent User Exits ABAP You can check some user exists like the valid./subst. rules user exits GGB0 Validation Rules Maintenance FI GGB1 Substitution Rules Maintenance FI GGB4 Analysis Tool for Valid./Subst. FI GS01 Create Sets All Maintain sets GS01 / GS02 / GS03 / GS04 / GS07 / GS08 / GS09 | Create, Change, Display Delete, Export, Importe and Copy Sets from Clients KANK Range Maintenance: CO Document CO CO Object, Object RK_BELEG KE4I CO-PA: Assignment of SD Conditions to Value Fields CO-PA Only for Costing-Based KEAT Value Flow SD -> FI / CO-PA CO-PA Reconcile CO-PA <-> SD <-> FI OAMK Change Reconciliation Accounts FI OAW3 Translation Methods in Assent Accounting FI-AA It can be used to create a method to convert currencies/exchange rates for asset value OB28 Validation Rule: Activation FI OB74 Additional Rules for Automatic Clearing FI OBB9 Payment Terms: Installments FI Setup the installments and percentage Terms of Payment for Holdback/Retainage OBBH Substitution Rule: Activation FI OBY9 Transport Chart of Accounts FI OKB9 Default Account Assignment CO OKP1 Change Period Lock FICO Change Period Lock | Actual and Plan OLMR IMG Invoice Verification MM It is the Invoice Verification Customizing IMG and it can be used to go direct to the MM SPRO OMR4 Doc Type / Number Range: Invoice Receipt FI/MM OMSY Period MM View on Company Code MM Check MM Periods on Company Codes ORFA IMG Asset Accounting Customizing FI-AA It is the Asset Accounting Customizing IMG and it can be used to go direct to the AA SPRO PFCG Role Maintenance Basis SAT ABAP Trance - Runtime Analysis ABAP You can use it to analyze transactions or ABAP programs (deprecated tcode SE30) SCC1 Client Copy Basis You can use to pull transport requests between clients in the same environments SCC3 Client Copy Log Basis SCC4 Cient Administration Basis Check the list of clients in an environment, and make some changes, such as opening and closing the client. SCC5 Delete Client Basis SCC7 Client Import Basis SCC8 Client Export Basis SCU3 Table History Basis Check the Change Lods Analyze Changed Customizing Objects and Tables - Look for a table and execute to see the change logs SE03 Transport Organizer Tool Basis You can use to check objects inside transport requests SE16H General Table Display ABAP You can check tables Old transactions SE16 and SE16N SE24 ABAP Class Builder ABAP Check BadIs SE30 ABAP Objects Runtime Analysis ABAP Check programs processing SE39 Split Screen Editor Basis Compare programs, function and table between environments SE93 Maintain Transaction Codes ABAP You can use to find any transaction code, using part of the transaction or part of the transaction short description. Enter part of the transaction code, or press F4 (match code) and informe part of the transaction description. SEARCH_SAP_MENU Find in SAP Menu All You can use to find a transaction in the SAP Menu. Only if the transaction is available in the SAP Menu on the initial screen. Enter the transaction code or menu text, to search the location in the SAP Menu. SM04 Logons to an AS Instance Basis You can find all users logged in the SAP Instance In the transaction you will see the list of users per client, application (t-codes) that they are using, the sessions (RFC, GUI, HTTP, Background) and memory that they are consuming. (Depending of the profile, it is also possible log off a user) SM30 Edit Table Views ABAP Check tables views SM35 Batch Input Monitoring Basis You can use it to execute and check the batch inputs SM50 Work Processes of AS Instance Basis You can find all the processes running in the SAP Instance In the transaction you will see the list processes, with running time, priority in the queue, program in execution, user that is executing and others SM59 RFC Destinations (Display/Edit) Basis You can check the RFC (Remote Function Call) created SMOD SAP Enhancement Management ABAP Implement developed enhancements SNRO Number Range Object Editing FI Transaction: SNRO or SNUM SOBJ View Cluster Editing Basis In Transaction SOBJ, set the 'Current settings' indicator for views V_TKA3, V_TKA3A and V_TKA3C You can open OKB9 in environments, so you don't need to send transport requestions SQVI QuickViewer ABAP Create Table Joins ST05 Performance Trace Basis You can use to have a performance analysis of buffer tables, RFC and more You can activate the trace, user the application, check the log and them deactivate the trace STMS Transport Management System All To transport requests between environments STVARV Selection Variable Maintenance ABAP You can create variables in the TVARV table SU1 User Maintenance Basis You can use to create, maintain and check SAP Users SU21 Maintain Authorization Objects Basis Profile Authorization You can see all Authorization Objects. Like the Object "F_BKPF_BUP" for OB52, 3 period. SU24 Maintain Authorization Default Values Basis Profile Authorization You can check the Authorization Objects per Transaction Code SU3 Maintain User Own Data All You can use to maintain some information in your own SAP User SAP Transaction Codes | Key Users Relevant for SAP Key Users Transactions Names Area Use Explanation AW01N Asset Explorer FI-AA CKM3N Material Price Analysis CO-ML Old transaction: CKM3 CKMACD Value Flow Display for Activity Type CO-ML CKMH Single-Level Material Price Determination CO-ML CKMLCP Costing Cockpit: Actual Costing (Material Ledger) CO-ML CKMVFM Value Flow Monitor CO-ML COGI Postprocessing of Error Record for Automatic Goods Movement PP Postprocess Faulty Goods Movement F.97 General Ledger: Report Selection FI Localized Reports - General Ledger - Several Countries Deprecated | Application Tree Report Selection General Ledger F.98 Vendors: Report Selection FI BR | Localized Reports - Vendors - Several Countries Deprecated | Application Tree Report Selection Vendors F.99 Customers: Report Selection FI BR | Localized Reports - Customers - Several Countries Deprecated | Application Tree Report Selection Customers F103 Transfer Posting for Doubtful Receivables FI F104 Transfer for Doubtful Receivables FI FAGL_FCV Foreign Currency Valuation FI KE24 Display Actual Line Items CO-PA KE28 Top-Down Distribution CO-PA Create Top-Down Distribution KE28A Top-Down Distribution: Profitability Analysis CO-PA Run Top-Down Distribution KE28L Top-Down Distribution: Logs CO-PA Administration: Logs Or KE28LC (Same Program) KE28T Top-Down Distribution: Technical Settings CO-PA MMPV Close Period for Material Master Records MM OB08 Currency Exchange Rates FI S_ALR_87012129 Withholding tax FI BR | DIRF | Delivery Febrary 2014 | Report | WHT Deprecated S_ALR_87012150 List of incoming documents FI BR | Modelo 1*, 10 | Delivery 5th | Support | ICMS Deprecated S_ALR_87012151 List of outgoing documents FI BR | Modelo 2* | Delivery 5th | Support | ICMS Deprecated S_ALR_87012152 Overview of production and inventory FI BR | Modelo 3 | Delivery March 2014 | Report | ICMS Deprecated S_ALR_87012153 Physical inventory overview FI BR | Modelo 7* | Delivery March 2014 | Report | ICMS Deprecated S_ALR_87012154 Fiscal Book - IPI tax FI BR | Modelo 8* | Delivery 5th | Tax Calculation | IPI Deprecated S_ALR_87012155 Fiscal Book - ICMS tax FI BR | Modelo 9* | Delivery 5th | Tax Calculation | ICMS Deprecated S_ALR_87012158 SINTEGRA - File as per ICMS law 69/02 FI BR | Arquivo Magnético | Delivery 15th | Report | ICMS Deprecated S_ALR_87012195 Customer Master Data Comparison FI/SD Sales Organization X Distribution Channel X Division Comparison. Just need to flag "Not created in Fin.Accounting" S_P00_07000134 Generic Withholding taxes reporting FI S_PL0_09000314 Relatorio 1099 MISC para emissão normal e arquivo eletronico FI US | Issue Withholding Tax 1099 Misc - Regular report and Electronic file Deprecated SAP Programs and Functions Relevant programs and functions for consultants Object Type Name Use Explanation RFEBKA96 Program (SE38) Delete Data Buffer You can use to delete the electronic bank statement imported by FF.5, and also banks receipts, lockbox and more For Bank Statement, check the Short Key (KUKEY) in the table FEBKO (Bank Statement Header) SAPHTML_DEMO1 Program (SE38) HTML Control as WWW Browser You can use as a browser inside SAP CALL_TRANSACTION_FROM_TABLE Function (SE37) Execution of a Transaction Sometimes you can use this function to access a transaction that you don't have access (it depends of the profile) In the field "I_TCODE" and execute the function RS_HDSYS_CALL_TC_VARIANT Function (SE37) External: Call Transaction With Variant Sometimes you can use this function to access a transaction that you don't have access (it depends of the profile) In the field "I_TCODE" and execute the function. RFBNUM00N Program (SE38) Gaps in Document Number Assignment You can check the Gaps in Document Number Assignment In the transaction inform Company Code and Fiscal Year, and can be filtered by number range and document type SAPF019 Program (SE38) Deleting Master Data You can use it to delete Customers, Vendors, G/L Accounts in non-productive instance (Do not use in production) Mapping Table for Modified Transaction Codes in Menu Areas You can check this same list in the table: PRGN_CORR2 (Correction Table for Modif. Transaction Codes in Area Menus) SAP Release Tcode (From) Description Program Tcode (To) Description Program 751 CK11 Create Product Cost Estimate SAPLCKDI CK11N Create Material Cost Estimate SAPLCKDI 751 CK13 Display Product Cost Estimate SAPMC64S CK13N Display Material Cost Estimate SAPLCKDI 751 CK41 Create Costing Run SAPMC64S CK40N Edit Costing Run SAPRCKCC 751 CK42 Change Costing Run SAPMC64S CK40N Edit Costing Run SAPRCKCC 751 CK43 Display Costing Run SAPMC64S CK40N Edit Costing Run SAPRCKCC 751 CK60 Preselection for Material/Plant SAPRCK60 CK40N Edit Costing Run SAPRCKCC 751 CK62 Find Structure: BOM Explosion SAPRCK62 CK40N Edit Costing Run SAPRCKCC 751 CK64 Run: Cost Estimate of Objects SAPMC64S CK40N Edit Costing Run SAPRCKCC 751 CK66 Mark Run for Release SAPRCK66 CK40N Edit Costing Run SAPRCKCC 751 CK68 Release Costing Run SAPRCK68 CK40N Edit Costing Run SAPRCKCC 751 CK74 Create Additive Costs SAPLKKP4 CK74N Create Additive Costs SAPLCKDI 751 CU51E CE: Order BOM (eoASL) SAPLCASL CU51 Order BOM SAPLCASL 751 CU52 Display Order BOM SAPLCASL CU51 Order BOM SAPLCASL 751 CU52E CE: Display Order BOM SAPLCASL CU51 Order BOM SAPLCASL 751 CU80 Configurable Mat. Characteristics RCCUBD00 PMEVC Variant Configuration Modeling Envmt SAPLPMEVC_MODEL 751 CUMODEL Transaction for Displaying Model RCUMODEL PMEVC Variant Configuration Modeling Envmt SAPLPMEVC_MODEL 751 CVW PLM WUI 751 DIS01 DIS01N Distribution: Collective processing RDISALL2 751 EDM1 EDM1N Profile Value Import (New) REEDM1N 751 FAGL_FC_VAL Foreign Currency Valuation FAGL_FC_VALUATION FAGL_FCV Foreign Currency Valuation FAGL_FCV 751 FD0 BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD01 Create Customer (Accounting) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD02 Change Customer (Accounting) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD03 Display Customer (Accounting) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD05 Block Customer (Accounting) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD06 Mark Customer for Deletion (Acctng) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FD32 Change Customer Credit Management SAPMF02C UKM_BP Credit Management Business Partner UKM_BP_START 751 FK01 Create Vendor (Accounting) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FK02 Change Vendor (Accounting) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FK03 Display Vendor (Accounting) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FK05 Block Vendor (Accounting) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FK06 Mark Vendor for Deletion (Acctng) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 FS01 Create Master Record SAPMF02H FS00 G/L acct master record maintenance SAPGL_ACCOUNT_MASTER_START 751 FS02 Change Master Record SAPMF02H FS00 G/L acct master record maintenance SAPGL_ACCOUNT_MASTER_START 751 FS03 Display Master Record SAPMF02H FS00 G/L acct master record maintenance SAPGL_ACCOUNT_MASTER_START 751 IP30 MaintSchedule Date Monitoring RISTRA20 IP30H Mass Schedule Maintenance Plans RISTRA20H 751 KB11 Enter Reposting of Primary Costs SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KB21 Enter Activity Allocation SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KB31 Enter Statistical Key Figures SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KB33 Display Statistical Key Figures SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KB34 Reverse Statistical Key Figures SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KB51 Enter Activity Posting SAPMK23B KB11N Enter Manual Repostings of Costs SAPLK23F1 751 KE21 Create CO-PA line item SAPMKEI1 KE21N CO-PA Line Item Entry SAPMKEI2 751 KE23 Display CO-PA line item SAPMKEI1 KE24 Line Item Display - Actual Data RKEB0601 751 KKB4 Itemization for Base Planning Obj. RKKBKIS1 CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKBC_HOE Analyze Summarization Object KKBC_HOE_H Analyze Summarization Object SAPMKKB0 751 KKBF Order Selection (Classification) RKKBSEL1 KKR0 CO Summarization: Hierarchy Maintena RKKRKKR0 751 KKE1 Add Base Planning Object SAPMK70B CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKE2 Change Base Planning Object SAPMK70B CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKE3 Display Base Planning Object SAPMK70B CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKEC Compare Base Object - Unit Cost Est RKKEKLVE CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKED BOM for Base Planning Objects RKKBKIS1 CKUC Multilevel Unit Costing CKEKMULTILEVELCOSTINGSTARTUP 751 KKRC Summarization: CO Object SAPMKKRD KKBC_HOE_H Analyze Summarization Object SAPMKKB0 751 MAP1 Create contact person SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MAP2 Change contact person SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MAP3 Display contact person SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MATGRP01 Create Article Hierarchy SAPMWCDT01 WMATGRP01 Create Article Hierarchy SAPMWRFCDT_INS 751 MATGRP02 Change Article Hierarchy SAPMWCDT02 WMATGRP02 Change Article Hierarchy SAPMWRFCDT_UPD 751 MATGRP03 Display Article Hierarchy SAPMWCDT03 WMATGRP03 Display Article Hierarchy SAPMWRFCDT_SHW 751 MATGRP04 Delete Article Hierarchy SAPMWCDT04 WMATGRP04 Delete Article Hierarchy SAPMWRFCDT_DEL 751 MATGRP05 Activate Article Hierarchy SAPMWCDT05 WMATGRP05 Activate Article Hierarchy SAPMWRFCDT_ACT 751 MATGRP06 Article Hierarchy: Copy Nodes SAPMWCDT06 WMATGRP06 Copy Article Hierarchy SAPMWRFCDT_COPY 751 MATGRP07 Deactivate Article Hierarchy SAPMWCDT07 WMATGRP07 Deactivate Article Hierarchy SAPMWRFCDT_DACT 751 MB01 Post Goods Receipt for PO SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB02 Change Material Document SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB03 Display Material Document SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB04 Subsequ.Adj.of "Mat.Provided"Consmp. SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB05 Subseq. Adjustmt: Act.Ingredient Mat SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB0A Post Goods Receipt for PO SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB11 Goods Movement SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB1A Goods Withdrawal SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB1B Transfer Posting SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB1C Other Goods Receipts SAPMM07M MIGO Goods Movement SAPLMIGO 751 MB31 Goods Receipt for Production Order SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBNL Subsequent Delivery f. Material Doc. SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBRL Return Delivery for Matl Document SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBSF Release Blocked Stock via Mat. Doc. SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBSL Copy Material Document SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBST Cancel Material Document SAPMM07M MIGO Goods Movement SAPLMIGO 751 MBSU Place in Stor.for Mat.Doc: Init.Scrn SAPMM07M MIGO Goods Movement SAPLMIGO 751 MD01N MRP Live PPH_MRP_START WRP1R Replenishment: Rapid Planning RWRPLRRP 751 MDAB Planning File - Set Up BATCH RMMDBTCH PPH_MDAB MRP-Records - Setup and Check BATCH RMMDBTCH 751 MDRE Checking Plnng File In BCKGRND Mode RMMDBTCH PPH_MDAB MRP-Records - Setup and Check BATCH RMMDBTCH 751 MK01 Create vendor (Purchasing) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK02 Change vendor (Purchasing) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK03 Display vendor (Purchasing) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK05 Block Vendor (Purchasing) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK06 Mark vendor for deletion (purch.) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK12 Change vendor (Purchasing), planned SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK18 Activate planned vendor changes (Pu) SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MK19 Display vendor (purchasing), future SAPMF02K BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 MMBE_OLD Stock Overview RMMMBEST MMBE Stock Overview RMMMBESTN 751 MMCL Stock Overview by Characteristic MILL_CLMMBE BMBC Batch Information Cockpit RVBBINCO 751 MSAB LTP: set up plnng file entries BATCH RMMDBTCH PPH_MSAB LTP: set up plnng file entries BATCH RMMDBTCH 751 MSAC LTP: delete plnng file entries BATCH RMMDBTCH PPH_MSAC MRP-Records LTP - Delete Scenario RMMDBTCH 751 MSC1 Create Batch SAPMM03S MSC1N Create Batch SAPLCHRG 751 MSC2 Change Batch SAPMM03S MSC2N Change Batch SAPLCHRG 751 MSC3 Display Batch SAPMM03S MSC3N Display Batch SAPLCHRG 751 MSC4 Display Batch Changes SAPMM03S MSC4N Display Change Documents for Batch SAPLCHRG 751 O300 IS-Oil Administration infosystem ROI0SARP SE43 Edit Area Menu SAPLBMEN 751 O3C1 Create Oil Conversion Defaults SAPMOIB2 O3DEFAULTS New Defaulttransaction SAPMOIB_DEF 751 O3C2 Change Oil Conversion Defaults SAPMOIB2 O3DEFAULTS New Defaulttransaction SAPMOIB_DEF 751 O4NC Create Nomination ROIJ_NOM_GUI O4NCN/O4NM 751 O4NS Display Nomination ROIJ_NOM_GUI O4NSN/O4NM 751 O4NV Change Nomination ROIJ_NOM_GUI O4NM Maintain Nomination ROIJ_NOM_GUI 751 O4TC Generate Stock Projection ROIJRDU1 O4TCN Generate Stock Projection New ROIJRDU1N 751 O4TCB Generate Stock Projection for batch ROIJRDU1B O4TCN Generate Stock Projection New ROIJRDU1N 751 O4TDL OIL-TSW Delete Location SAPMOIJL O402N 751 O4TE_CORRECT OIL-TSW: Correct ticket actualizatio SAPMOIJT O4TENCORR Correct ticket SAPMOIJTN 751 O4TE_REVERSE OIL-TSW: Reverse ticket actualizatio SAPMOIJT O4TENREV Reverse Ticket SAPMOIJTN 751 O4TF OIL-TSW: Change ticket SAPMOIJT O4TFN Change ticket SAPMOIJTN 751 O4TG OIL-TSW: Display Ticket SAPMOIJT O4TGN Display Ticket SAPMOIJTN 751 O4TH OIL-TSW: Delete movement ticket SAPMOIJT O4THN Delete Ticket SAPMOIJTN 751 O4TO Worklist ROIJWL_LIST O4TO_LIST Worklist ROIJWL_LIST 751 O4TW OIL-TSW Create Location SAPMOIJL O401 Create Location Master Record SAPMOIFA 751 O4TX OIL-TSW Change Location SAPMOIJL O402 Change PBL Master Record SAPMOIFA 751 O4TY OIL-TSW Display Location SAPMOIJL O403 Display PBL Master Record SAPMOIFA 751 PEG01 PEG01N Pegging: Collective processing RPEGALL2 751 PKW1 PK13N Kanban Board: Demand Source View SAPLMPKP 751 POFO1 Create Portfolio SAPLWPOT POFO31 Portfolio: Create SAPLWPOT 751 POFO2 Change Portfolio SAPLWPOT POFO32 Portfolio: Change SAPLWPOT 751 POFO3 Display Portfolio SAPLWPOT POFO33 Portfolio: Display SAPLWPOT 751 SM01 Lock Transactions SAPMTSTC SM01_CUS Local App. Start Lock Maintenance RSAUDITC_BCE 751 S_AC0_520 00170 WAB_CLOSE Complete Settlement Management Docs RWLF2057 751 S_AC0_520 00172 WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AC0_520 00174 WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AC0_520 00175 WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AC0_52000143 Complete Settlement Documents WAB_CLOSE Complete Settlement Management Docs RWLF2057 751 S_AC0_52000169 Complete Vendor Billing Documents WAB_CLOSE Complete Settlement Management Docs RWLF2057 751 S_AC0_52000170 Complete Expenses Settlements WAB_CLOSE Complete Settlement Management Docs RWLF2057 751 S_AC0_52000172 Reopen Settlement Documents WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AC0_52000174 Reopen Vendor Billing Documents WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AC0_52000175 Reopen Expenses Settlements WAB_REOPEN Reopen Settlement Management Docs RWLF2058 751 S_AEN_10000032 Enhanced RemunLists from RemunList WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_AEN_10000033 Determine Relevant Settle. Doc Lists WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_AEN_10000034 Simulation RemunLists frm RemunList WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_AEN_10000037 Customer Settl. List Creation Disp. WBLRN_DISP Dispatcher: Custom. Settlement Lists 751 S_AEN_10000038 Customer Sttlmnt Creation Dispatcher WBLRN_DISP Dispatcher: Custom. Settlement Lists 751 S_AEN_10000038 Customer Sttlmnt Creation Dispatcher WLF1K_DISP Dispatcher: Create Customer SettlMnt 751 S_AEN_10000060 Enhncd RemunLists frm Predecessor WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_AEN_10000065 Preceding Docs for Settl. Doc Lists WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_AEN_10000066 Simulation RemunLists frm Predcessor WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_AEN_10000074 Dispatcher Sttlmnt Rqst List Crtn WRLVN_DISP Dispatcher: Suppl. Settlement Lists 751 S_AEN_10000075 Mass Release Dispatcher WAB_RELEASE_DISP Dispatcher: Mass Release 751 S_AEN_10000083 Dispatcher Enhanced Remuneration Lst WLF_RRLE_CREATE_DISP Dispatcher: Create Settle. Doc. List 751 S_AL0_96000192 Create Customer Settlements WLF1K Create Customer Settlements RWLF2051 751 S_AL0_96000193 Customer Settlement (Header Info) WLI2 List Output Settl. Mgmt Doc. RWLF1051 751 S_AL0_96000194 Customer Settlement (with Item Data) WLI2 List Output Settl. Mgmt Doc. RWLF1051 751 S_AL0_96000195 Expenses Settlement (Header Data) WLI2 List Output Settl. Mgmt Doc. RWLF1051 751 S_AL0_96000196 Expense Settlement (with Item Data) WLI2 List Output Settl. Mgmt Doc. RWLF1051 751 S_AL0_96000197 Settlement Doc List from Cust. Sett. WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_AL0_96000198 Settlement for Settlement Doc List WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_AL0_96000212 Mass Release of Customer Settlements WAB_RELEASE Release Settlement Management Docs RWLF2056 751 S_AL0_96000306 Mass Cancellation: Settl. Doc Lists WAB_CANCEL Reverse Settlement Mgmt Documents RWLF2055 751 S_AL0_96000307 Mass Cancellation: Settlement Req. WAB_CANCEL Reverse Settlement Mgmt Documents RWLF2055 751 S_AL0_96000308 Mass Cancellation: Customer Settlemt WAB_CANCEL Reverse Settlement Mgmt Documents RWLF2055 751 S_AL0_96000309 Mass Cancell. of Customer SettlLists WAB_CANCEL Reverse Settlement Mgmt Documents RWLF2055 751 S_AL0_96000324 Mass Pricing: Vendor Settlement List WAB_PRICING Mass Pricing for Settl. Mgmt Docs RWLF2054 751 S_AL0_96000325 Mass release payment documents WAB_PRICING Mass Pricing for Settl. Mgmt Docs RWLF2054 751 S_AL0_96000333 Settlem. Doc List Expense Settlement WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_AL0_96000334 Release Expense Settlement Documents WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_AL0_96000335 Mass Release of Customer Settlement WAB_RELEASE Release Settlement Management Docs RWLF2056 751 S_AL0_96000336 Mass Cancellation: Expense Settlemt WAB_CANCEL Reverse Settlement Mgmt Documents RWLF2055 751 S_ALN_01000170 Settlement Document Lists WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_ALN_01000171 Settl Doc Lists From Cust Settl List WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_ALN_01000172 Settlem. Doc Lists From VBilling Doc WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_ALN_01000173 Settlem. Doc List from Cust. Settlmt WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_ALN_01000174 Remun. Lists From Expense Settlement WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_ALN_01000175 Relevant Payment Documents WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_ALN_01000176 Customer Settlement Documents WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_ALN_01000177 Relevant Customer Settlement Lists WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_ALN_01000178 Expense Settlement Documents WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_ALN_01000179 Relevant Vendor Billing Documents WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_ALN_01000371 Simulation of Settlement Doc Lists WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_ALN_01000372 Simulation of Settlement Doc Lists WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_ALN_01000373 Simulation of Settlement Doc Lists WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_ALN_01000375 Simulation of Settlement Doc Lists WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_ALN_01000376 Simulation: Remu. List From Delivery WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_E37_17000019 Extended Remuneratn Lists from FI-B WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_E37_17000020 Simulation RemuneratnLists from FI-B WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_E37_17000021 Dispatcher Message Output WLN14D Dispatcher: Message Output 751 S_E4R_35000021 Extended Remuneratn Lists from SD-F WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_E4R_35000022 Simulatn Remuneratn Lists from SD-F WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_E4R_35000024 Relevant FI Docs for Extnd RemunList WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_E4R_35000025 Relevant SD Bill Docs fr Extd RemLst WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_PRN_53000718 Remun. Lists from Vendor Settlements WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_PRN_53000719 Remun. Lists from Vendor Settlements WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 S_PRN_53000720 Remun. Lists from Vendor Settlements WLFSLRL Worklist-Based Settlement Doc. List RWLF_SETTLEMENT_LIST_RL 751 S_PRN_53000721 SAPLS_CUS_IMG_ACTIVITY WLF_RRLE_CREATE Create Settlement Document Lists RWLF9039 751 S_PRN_53000722 WLF_RRLE_SIM Simulation Settlement Document Lists RWLF9042 751 V+21 Create Sales Prospect SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V+22 Create Competitor SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V+23 Create Business Partner SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-03 Create ordering party (Sales) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-04 Create invoice recipient (Sales) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-05 Create payer (Sales) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-06 Create consignee (Sales) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-07 Create one-time customer (Sales) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-08 Create payer (Centrally) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL 751 V-09 Create ordering party (Centrally) SAPMF02D BP Maintain Business Partner SAPLBUPA_DIALOG_JOEL Fiori App Mapping (Fiori vs TCodes) SAP has m ade availa ble a F iori Library that allows a Fiori Tiles mapping with the SAP GUI Transa ction Code. You can check it using my table below. FioriID TCodes App Name App Type App Component Device Type Product Version Tech Catalog Descript Bus Catalog Descript Link F0029 V.00 Sales Order Fulfillment Issues Transactional SD-FIO-HBA Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2021 CEC: Customer Engagement and Commerce - SD Sales - Sales Order Processing [+] F0029A V.00 Sales Order Fulfillment Issues (Version 2) Transactional, Analytical SD-FIO-HBA Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 CEC: Customer Engagement and Commerce - SD Sales - Sales Order Monitoring, Sales - Sales Order Monitoring and Tracking [+] F0046A XD03 Customer Master FactSheets Fact sheet LO-MD-FIO-CM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP CMD Technical Catalog: All Apps Master Data - Customer Display, Management of Change [+] F0106 FDM_COLL01 Process Receivables Transactional FIN-FIO-CCD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Accounts Payable Receivable Apps: All Apps Cash Management - Cash Operations [+] F0217 BNK_MONIP Track Supplier Invoices Transactional FI-FIO-AP-TRA Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps [+] F0232A VL33N Inbound Delivery (S/4HANA) Fact sheet LE-SHP-FIO-OBP Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistics Execution - Inbound Deliveries Display [+] F0233A VL03N Outbound Delivery (S/4HANA) Fact sheet LE-SHP-FIO-OBP Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Management of Change, Logistic Execution - Outbound Deliveries Display [+] F0234A VL03N Returns Delivery (S/4HANA) Fact sheet LE-SHP-FIO-OBP Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistics Execution - Inbound Deliveries Display, Logistic Execution - Outbound Deliveries Display [+] F0246 MD04 Monitor External Requirements Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - MRP Cockpit [+] F0247 MB53 Monitor Material Coverage - Net Segments Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2020 SAP: Production Planning & Shop Floor Control Production Planning - MRP Cockpit [+] F0247A MB53 Monitor Material Coverage (Version 2) Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - MRP Cockpit [+] F0250 MD04 Manage External Requirements Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - MRP Cockpit [+] F0263 MD07 Monitor Internal Requirements Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - MRP Cockpit [+] F0266 COOIS Monitor Production Orders or Process Orders Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - In-house Production [+] F0266A COOIS Monitor Production Orders or Process Orders (Version 2) Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - In-house Production [+] F0270 MD04 Manage Internal Requirements Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - MRP Cockpit [+] F0273 CO0R5 Manage Production Orders or Process Orders Transactional PP-FIO-MRP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Production Planning & Shop Floor Control: All Apps Production Planning - In-house Production [+] F0286A CJ20N Milestone Fact sheet PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Financial Control [+] F0288A CN23 Network (S/4HANA) Fact sheet PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Management - Commercial Project Management, Project Logistics Control [+] F0289A CN23 Network Activity (S/4HANA) Fact sheet PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Management - Commercial Project Management, Project Logistics Control [+] F0290A CJ08 Project Definition (S/4HANA) Fact sheet PS-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Management - Commercial Project Management, Project Financial Control [+] F0291A CJ13 WBS Element (S/4HANA) Fact sheet PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Management - Commercial Project Management, Project Financial Control [+] F0292 CJ12 Change WBS Element Status Transactional PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Financial Control [+] F0295 CJ20N Confirm Project Milestone Transactional PS-FIO-CON Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Financial Control, Project Logistics Control [+] F0296 CN25 Confirm Network Activity Transactional PS-FIO-CON Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Logistics Control [+] F0311A QS34 Inspection Method (S/4HANA) Fact sheet QM-FIO-IM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP QM: All Apps QM - Inspection Methods, QM - Inspection Methods Display, QM - Inspection Planning, QM - Results Recording [+] F0333A WA03 Allocation Table (S/4HANA) Transactional, Fact sheet LO-RFM-PUR-AL Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail & Fashion Management Allocation (Retail) - Allocation Table Display [+] F0335A WB03 Site (S/4HANA) Transactional, Fact sheet LO-RFM-MD-SIT Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail & Fashion Management Master Data (Retail) - Site Display [+] F0338A MM03 Material Master Transactional, Fact sheet LO-MD-MM Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1709 [+] F0346A MIR4 Supplier Invoice (S/4HANA) Transactional MM-FIO-IV Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1511 [+] F0348 ME23N Purchase Order Fact sheet MM-FIO-PUR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 1511 [+] F0348A ME23N Purchase Order (Version 2) Transactional MM-FIO-PUR-PO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Project Management - Commercial Project Management, Management of Change, Purchasing - Purchase Order Processing, Purchasing - Management, Purchasing - Purchasing Document Display, Materials Management - Employee Self Services V2, Project Financial Control, Finance - Account Reconciliation [+] F0349 ME53N Purchase Requisition Item Fact sheet MM-FIO-PUR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 1511 [+] F0349A ME53N Purchase Requisition Item (Version 2) Transactional, Fact sheet MM-FIO-PUR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Purchasing - Employee Self Services, Purchasing - Purchase Requisition Approval, Purchasing - Requirement Processing, Purchasing - Purchasing Document Display, Materials Management - Employee Self Services V2, Project Financial Control [+] F0351 ME13 Purchasing Info Record Fact sheet MM-FIO-PUR Desktop SAP FIORI FOR SAP S/4HANA 1511 [+] F0351A ME13 Purchasing Info Record (Version 2) Fact sheet MM-FIO-PUR-IR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Purchasing - Source Assignment, Purchasing - Sourcing Documents Display [+] F0354 MK03 Supplier Fact sheet LO-MD-BP-VM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP CMD Technical Catalog: All Apps|SAP Procurement Technical catalog: Fiori Apps Master Data - Supplier Display, Management of Change, Supplier and Category Management - Activity Management, Project Financial Control, Finance - Account Reconciliation [+] F0366 S_ALR_87013620 My Spend (Version 2) Transactional CO-FIO-OPA-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Controlling Apps: Fiori Apps Controlling - Cost Management [+] F0379A MI03 Manage Physical Inventory Documents Transactional, Fact sheet MM-FIO-IM-PI Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Procurement IM Technical Catalog Materials Management - Physical Inventory Management, Materials Management - Physical Inventory Processing, Materials Management - Inventory Processing Overview, Materials Management - Physical Inventory Document Display [+] F0380 UDM_SPECIALIST Process Collections Worklist Transactional FIN-FIO-CCD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Receivable - Collections [+] F0400A ME35K My Inbox - Approve Purchase Contracts Transactional MM-FIO-PUR-CON Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: All Apps [+] F0401A ME55 My Inbox - Approve Purchase Requisitions Transactional CA-INB-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Cross - Transactional Apps Manager Approval (Cross) - Content, Materials Management - Purchase Requisition Approval [+] F0402A ME29N My Inbox - Approve Purchase Order Transactional MM-FIO-PUR-PO-WFL Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: All Apps [+] F0409 PR05 My Travel Requests Transactional FI-FIO-TV-MTR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2020 Travel - Employee Travel - Employee Self Services [+] F0409A PR05 My Travel Requests (Version 2) Transactional FI-FIO-TV-MTR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Travel - Transactional Apps Travel - Employee Self Services [+] F0409B PR05 Travel Requests for Travel Assistant Transactional FI-FIO-TV-MTR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Travel - Employee Travel Assistant [+] F0410A SBWP My Inbox - Approve Travel Expenses Transactional FI-FIO-TV-ATE Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Cross - Transactional Apps Manager Approval (Cross) - Content [+] F0411A SBWP My Inbox - Approve Travel Requests Transactional FI-FIO-TV-ATR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Cross - Transactional Apps Manager Approval (Cross) - Content [+] F0431 MB03 Look Up Retail Products Transactional LO-RFM-STO-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail Store - Transactional Apps Retail Store Operations - Content [+] F0512A FF7A Liquidity Forecast Analytical FIN-FSCM-CLM-LM Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps [+] F0513A FF7A Actual Cash Flow Analytical FIN-FSCM-CLM-LM Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps Cash Management - Liquidity Management [+] F0515A FTE_BSM Bank Risk (S/4HANA) Analytical FIN-FSCM-CLM-COP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps Cash Management - Cash Operations [+] F0517A FTE_BSM Deficit Cash Pool (S/4HANA) Analytical FIN-FSCM-CLM-COP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps Cash Management - Cash Operations [+] F0539 CJ20N Change Network Activity Status Transactional PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Logistics Control [+] F0540A CJ20N Material Component Fact sheet PS-FIO-STR Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Project Systems Technical Catalog Project Logistics Control [+] F0547A ME2C My Purchasing Document Items (S/4HANA) Transactional MM-PUR-PO Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1809 [+] F0584 PR05 My Travel and Expenses Transactional FI-FIO-TV-MTE Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2021 Travel - Employee Travel - Employee Self Services [+] F0584A PR05 My Travel and Expenses (Version 2) Transactional FI-FIO-TV-MTE Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Travel - Employee Travel - Employee Self Services [+] F0584B PR05 Travel and Expenses for Travel Assistant Transactional FI-FIO-TV-MTE Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 Travel - Employee Travel Assistant [+] F0586 MB03 Adjust Stock Transactional LO-RFM-STO-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail Store - Transactional Apps Retail Store Operations - Content [+] F0593 FB02 Manage Payment Blocks Transactional FI-FIO-AP-PAY Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Operational Processing [+] F0593A FB02 Manage Payment Blocks V2 Transactional FI-FIO-AP-PAY Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Operational Processing [+] F0617A DAGRUN Manage Data Aging Groups (Version 2) Transactional BC-ILM-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Application Services: Fiori Apps [+] F0618A DAGOBJ Monitor Data Aging Objects (Version 2) Transactional BC-CCM-FIO-DAG Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2020 [+] F0627A SARA Manage Archiving Variants Transactional BC-ILM-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Application Services: Fiori Apps Information Lifecycle Management - Archiving [+] F0673 BNK_APP Approve Bank Payments Transactional FI-FIO-AP Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 1709 SAP: Financials - Accounts Payable Receivable Apps [+] F0673A BNK_APP Approve Bank Payments (Version 2) Transactional FI-FIO-AP Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Payment Approval, Bank Communication - Approval (Obsolete), Cash Management - Cash Operations, Cash Management - Cash Operations Basic [+] F0691 FRFT_B Make Bank Transfers Transactional FIN-FSCM-CLM-COP-BT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps Cash Management - Cash Operations [+] F0692 BNK_MONI Track Bank Transfers Transactional FIN-FSCM-CLM-COP-BT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Cash Management Apps: All Apps Cash Management - Cash Operations [+] F0701 FK10N Display Supplier Balances Analytical FI-FIO-AP-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Operational Processing [+] F0702 UDM_DISPUTE Manage Dispute Cases Transactional FIN-FIO-CCD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Accounts Payable Receivable Apps: All Apps [+] F0702A UDM_DISPUTE Manage Dispute Cases (Version 2) Transactional FIN-FIO-CCD-COL Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Receivable - Dispute Resolution [+] F0703 FD10 Display Customer Balances Analytical FI-FIO-AR-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Receivable - Document Processing, Sales Accounting - Reporting [+] F0706 FAGLL03 Display G/L Account Line Items Transactional FI-FIO-GL Desktop SAP FIORI FOR SAP S/4HANA 1709 SAP: Financials - Accounting General Ledger - Operational Processing [+] F0707 F.08 Display G/L Account Balances Analytical FI-FIO-GL-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Analytics [+] F0707A F.08 Display G/L Account Balances (New) Analytical FI-FIO-GL-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Analytics [+] F0708 F.01 Balance Sheet/Income Statement Transactional FI-GL-GL Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Reporting [+] F0711 FBL5 Manage Customer Line Items Transactional FI-FIO-AR-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Receivable - Document Processing, Sales Accounting - Reporting [+] F0712 FBL1 Manage Supplier Line Items Transactional FI-FIO-AP-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Operational Processing [+] F0714A FM5I Manage Funds Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data, Grant Specialist Master Data [+] F0715A FM_SETS_FUND3 Fund Group 360° View Transactional PSM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data, Grant Responsible Master Data, Grant Specialist Master Data [+] F0718 F-02 Post General Journal Entries Transactional FI-FIO-GL-TRA Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Journal Entry Processing, General Ledger - Submit Journal Entries for Verification, General Ledger - Verify Journal Entries [+] F0722A FMSC Manage Funds Centers Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0723A FMBPD Manage Budget Periods Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0724A FM_SETS_FICTR3 Funds Center Group 360° View Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0725A BP_SETS_3 Budget Period Group 360° View Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0726A FMCIA Manage Commitment Items Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0727A FM_SETS_FUNCTION3 Functional Area Group 360° View Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0728A FMRP_RFFMEP1AX Manage Functional Areas Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0729A FM_SETS_FUNDPRG3 Funded Program Group 360° View Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0730A FM_SETS_FIPEX3 Commitment Item Group 360° View Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0731 FS00 Manage G/L Account Master Data Web Dynpro FI-FIO-GL Desktop SAP FIORI FOR SAP S/4HANA 1511 [+] F0731A FS00 Manage G/L Account Master Data (Version 2) Transactional FI-FIO-GL-MD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Master Data for Chart of Accounts, Project Financial Control, G/L Account Factsheets [+] F0732 KE51 Manage Profit Center Master Data Web Dynpro FI-FIO-GL Desktop SAP FIORI FOR SAP S/4HANA 2020 SAP Finance - Controlling: Classic Apps Overhead Cost Accounting - Profit Center Master Data, General Ledger - Master Data Maintenance [+] F0735 FF7AN Check Cash Flow Items Transactional FIN-FSCM-CLM-COP-PD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Cash Management Apps: Fiori Apps Cash Management - Cash Operations, Cash Management - Cash Operations Basic, Treasury - Balance Sheet FX Risk [+] F0737 FF7AN Cash Position Details Transactional FIN-FSCM-CLM-COP Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1610 SAP: Financials - Cash Management Apps Cash Management - Cash Operations [+] F0741 FF7B Liquidity Forecast Details Analytical, Web Dynpro FIN-FSCM-CLM-LM Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Cash Management: Classic Apps Cash Management - Liquidity Management [+] F0741A FF7B Liquidity Forecast Details (Design Studio) Analytical, BW Query used FIN-FSCM-CLM-LM Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Cash Management Apps: All Apps Cash Management - Liquidity Management [+] F0743 F-47 Create Single Payment Transactional FI-FIO-AP-PAY Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable - Payments [+] F0744 F.64 Create Correspondence Transactional FI-FIO-AR-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable and Receivable - Correspondence, Accounts Payable - Operational Processing [+] F0744A FB12 Create Correspondence (Version 2) Transactional FI-FIO-AR Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable and Receivable - Correspondence, Accounts Payable - Operational Processing, General Ledger - Closing, General Ledger - Journal Entry Clearing, General Ledger - Journal Entry Processing [+] F0752 ME22N Order Products Transactional LO-RFM-STO-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail Store - Transactional Apps Retail Store Operations - Content [+] F0753 MB11 Transfer Stock Transactional LO-RFM-STO-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Retail Store - Transactional Apps Retail Store Operations - Content [+] F0763 F.10 Display Chart of Accounts Transactional FI-FIO-GL SAP FIORI FOR SAP S/4HANA 1511 [+] F0763A F.10 Manage Chart of Accounts Transactional FI-FIO-GL-MD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps General Ledger - Master Data for Chart of Accounts [+] F0764 KCH1 Manage Profit Center Groups Web Dynpro CO-FIO-PCA-MD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Profit Center Accounting - Profit Center Master Data [+] F0770 FBZ8 Manage Automatic Payments Transactional FI-FIO-AP-PAY Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable and Receivable - Payments, Accounts Payable - Payments [+] F0771 F110 Revise Payment Proposals Transactional FI-FIO-AP-PAY Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Payable and Receivable - Payments, Accounts Payable - Payments [+] F0773 F-32 Clear Incoming Payments Transactional FI-FIO-AR-TRA Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounts Payable Receivable Apps: Fiori Apps Accounts Receivable - Clearing [+] F0775A FMMEASURE Manage Funded Programs Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0797 VF02 Manage Billing Documents Transactional SD-FIO-BIL Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 CEC: Customer Engagement and Commerce - SD Administration - Retail, Sales - Billing Document [+] F0798 VF01 Create Billing Documents Transactional SD-FIO-BIL Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 CEC: Customer Engagement and Commerce - SD Sales - Billing Document [+] F0805A FM6S Manage Applications of Funds Transactional PSM-FM-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Budget Specialist - Master Data [+] F0806 COFI Open Posting Periods Transactional FI-FIO-GL Desktop SAP FIORI FOR SAP S/4HANA 1610 [+] F0832A FMEDD Budget Entry Document 360° View Transactional PSM-FM-BCS-BU Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Data, Budget Maintenance [+] F0833A FMRESDISPLAY Earmarked Funds Document 360° View Transactional PSM-FM-PO-EF Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Earmarked Funds, Budget Specialist - Earmarked Funds [+] F0837A GMGRANTD Grant 360° View Transactional PSM-GM-GTE-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps|Public Sector Funds Management AVC Analytics Budget Responsible - Master Data, Grant Responsible Master Data, Grant Specialist Master Data [+] F0838A GM_SETS_GRANT3 Grant Group 360° View Transactional PSM-GM-GTE-MD Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Public Sector Funds Management Apps Budget Responsible - Master Data, Grant Responsible Master Data, Grant Specialist Master Data [+] F0840 ME11 Manage Sources of Supply Transactional MM-PUR-VM-REC SAP FIORI FOR SAP S/4HANA 1511 [+] F0840A ME01 Manage Sources of Supply (Version 2) Transactional MM-PUR-SQ Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Purchasing - Source Assignment [+] F0842 ME21N Manage Purchase Orders Transactional MM-PUR-PO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 1909 Procurement Technical catalog [+] F0842A ME21 Manage Purchase Orders (Version 2) Transactional MM-FIO-PUR-PO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Purchasing - Purchase Order Processing, Purchasing - Central Purchase Order Processing [+] F0843 MB01 Post Goods Receipt for Purchasing Document Transactional MM-FIO-IM-SGM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement IM Technical Catalog: Fiori Apps Materials Management - Goods Receipt Processing, Materials Management - Warehouse Processing [+] F0850A BP Manage Customer Master Data Transactional LO-MD-FIO-CM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Master data - Business Partner Technical Catalog: All Apps Master Data - Customer Master, Retail In-Store MIM, Retail Store Management [+] F0859 F-41 Manage Supplier Invoices Transactional MM-FIO-IV Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Accounts Payable - Supplier Invoice Processing, Finance - Account Reconciliation, Project Management - Commercial Project Management, Purchasing - Employee Self Services, Purchasing - Management, Accounts Payable and Receivable - Supplier Invoice Display [+] F0862 SBWP My Inbox Transactional CA-INB-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP: Cross - Transactional Apps Manager Approvals - My Inbox [+] F0867 VL06G Outbound Deliveries Transactional LE-SHP-FIO-NAT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1709 SAP: LE - Transactional Apps Logistic Execution - Outbound Deliveries [+] F0867A VL06G Manage Outbound Deliveries Transactional LE-SHP-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistic Execution - Outbound Deliveries [+] F0868 VL06P Pick Outbound Delivery Transactional LE-SHP-FIO-NAT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistic Execution - Outbound Deliveries [+] F0869 VL10A Create Outbound Deliveries Transactional LE-SHP-FIO-NAT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1709 SAP: LE - Transactional Apps Logistic Execution - Outbound Deliveries [+] F0869A VL10A Create Outbound Deliveries - From Sales Orders Transactional LE-SHP-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistic Execution - Outbound Deliveries [+] F0870 V_SA Analyze Outbound Delivery Logs Transactional LE-SHP-FIO-NAT Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1709 SAP: LE - Transactional Apps Logistic Execution - Outbound Deliveries [+] F0870A V_SA Analyze Delivery Logs Transactional LE-SHP-FIO Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP LE - Transactional Apps: Fiori Apps Logistic Execution - Outbound Deliveries [+] F0925 KE30 Market Segments - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Controlling Apps: Fiori Apps|SAP Finance - Controlling: Classic Apps [+] F0925A KE30 Market Segments - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - Reporting [+] F0926 KE80 Profit Centers - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Profit Center Accounting - Profit Center Reporting [+] F0926A KE80 Profit Centers - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Profit Center Accounting - Profit Center Reporting [+] F0927 S_ALR_87012284 P&L - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps|SAP Finance - Controlling: Classic Apps|SAP Financials - Controlling Apps: Fiori Apps Sales Accounting - P and L Reporting [+] F0927A S_ALR_87012284 P&L - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - P and L Reporting [+] F0928 S_ALR_87013611 Cost Centers - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Cost Center Reporting [+] F0928A S_ALR_87013611 Cost Centers - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Cost Center Reporting [+] F0929 S_ALR_87012993 Internal Orders - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Internal Order Reporting [+] F0929A S_ALR_87012993 Internal Orders - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Internal Order Reporting [+] F0930 S_ALR_87013532 Projects - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps [+] F0930A S_ALR_87013532 Projects - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Project Reporting, Sales Accounting - Professional Services Reporting [+] F0931 KE30 Market Segments - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Sales Accounting - Reporting [+] F0931A KE30 Market Segments - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - Reporting [+] F0932 KE80 Profit Centers - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Profit Center Accounting - Profit Center Reporting [+] F0932A KE80 Profit Centers - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Profit Center Accounting - Profit Center Reporting [+] F0933 S_ALR_87012284 P&L - Plan/Actual YTD Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Sales Accounting - P and L Reporting [+] F0933A S_ALR_87012284 P&L - Plan/Actual YTD (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - P and L Reporting [+] F0934 S_ALR_87013635 Cost Centers - Plan/Actual with Currency Translation Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Cost Center Reporting [+] F0934A S_ALR_87013635 Cost Centers - Plan/Actual with Currency Translation (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Cost Center Reporting [+] F0935 S_ALR_87013013 Internal Orders - Plan/Actual with Currency Translation Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Internal Order Reporting [+] F0935A S_ALR_87013013 Internal Orders - Plan/Actual with Currency Translation (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Internal Order Reporting [+] F0936 S_ALR_87013532 Projects - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Project Reporting, Sales Accounting - Professional Services Reporting [+] F0936A S_ALR_87013532 Projects - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Project Reporting, Sales Accounting - Professional Services Reporting [+] F0937 KE30 Market Segments - Plan/Actual with Currency Translation Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps [+] F0937A KE30 Market Segments - Plan/Actual with Currency Translation (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - Reporting [+] F0938 KE80 Profit Centers - Plan/Actual with Currency Translation Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Profit Center Accounting - Profit Center Reporting [+] F0938A KE80 Profit Centers - Plan/Actual with Currency Translation (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Profit Center Accounting - Profit Center Reporting [+] F0939 S_ALR_87012284 P&L - Plan/Actual with Currency Translation Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Sales Accounting - P and L Reporting [+] F0939A S_ALR_87012284 P&L - Plan/Actual with Currency Translation (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - P and L Reporting [+] F0940 S_ALR_87013611 Cost Centers - Actuals Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Cost Center Reporting [+] F0940A S_ALR_87013611 Cost Centers - Actuals (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Cost Center Reporting [+] F0941 S_ALR_87012993 Internal Orders - Actuals Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Internal Order Reporting [+] F0941A S_ALR_87012993 Internal Orders - Actuals (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Internal Order Reporting [+] F0943 KE30 Market Segments - Actuals Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Sales Accounting - Reporting [+] F0943A KE30 Market Segments - Actuals (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - Reporting [+] F0944 KE80 Profit Centers - Actuals Web Dynpro CO-FIO-BPC-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Profit Center Accounting - Profit Center Reporting [+] F0944A KE80 Profit Centers - Actuals (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Profit Center Accounting - Profit Center Reporting [+] F0945 S_ALR_87012284 P&L - Actuals Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Sales Accounting - P and L Reporting [+] F0945A S_ALR_87012284 P&L - Actuals (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Sales Accounting - P and L Reporting [+] F0948 S_ALR_87012993 Internal Orders - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Internal Order Reporting [+] F0948A S_ALR_87012993 Internal Orders - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Internal Order Reporting [+] F0949 KSBL Cost Centers - Plan/Actual Web Dynpro CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Cost Center Reporting [+] F0949A KSBL Cost Centers - Plan/Actual (Design Studio) Analytical, BW Query used CO-FIO-BPC-IS Desktop SAP FIORI FOR SAP S/4HANA 2021 SAP Financials - Controlling Apps: All Apps Overhead Cost Accounting - Cost Center Reporting [+] F0996 FAGLB03 Trial Balance Web Dynpro FI-FIO-GL-IS Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Accounting: Classic Apps General Ledger - Reporting [+] F0996A FAGLB03 Trial Balance (Design Studio) Analytical, BW Query used FI-FIO-GL-IS Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP Financials - Accounting: Fiori Apps [+] F1022 KO01 Manage Internal Order (Web) Web Dynpro CO-FIO-OPA-MD Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP: Financials - Controlling Apps Overhead Cost Accounting - Internal Order Master Data [+] F1023 KS01 Manage Cost Center Master Data Web Dynpro CO-FIO Desktop SAP FIORI FOR SAP S/4HANA 1909 SAP Finance - Controlling: Classic Apps Overhead Cost Accounting - Cost Center Master Data [+] F1024 KSH1 Manage Cost Center Groups Web Dynpro CO-FIO-CCA-MD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps|SAP Financials - Controlling Apps: Fiori Apps Overhead Cost Accounting - Cost Center Master Data, Overhead Cost Accounting (UPA) - Cost Center Master Data [+] F1025 KL01 Manage Activity Type Master Data Web Dynpro CO-FIO Desktop SAP FIORI FOR SAP S/4HANA 1909 SAP Finance - Controlling: Classic Apps Overhead Cost Accounting - Cost Center Master Data [+] F1026 KOH1 Manage Internal Order Groups Web Dynpro CO-FIO-OPA-MD Desktop SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps Overhead Cost Accounting - Internal Order Master Data [+] F1027 KLH1 Manage Activity Type Groups Web Dynpro CO-FIO-ATY-MD Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Finance - Controlling: Classic Apps|SAP Financials - Controlling Apps: Fiori Apps Overhead Cost Accounting - Cost Center Master Data, Overhead Cost Accounting (UPA) - Cost Center Master Data [+] F1042 ALLOC_BATCH_RUN Allocate Production Transactional IS-OIL-UOM-ALN Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP OIL UPSTREAM: All Apps Oil and Gas Upstream - Hydrocarbon Analysis [+] F1047A MDC_ADMIN_DELETE Master Data Governance Consolidation (Version 2) Transactional CA-MDG-CMP-FIO Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP MDG|Consolidation and Mass Processing: All Apps CMD - Consolidation and Mass Processing for Business Partner Data, CMD - Consolidation and Mass Processing for Product Data [+] F1048 ME59N Process Purchase Requisitions Transactional MM-FIO-PUR-REQ-SOC Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Purchasing - Requirement Processing [+] F1051 VA45 SD Reuse Library Reuse Component SD-FIO-BIL SAP FIORI FOR SAP S/4HANA 2022 [+] F1052 VA45 SD Billing Reuse Library Reuse Component SD-FIO-BIL SAP FIORI FOR SAP S/4HANA 2022 [+] F1053A BP Manage Supplier Master Data Transactional LO-MD-FIO-VM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Master data - Business Partner Technical Catalog: All Apps Master Data - Supplier Master [+] F1060 MIR5 Supplier Invoices List Transactional MM-FIO-IV Desktop, Tablet SAP FIORI FOR SAP S/4HANA 1709 Procurement Technical catalog Accounts Payable - Supplier Invoices [+] F1060A MIR5 Supplier Invoices List (Version 2) Transactional MM-FIO-IV Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement Technical catalog: Fiori Apps Accounts Payable - Supplier Invoice Processing [+] F1061 MB1B Transfer Stock - In Plant Transactional MM-FIO-IM-SGM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement IM Technical Catalog: Fiori Apps Materials Management - Warehouse Processing [+] F1062 MIGO Manage Stock Transactional MM-FIO-IM-SGM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement IM Technical Catalog: Fiori Apps Materials Management - Warehouse Management [+] F1076 MB52 Stock - Single Material Analytical MM-FIO-IM-SGM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement IM Technical Catalog: Fiori Apps Materials Management - Warehouse Management, Materials Management - Material Stock Display, Materials Management - Stock Monitoring [+] F1077 MB51 Material Documents Overview Analytical MM-FIO-IM-SGM Desktop, Smartphone, Tablet SAP FIORI FOR SAP S/4HANA 2022 SAP Procurement IM Technical Catalog: Fiori Apps Materials Management - Warehouse Management, Materials Management - Warehouse Processing, Materials Management - Inventory Processing Overview, Materials Management - Employee Self Services V2, Administration - Retail, Materials Management - Material Movements Display, EAM - Maintenance Orders Management, EAM - Maintenance Orders Management, Finance - Account Reconciliation, Project Management - Commercial Project Management, Materials Management - Inventory Management Overview [+] F1079 MD61 Manage PIRs Transactional PP-MP-DEM Desktop SAP FIORI FOR SAP S/4HANA 1809 SAP SCM PP: All Apps Production Planning - Demand Forecasting [+] F1119 AJRW Fiscal Year Change Transactional FI-FIO-AA SAP FIORI FOR SAP S/4HANA 1511 SAP: Financials â Accounting Asset Accounting - Periodic Activities [+] F1240 SM36 Application Jobs Transactional BC-SRV-APS-APJ Desktop, Tablet SAP FIORI FOR SAP S/4HANA 2022 [+] SAP Fiori Apps Reference Library You can directly browse the SAP Library and download all the newest Fiori Apps updates available. Pat h : https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/ First you select the apps categories In this case I will select "All Apps" You can select a specific catalog component. In this case I will "Select All" And select "List View" You already can see the apps listed (more than 14k apps) Select "Column Display Settings" So you can add more information All columns are available Select "Transaction" So you can have Fiori Tile app and transaction code on the same line Which allows you to create a "Fiori App x T-Code" mapping You can click "Download" and you will have an excel with all the information. or Download excel spreadsheet formatted with all the applications available at the link below. Fiori Mapping File: (.XLSX | Size: 3 MB) References: SAP (www.sap.com ); SAP Support (support.sap.com ); SAP Help (help.sap.com ); SAP Blog (blogs.sap.com )
- Cyber Security
Topics: Web Security | DNS Setup DNSSEC | pfSense | Network Protocols | Gmail Advanced Optimization | Plus Addressing | Dotted Addressing Up Cyber Security Cyber Security Overview Cyber Security Solution | XDR vs SIEM Wazuh (XDR + SIEM Platform) Reverse Proxy Google | Gmail Optimization | DNSSEC Webserver DNS | Domain Name System Public DNS Servers rDNS |Reverse DNS mDNS | Multicast DNS Ping | How to Ping a Specific Port? Telnet | Teletype Network NMAP | Network Mapper Wireshark | Open-Source Network Packet Analyzer Network Protocols TCP vs UDP | Protocol Comparison SSL vs TLS | Protocol Comparison Public Cloud Services Comparison Cyber Security Overview Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. Information security protects the integrity and privacy of data, both in storage and in transit. Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources. End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization. Cyber Security Solution | XDR vs SIEM XDR (Extended detection and response) It is a comprehensive cybersecurity solution that combines multiple security technologies and data sources to provide enhanced threat detection, response, and remediation capabilities. XDR expands beyond traditional EDR (Endpoint Detection and Response) solutions and incorporates additional security telemetry data from various sources, such as network traffic, cloud environments, and other endpoints. Key features and benefits Enhanced visibility : XDR collects and analyzes data from diverse sources, including endpoints, network traffic, cloud platforms, and more. This broader visibility provides a comprehensive understanding of the organization's security posture and allows for the detection of complex threats that may span multiple layers. Advanced analytics and detection : XDR leverages advanced analytics, machine learning, and threat intelligence to detect and prioritize potential security incidents accurately. By applying behavioral analytics and anomaly detection, XDR can identify and flag suspicious activities or indicators of compromise. Automated and streamlined response : XDR streamlines the incident response process by automating investigation and remediation actions. It can orchestrate response activities across different security tools and endpoints, reducing the time and effort required to contain and mitigate threats. Threat hunting capabilities : XDR enables proactive threat hunting by allowing security teams to search for indicators of compromise (IoCs) and suspicious activities across the entire security ecosystem. This helps in identifying and eliminating threats before they cause significant damage. Improved operational efficiency : By consolidating and correlating security data from multiple sources, XDR simplifies security operations and reduces alert fatigue. It provides context-rich insights and actionable intelligence, enabling security teams to focus on critical threats and respond more efficiently. SIEM (Security information and event management) It is a cybersecurity solution that helps organizations collect, analyze, and correlate security event data from various sources within their IT infrastructure. SIEM systems provide real-time monitoring, threat detection, incident response, and compliance management capabilities. Key features and benefits Data Collection : SIEM collects log data, security events, and system activity logs from a wide range of sources, including network devices, servers, applications, firewalls, intrusion detection systems (IDS), and more. These logs contain valuable information about security events, user activities, and system behavior. Log Management : SIEM systems store and manage log data in a centralized repository or database. This allows for easy search, retrieval, and long-term retention of logs for compliance and forensic purposes. Event Correlation : SIEM analyzes and correlates log data from different sources to identify patterns, anomalies, and potential security incidents. It applies predefined rules or algorithms to match events and generate meaningful alerts or notifications. Real-Time Monitoring : SIEM continuously monitors security events in real time and provides dashboards and visualizations to give security teams a holistic view of the organization's security posture. It allows them to track activities, detect threats, and respond promptly to incidents. Threat Detection : SIEM uses rule-based correlation or advanced analytics techniques to detect potential security threats and malicious activities. It can identify patterns that indicate attacks, such as brute-force login attempts, suspicious network traffic, or unauthorized access attempts. Incident Response : SIEM provides workflows and automation capabilities to streamline incident response processes. It enables security teams to investigate and respond to security incidents efficiently, including threat containment, analysis, and remediation. Compliance Management : SIEM assists organizations in meeting regulatory compliance requirements by collecting and analyzing security logs for auditing purposes. It generates reports and provides evidence of compliance with standards such as PCI DSS, HIPAA, GDPR, and others. Log Retention and Forensics : SIEM systems store logs for extended periods, allowing security teams to perform forensic analysis and investigations when necessary. This helps in understanding the scope and impact of security incidents and supports post incident remediation efforts. XDR vs SIEM (Key Differences) 1. Data Sources: SIEM primarily focuses on log data from various sources within the network, such as firewalls, servers, applications, and network devices. It collects and analyzes logs to identify security events and generate alerts. XDR goes beyond logs and incorporates a broader range of security telemetry data. It collects and analyzes data from diverse sources, including endpoints, network traffic, cloud environments, and sometimes additional sources like cloud applications, email gateways, or user behavior analytics. 2. Endpoint vs. Network Focus: SIEM traditionally places more emphasis on network-focused data sources, analyzing logs from network devices and servers. While it can incorporate some endpoint data, the primary focus is on network-centric security events. XDR expands the scope to include both endpoint and network data. It incorporates endpoint detection and response (EDR) capabilities, analyzing endpoint activities, processes, and behaviors. It also includes network detection and response (NDR) functionalities to monitor network traffic and identify threats. 3. Threat Detection Approach: SIEM typically relies on rule-based correlation and signature-based detection to identify security incidents. It uses predefined rules and signatures to match events and generate alerts based on known patterns. XDR leverages advanced analytics, machine learning, and threat intelligence to detect sophisticated threats. It applies behavioral analytics, anomaly detection, and machine learning algorithms to identify anomalies, unknown threats, and indicators of compromise. 4. Response and Automation: SIEM systems provide alerting and reporting capabilities, allowing security teams to investigate and respond to incidents manually. While some level of automation is possible, the focus is primarily on generating alerts and providing analysis for human decision-making. XDR offers more extensive automation and orchestration capabilities. It can automate response actions, such as isolating compromised endpoints, blocking malicious network traffic, or initiating remediation tasks. 5. Holistic View and Context: SIEM provides visibility into security events and logs, allowing security teams to monitor activities and detect threats within the network. XDR aims to provide a unified and holistic view of the organization's security posture. By collecting and correlating data from various sources, including endpoints, network, and cloud. Wazuh (XDR + SIEM Platform) Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh unifies historically separate functions into a single agent and platform architecture. Active XDR protection from modern threats: Wazuh provides analysts real-time correlation and context. Active responses are granular, encompassing on-device remediation so endpoints are kept clean and operational. A comprehensive SIEM solution : The Wazuh Security Information and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events and incidents. Endpoint Security | Configuration Assessment, Malware Detection and File Integrity Monitoring Threat Intelligence | Threat Hunting, Log Data Analysis and Vulnerability Detection Security Operations | Incident Response, Regulatory Compliance and IT Hygiene Cloud Security | Container Security, Posture Management and Workload Protection How it is Structured Wazuh is structured around three pivotal components, each playing a distinct role: 1 | Indexer | The Indexer is the backbone of Wazuh, responsible for efficiently storing and managing vast amounts of security data. It plays a crucial role in facilitating rapid data retrieval and analysis Stage 1 Installation |Certificate creation Stage 2 Installation |Nodes installation Stage 3 Installation |Cluster initialization 2 | Server | Acting as the core processing unit, the Server interprets and analyzes the data collected by agents. It executes essential security operations, such as threat detection, incident response, and compliance management Stage 1 Installation | Wazuh server node installation Stage 2 Installation |Cluster configuration for multi-node deployment 3 | Dashboard | The Dashboard is the user-friendly interface that provides a visual representation of your security data. It offers pre-built dashboards for quick insights into security events, vulnerabilities, file integrity monitoring, configuration assessments, cloud infrastructure monitoring, and compliance standards Together, these three components form the foundation of Wazuh, offering a scalable and flexible solution to enhance your organization’s cybersecurity posture. Requirements OS: 64-bit Linux OS Versions: RHEL 7, 8, 9 | Amazon Linux 2 | CentOS 7, 8 | Ubuntu 16.04, 18.04, 20.04, 22.04 Hardware for 1-25 agents: Minimum: 2 CPU (cores) | 4 RAM (GBs) Recommended: 4 CPU (cores) | 8 RAM (GBs) Disk space for 1-25 agents: 50 GBs per 90 Days data Browser Compatibility: Chrome 95 or later | Firefox 93 or later | Safari 13.7 or later Browser w/Limited Support: Other Chromium-based browsers Browser Not Supported: Internet Explorer 11 is not supported Before Installation | Lessons Learned | Common constraints CPU/Memory Error | In the installation step the process can be aborted if the requirements are not met Even with the right CPUs/Memory RAM set, the script consider the available at the moment of installation, and the system will be consuming some of the resources. You can just increase a little more 1 Option: If you are using a VM, you can increase the CPU cores and Memory RAM 2 Option: You the "-i" in the end of the command to bypass that (you will see in the prompt command) Disk Space Error | In the final steps of the script (dashboard installation), the processes can fail and the installation reverted, due a lack of free disk Even with a large VM disk, this can happens due the way the Ubuntu setted the partitions 1 Option: You need to increase the partition before installation (How to do it) Virtual Hard Disk expands to Maximum Size If you are using a VM with a dynamically expanding disk, be aware that Wazuh may expand exponentially until it reaches the maximum disk size, despite the internal space being unused and available. Restrict the maximum size accordingly After Installation To deploy your first agent On the Wazuh Dashboard, go to Menu > Server Management > Endpoints Summary Lost Password | If you lost your initial admin password you can run this command Retrieve Users and Passwords | Command: tar -O -xvf wazuh-install-files.tar wazuh-install-files/wazuh-passwords.txt Deploying on Ubuntu This is the quickstart method, provided by Wazuh, to deploy the version v4.9.0 using the official bash script. You can check the official page for the latest version deployments. (https://documentation.wazuh.com/current/quickstart.html ) Open the terminal For non-root users, use the command "sudo " to perform administrative tasks (Optional) If your system id not updated | Update Ubuntu | Command: apt update Download the Wazuh installation assistant | Command: curl -sO https://packages.wazuh.com/4.9/wazuh-install.sh Execute the Wazuh Scrip using the assistant | Command: bash wazuh-install.sh -a (Optional) If the minimum hardware requirement error appears use "-i" | Command: bash wazuh-install.sh -a -i Login to wazuh using the Browser | Command: https:// Just wait a little longer if you get a message "Wazuh dashboard server is not ready yet " Initial user and password is informed at the end of installation Deploying on Docker This is the installation alternative method, provided by Wazuh, to deploy the version v4.8.2 on docker. You can check the official page for the latest version deployments. (https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html ) Open the terminal For non-root users, use the command "sudo " to perform administrative tasks (Optional) If your system id not updated | Update Ubuntu | Command: apt update Install Docker and Docker Compose | Command: apt install docker.io docker-compose -y Clone the Wazuh | Command: git clone https://github.com/wazuh/wazuh-docker.git -b v4.8.2 Check the new wazuh-docker directory | Command: ls Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Generate the certificate | Command: docker-compose -f generate-indexer-certs.yml run --rm generator Deploy Wazuh single-node using docker-compose in background | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: docker stats Login to wazuh using the Browser | Command: https:// Just wait a little longer if you get a message "Wazuh dashboard server is not ready yet " Initial user and password | User: admin / Password: SecretPassword Upgrading Wazuh on Docker If you have a previous version like v4.8.2, in this example you can upgrade to v4.9.0 Open terminal For non-root users, use the command "sudo " to perform administrative tasks Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Stop the outdated environment | Command: docker-compose down Checkout the tag for the current version | Command: git checkout v4.9.0 Start the new version of Wazuh | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: docker stats Restarting the Wazuh Container If you restart your VM, or for any other reason, your Wazuh dashboard starts giving errors, you can restart the Wazuh container to continue using it until you check the logs and fix the issues. Open terminal For non-root users, use the command "sudo " to perform administrative tasks Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Stop the outdated environment | Command: docker-compose down Wait until all processes are "done" Start the new version of Wazuh | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: sudo docker stats Reverse Proxy A reverse proxy is a server that sits in front of web servers and forwards client (e.g. web browser) requests to those web servers. Reverse proxies are typically implemented to help increase security, performance, and reliability. In order to better understand how a reverse proxy works and the benefits it can provide, let’s first define what a proxy server is. Benefits of a P roxy To avoid state or institutional browsing restrictions To block access to certain content To protect their identity online Benefits of a Reverse Proxy Load balancing Protection from attacks GSLB (Global server load balancing) Caching SSL encryption Forward Proxy Flow Reverse Proxy Flow Forward Proxy Flow 1/2 Google | Gmail Optimization | DNSSEC Webserver Gmail Advanced Optimization Plus Addressing Probably you receive a lot of unsolicited emails every day. That happens because many companies sell your data for data brokers. The Google "Plus Addressing" feature helps you to add additional information in your gmail address. Gmail Address: "Email Address" + "@gmail.com" (e.g. "johndoe@gmail.com ") Gmail Plus Addressing: "Email Address" + "Plus Addressing" + "@gmail.com" (e.g. "johndoe+amazon@gmail.com ") Example : If your email is "johndoe@gmail.com " and you want to to create a Amazon Account You can add "+amazon" in you email. So your email will be on Amazon "johndoe+amazon@gmail.com " You will receive the amazon emails in your gmail like the other emails, but you will be able to see the receiver as "johndoe+amazon@gmail.com " If Amazon sells your data for data brokers you will know what they did Warning : Nowadays, many companies already know this trick and are blocking Plus Addressing Dotted Addressing Unlike Plus Addressing, companies don't block dots in the Gmail address. It's not as flexible, but it's another way to change your email address without having to create another Gmail account. Gmail Address: "Email Address" + "@gmail.com" (e.g. "johndoe@gmail.com ") Gmail Dotted Addressing: "Email prefix" + "." "+ "Email suffix" (e.g. "john.doe@gmail.com ") Gmail Filtering You can use some filters in Gmail to find specific emails. On the gmail account, go to 'Show Search Option" In the field 'Has the words' Filter for emails with no Label | Syntax: has:nouserlabels Filter by Labels with space | Label '[ Important ]' nested on '[ Personal ]'|Syntax: user label:{[-Personal-] [-Important-]} Filter removing a specific Label | Syntax: -{label:[-Personal-]-[-Important-]} Filter by emails with no label, from yourself, before a date | Syntax: has:nouserlabels -from:me before:01/01/2013 DNSSEC on Google Domain with Cloudflare Activating DNSSEC on Google Domains with Cloudflare In Cloudflare go to | DNS > Settings > Activate DNSSEC Get the: Tag Key Digest In Google Domains go to | DNS Paste the: Tag Key Algorithm = 13 Digest Type = SHA256 Digest Wait a couple minutes and it is done. You can go back to Cloudflare and see the message "Success! Your domain is protected with DNSSEC." Google Domains DNSSEC Google Domains DNSSEC 1/1 DNS | Domain Name System DNS is often compared to a phone book, and it allows users to type domain names into their browsers without having to remember IP addresses. Browser: www.google.com > DNS Translates > IP Address: 142.250.187.228 Example: when a user types "www.google.com " into their browser, DNS translates that domain name into an IP address that their browser can use to load the website. DNS Record Types IP address resolution CNAME | CNAME records maps a domain name to another (canonical) domain name. They can be used to resolve other record types present on the target domain name Example: CNAME = 'finance' on google, like 'finance.google.com', will be mapped to 'https://www.google.com/finance/' A | A records map a domain name to one or multiple IPv4 address(es) Example: A = 'google.com' will be mapped to '142.250.187.238' AAAA | AAAA records map a domain name to one or multiple IPv6 address(es) Example: AAAA = 'google.com' will be mapped to '2a00:1450:4009:827::200e' Email authentication MX | A mail exchange (MX) record is required to deliver email to a mail server DKIM | A DomainKeys Identified Mail (DKIM) record ensures email authenticity by cryptographically signing emails SPF | A Sender Policy Framework (SPF) record lists authorized IP addresses and domains that can send email on behalf of your domain DMARK | A Domain-based Message Authentication Reporting and Conformance (DMARC) record helps generate aggregate reports about your email traffic and provide clear instructions for how email receivers should treat non-conforming emails Specialized records TXT | A text (TXT) record lets you enter text into the DNS system NS | A nameserver (NS) record indicates which server should be used for authoritative DNS CCA | A Certificate Authority Authorization (CAA) record specifies which Certificate Authorities (CAs) are allowed to issue certificates for a domain SRV | A service record (SRV) specifies a host and port for specific services like voice over IP (VOIP), instant messaging, and more SVCB and HTTPS | Service Binding (SVCB) and HTTPS Service (HTTPS) records allow you to provide a client with information about how it should connect to a server upfront, without the need of an initial plaintext HTTP connection PTR | A pointer (PTR) record specifies the allowed hosts for a given IP address SOA | A start of authority (SOA) record stores information about your domain such as admin email address, when the domain was last updated, and more DS and DNSKEY | DS and DNSKEY records help implement DNSSEC, which cryptographically signs DNS records to prevent domain spoofing There are 4 DNS servers involved in loading a webpage DNS Recursor | The recursor can be thought of as a librarian who is asked to go find a particular book somewhere in a library. The DNS recursor is a server designed to receive queries from client machines through applications such as web browsers. Typically the recursor is then responsible for making additional requests in order to satisfy the client’s DNS query Root Nameserver | The root server is the first step in translating (resolving) human readable host names into IP addresses. It can be thought of like an index in a library that points to different racks of books - typically it serves as a reference to other more specific locations TLD Nameserver | The top level domain server (TLD) can be thought of as a specific rack of books in a library. This nameserver is the next step in the search for a specific IP address, and it hosts the last portion of a hostname (In example.com, the TLD server is “com”) Authoritative Nameserver | This final nameserver can be thought of as a dictionary on a rack of books, in which a specific name can be translated into its definition. The authoritative nameserver is the last stop in the nameserver query. If the authoritative name server has access to the requested record, it will return the IP address for the requested hostname back to the DNS Recursor (the librarian) that made the initial request DNS Lookup For most situations, DNS is concerned with a domain name being translated into the appropriate IP address. Often DNS lookup information will be cached either locally inside the querying computer or remotely in the DNS infrastructure. There are typically 8 steps in a DNS lookup. When DNS information is cached, steps are skipped from the DNS lookup process which makes it quicker. The example below outlines all 8 steps when nothing is cached 1. A user types ‘example.com’ into a web browser and the query travels into the Internet and is received by a DNS recursive resolver 2. The resolver then queries a DNS root nameserver (.) 3. The root server then responds to the resolver with the address of a Top Level Domain (TLD) DNS server (such as .com or .net), which stores the information for its domains. When searching for example.com, our request is pointed toward the .com TLD 4. The resolver then makes a request to the .com TLD 5. The TLD server then responds with the IP address of the domain’s nameserver, example.com 6. Lastly, the recursive resolver sends a query to the domain’s nameserver 7. The IP address for example.com is then returned to the resolver from the nameserver 8. The DNS resolver then responds to the web browser with the IP address of the domain requested initially DNS Lookup DNS Lookup and Webpage Query DNS Record Request Sequence DNS Lookup DNS Lookup and Webpage Query 1/2 Once the 8 steps of the DNS lookup have returned the IP address for 'example.com', the browser is able to make the request for the web page: 9. The browser makes a HTTP request to the IP address 10. The server at that IP returns the webpage to be rendered in the browser DNS resolver The DNS resolver is the first stop in the DNS lookup, and it is responsible for dealing with the client that made the initial request. The resolver starts the sequence of queries that ultimately leads to a URL being translated into the necessary IP address. A typical uncached DNS lookup will involve both recursive and iterative queries. It's important to differentiate between a recursive DNS query and a recursive DNS resolver. The query refers to the request made to a DNS resolver requiring the resolution of the query. A DNS recursive resolver is the computer that accepts a recursive query and processes the response by making the necessary requests. 3 types of DNS queries Recursive Query | In a recursive query, a DNS client requires that a DNS server (typically a DNS recursive resolver) will respond to the client with either the requested resource record or an error message if the resolver can't find the record Iterative Query | In this situation the DNS client will allow a DNS server to return the best answer it can. If the queried DNS server does not have a match for the query name, it will return a referral to a DNS server authoritative for a lower level of the domain namespace. The DNS client will then make a query to the referral address. This process continues with additional DNS servers down the query chain until either an error or timeout occurs Non-recursive Query | Typically this will occur when a DNS resolver client queries a DNS server for a record that it has access to either because it's authoritative for the record or the record exists inside of its cache. Typically, a DNS server will cache DNS records to prevent additional bandwidth consumption and load on upstream servers DNS Caching The purpose of caching is to temporarily stored data in a location that results in improvements in performance and reliability for data requests. DNS caching involves storing data closer to the requesting client so that the DNS query can be resolved earlier and additional queries further down the DNS lookup chain can be avoided, thereby improving load times and reducing bandwidth/CPU consumption. DNS data can be cached in a variety of locations, each of which will store DNS records for a set amount of time determined by a time-to-live (TTL) Public DNS Servers A free, global DNS resolution service that you can use as an alternative to your current DNS provider. It first appeared to simplify and direct internet traffic for users globally. Public DNS servers are accessible to anyone with an internet connection and are often provided by internet service providers or third-party companies. These servers are most commonly used by individuals and organizations that do not require a private network for their DNS queries. They offer a straightforward and efficient way to navigate the web, helping users access websites quickly and reliably. DNS Ports DNS Standard | Port: 53 | Protocol: TCP and UDP DoH DNS-over-HTTPS | Port: 443 | Protocol: HTTPS (HTTP + SSL/TLS) DoT DNS-over-TLS | Port: 853 | Protocol: TCP DoQ DNS-over-QUIC | Port: 853 | Protocol: UDP DNSCrypt | Port: 443, 4443, 5443 or 8443 | Protocol: TCP or UDP Providers Type Category DNS IPv4 DNS-over-HTTPS DNS-over-TLS DNS-over-QUIC DNSCrypt IPv4 DNS IPv6 DNSCrypt IPv6 Ctry Page Comments Google DNS Top 8.8.8.8 and 8.8.4.4 https://dns.google/dns-query tls://dns.google 2001:4860:4860::8888 and 2001:4860:4860::8844 https://developers.google.com/speed/public-dns/ Google DNS is a free, global DNS resolution service that you can use as an alternative to your current DNS provider Cloudflare DNS Standard Top 1.1.1.1 and 1.0.0.1 https://dns.cloudflare.com/dns-query (IPv6: https://dns.cloudflare.com/dns-query) tls://one.one.one.one 2606:4700:4700::1111 and 2606:4700:4700::1001 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet Cloudflare DNS Malware blocking only Top 1.1.1.2 and 1.0.0.2 https://security.cloudflare-dns.com/dns-query tls://security.cloudflare-dns.com 2606:4700:4700::1112 and 2606:4700:4700::1002 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet Cloudflare DNS Malware and adult content blocking Top 1.1.1.3 and 1.0.0.3 https://family.cloudflare-dns.com/dns-query tls://family.cloudflare-dns.com 2606:4700:4700::1113 and 2606:4700:4700::1003 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet OpenDNS (Cisco) Standard Top 208.67.222.222 and 208.67.220.220 https://doh.opendns.com/dns-query tls://dns.opendns.com 2.dnscrypt-cert.opendns.com (IP: 208.67.220.220) 2620:119:35::35 and 2620:119:53::53 2.dnscrypt-cert.opendns.com (IPv6: [2620:0:ccc::2]) https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime OpenDNS (Cisco) FamilyShield Top 208.67.222.123 and 208.67.220.123 https://doh.familyshield.opendns.com/dns-query tls://familyshield.opendns.com 2.dnscrypt-cert.opendns.com (IP: 208.67.220.123) https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime OpenDNS (Cisco) Sandbox Top 208.67.222.2 and 208.67.220.2 https://doh.sandbox.opendns.com/dns-query tls://sandbox.opendns.com 2620:0:ccc::2 IP: 2620:0:ccd::2 https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime Quad9 DNS Standard Well Known 9.9.9.9 and 149.112.112.112 https://dns.quad9.net/dns-query tls://dns.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.9:8443) 2620:fe::fe IP: 2620:fe::fe:9 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::fe]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. Regular DNS servers which provide protection from phishing and spyware. They include blocklists, DNSSEC validation, and other security features Quad9 DNS Unsecured Well Known 9.9.9.10 and 149.112.112.10 https://dns10.quad9.net/dns-query tls://dns10.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.10:8443) 2620:fe::10 IP: 2620:fe::fe:10 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::fe:10]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. Unsecured DNS servers don't provide security blocklists, DNSSEC, or EDNS Client Subnet Quad9 DNS ECS support Well Known 9.9.9.11 and 149.112.112.11 https://dns11.quad9.net/dns-query tls://dns11.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.11:8443) 2620:fe::11 IP: 2620:fe::fe:11 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::11]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. EDNS Client Subnet is a method that includes components of end-user IP address data in requests that are sent to authoritative DNS servers. It provides security blocklist, DNSSEC, EDNS Client Subnet AdGuard Default Well Known 94.140.14.14 and 94.140.15.15 https://dns.adguard-dns.com/dns-query tls://dns.adguard-dns.com quic://dns.adguard-dns.com 2.dnscrypt.default.ns1.adguard.com (IP: 94.140.14.14:5443) 2a10:50c0::ad1:ff and 2a10:50c0::ad2:ff 2.dnscrypt.default.ns1.adguard.com (IPv6: [2a10:50c0::ad1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use AdGuard Family Protection Well Known 94.140.14.15 and 94.140.15.16 https://family.adguard-dns.com/dns-query tls://family.adguard-dns.com quic://family.adguard-dns.com 2.dnscrypt.family.ns1.adguard.com (IP: 94.140.14.15:5443) 2a10:50c0::bad1:ff and 2a10:50c0::bad2:ff 2.dnscrypt.family.ns1.adguard.com (IPv6: [2a10:50c0::bad1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use AdGuard Non-filtering Well Known 94.140.14.140 and 94.140.14.141 https://unfiltered.adguard-dns.com/dns-query tls://unfiltered.adguard-dns.com quic://unfiltered.adguard-dns.com 2.dnscrypt.unfiltered.ns1.adguard.com (IP: 94.140.14.140:5443) 2a10:50c0::1:ff and 2a10:50c0::2:ff 2.dnscrypt.unfiltered.ns1.adguard.com (IPv6: [2a10:50c0::1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use 0ms DNS Relevant https://0ms.dev/dns-query https://0ms.dev/ DNS is a global DNS resolution service provided by 0ms Group as an alternative to your current DNS provider. It uses OISD Big as the basic filter to give everyone a more secure environment. It is designed with various optimizations, such as HTTP/3, caching, and more. It leverages machine learning to protect users from potential security threats while also optimizing itself over time 360 Secure DNS Relevant 101.226.4.6 and 218.30.118.6 https://doh.360.cn/dns-query tls://dot.360.cn 123.125.81.6 and 140.207.198.6 CN Ali DNS Relevant 223.5.5.5 and 223.6.6.6 https://dns.alidns.com/dns-query tls://dns.alidns.com quic://dns.alidns.com:853 2400:3200::1 and 2400:3200:baba::1 https://alidns.com/ Ali DNS is a free recursive DNS service that committed to providing fast, stable and secure DNS resolution for the majority of Internet users. It includes AliGuard facility to protect users from various attacks and threats BebasDNS by BebasID Security Relevant https://antivirus.bebasid.com/dns-query tls://antivirus.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Family Relevant https://internetsehat.bebasid.com/dns-query tls://internetsehat.bebasid.com:853 2.dnscrypt-cert.internetsehat.bebasid.com (IP: 103.87.68.196:8443) https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Family With Ad Filtering Relevant https://internetsehat.bebasid.com/adblock tls://family-adblock.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID OISD Filter Relevant https://dns.bebasid.com/dns-oisd tls://oisd.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Hagezi Multi Normal Filter Relevant https://dns.bebasid.com/dns-hagezi tls://hagezi.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Unfiltered Relevant https://dns.bebasid.com/unfiltered tls://unfiltered.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Default Relevant https://dns.bebasid.com/dns-query tls://dns.bebasid.com:853 2.dnscrypt-cert.dns.bebasid.com (IP: 103.87.68.194:8443) https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection CFIEC Public DNS Relevant https://dns.cfiec.net/dns-query tls://dns.cfiec.net 240C::6666 and 240C::6644 IPv6-based anycast DNS service with strong security capabilities and protection from spyware, malicious websites. It supports DNS64 to provide domain name resolution only for IPv6 users CleanBrowsing Adult Filter Relevant 185.228.168.10 and 185.228.169.11 https://doh.cleanbrowsing.org/doh/adult-filter/ tls://adult-filter-dns.cleanbrowsing.org cleanbrowsing.org (IP: 185.228.168.10:8443) 2a0d:2a00:1::1 and 2a0d:2a00:2::1 cleanbrowsing.org (IPv6: [2a0d:2a00:1::1]:8443) https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content CleanBrowsing Family Filter Relevant 185.228.168.168 and 185.228.169.168 https://doh.cleanbrowsing.org/doh/family-filter/ tls://family-filter-dns.cleanbrowsing.org cleanbrowsing.org (IP: 185.228.168.168:8443) 2a0d:2a00:1:: and 2a0d:2a00:2:: cleanbrowsing.org (IPv6: [2a0d:2a00:1::]:8443) https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content CleanBrowsing Security Filter Relevant 185.228.168.9 and 185.228.169.9 https://doh.cleanbrowsing.org/doh/security-filter/ tls://security-filter-dns.cleanbrowsing.org 2a0d:2a00:1::2 and 2a0d:2a00:2::2 https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content Comodo Secure DNS Relevant 8.26.56.26 and 8.20.247.20 2.dnscrypt-cert.shield-2.dnsbycomodo.com (IP: 8.20.247.2) https://comodo.com/secure-dns/ Comodo Secure DNS is a domain name resolution service that resolves your DNS requests through worldwide network of DNS servers. Removes excessive ads and protects from phishing and spyware ControlD Block malware Relevant 76.76.2.1 https://freedns.controld.com/p1 tls://p1.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Block malware + ads Relevant 76.76.2.2 https://freedns.controld.com/p2 tls://p2.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Block malware + ads + social Relevant 76.76.2.3 https://freedns.controld.com/p3 tls://p3.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Non-filtering Relevant 76.76.2.0 and 76.76.10.0 https://freedns.controld.com/p0 p0.freedns.controld.com 2606:1a40:: and 2606:1a40:1:: https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services DNS Privacy Run by the Stubby developers Relevant tls://getdnsapi.net (IP: 185.49.141.37 and IPv6: 2a04:b900:0:100::37) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy Run by the Stubby developers | Provider: Surfnet Relevant tls://dnsovertls.sinodun.com (IP: 145.100.185.15 and IPv6: 2001:610:1:40ba:145:100:185:15) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy Run by the Stubby developers | Provider: Surfnet Relevant tls://dnsovertls1.sinodun.com (IP: 145.100.185.16 and IPv6: 2001:610:1:40ba:145:100:185:16) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy No-logging policy | Provider: UncensoredDNS Relevant tls://unicast.censurfridns.dk (IP: 89.233.43.71 and IPv6: 2a01:3a0:53:53::0) DK https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: UncensoredDNS Relevant tls://anycast.censurfridns.dk (IP: 91.239.100.100 and IPv6: 2001:67c:28a4::) DK https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: dkg Relevant tls://dns.cmrg.net (IP: 199.58.81.218 and IPv6: 2001:470:1c:76d::53) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.larsdebruin.net (IP: 51.15.70.167) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns-tls.bitwiseshift.net (IP: 81.187.221.24 and IPv6: 2001:8b0:24:24::24) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://ns1.dnsprivacy.at (IP: 94.130.110.185 and IPv6: 2a01:4f8:c0c:3c03::2) AT https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://ns2.dnsprivacy.at (IP: 94.130.110.178 and IPv6: 2a01:4f8:c0c:3bfc::2) AT https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.bitgeek.in (IP: 139.59.51.46) IN https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.neutopia.org (IP: 89.234.186.112 and IPv6: 2a00:5884:8209::2) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: Go6Lab Relevant tls://privacydns.go6lab.si (IPv6: 2001:67c:27e4::35) SI https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dot.securedns.eu (IP: 146.185.167.43 and IPv6: 2a03:b0c0:0:1010::e9a:3001) EU https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy Minimal logging/restrictions | Provider: NIC Chile Relevant tls://dnsotls.lab.nic.cl (IP: 200.1.123.46 and IPv6: 2001:1398:1:0:200:1:123:46) CL https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. These servers use some logging, self-signed certs or no support for strict mode DNS Privacy Minimal logging/restrictions | Provider: OARC Relevant tls://tls-dns-u.odvr.dns-oarc.net (IP: 184.105.193.78 and IPv6: 2620:ff:c000:0:1::64:25) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. These servers use some logging, self-signed certs or no support for strict mode DNS.SB Relevant 185.222.222.222 and 45.11.45.11 https://doh.dns.sb/dns-query tls://dot.sb 2a09:: and 2a11:: SB https://dns.sb/ DNS.SB provides free DNS service without logging and with DNSSEC enabled DNSPod Public DNS+ Relevant 119.29.29.29 and 119.28.28.28 https://doh.pub/dns-query tls://dot.pub https://www.dnspod.com/ DNSPod Public DNS+ is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service DNSPod Public DNS+ Relevant https://dns.pub/dns-query https://www.dnspod.com/ DNSPod Public DNS+ is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service DNSWatchGO Relevant 54.174.40.213 and 52.3.100.184 https://www.watchguard.com/wgrd-products/dnswatchgo DNSWatchGO is a DNS service by WatchGuard that prevents people from interacting with malicious content DeCloudUs DNS Relevant https://dns.decloudus.com/dns-query tls://dns.decloudus.com 2.dnscrypt-cert.DeCloudUs-test (IP: 78.47.212.211:9443) 2.dnscrypt-cert.DeCloudUs-test (IPv6: [2a01:4f8:13a:250b::30]:9443) https://decloudus.com/ DeCloudUs DNS is a DNS service that lets you block anything you wish while by default protecting you and your family from ads, trackers, malware, phishing, malicious sites, and much more Dyn DNS Relevant 216.146.35.35 and 216.146.36.36 https://help.dyn.com/internet-guide-setup/ Dyn DNS is a free alternative DNS service by Dyn Freenom World Relevant 80.80.80.80 and 80.80.81.81 https://freenom.world/en/index.html Freenom World is a free anonymous DNS resolver by Freenom World Hurricane Electric Public Recursor Relevant 74.82.42.42 https://ordns.he.net/dns-query tls://ordns.he.net 2001:470:20::2 https://dns.he.net/ Hurricane Electric Public Recursor is a free alternative DNS service by Hurricane Electric with anycast Mullvad Ad blocking Relevant https://adblock.dns.mullvad.net/dns-query tls://adblock.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Non-filtering Relevant https://dns.mullvad.net/dns-query tls://dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware blocking Relevant https://base.dns.mullvad.net/dns-query tls://base.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + social media blocking Relevant https://extended.dns.mullvad.net/dns-query tls://extended.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + adult + gambling blocking Relevant https://family.dns.mullvad.net/dns-query tls://family.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + adult + gambling + social media blocking Relevant https://all.dns.mullvad.net/dns-query tls://all.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Nawala Childprotection DNS Relevant 180.131.144.144 and 180.131.145.145 2.dnscrypt-cert.nawala.id (IP: 180.131.144.144) http://nawala.id/ Nawala Childprotection DNS is an anycast Internet filtering system that protects children from inappropriate websites and abusive contents Neustar Recursive DNS Reliability & Performance 2 Relevant 156.154.70.5 and 156.154.71.5 2610:a1:1018::5 and 2610:a1:1019::5 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide reliable and fast DNS lookups without blocking any specific categories and also prevent redirecting NXDomain (non-existent domain) responses to landing pages Neustar Recursive DNS Threat Protection Relevant 156.154.70.2 and 156.154.71.2 2610:a1:1018::2 and 2610:a1:1019::2 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide protection against malicious domains and also include "Reliability & Performance" features Neustar Recursive DNS Family Secure Relevant 156.154.70.3 and 156.154.71.3 2610:a1:1018::3 and 2610:a1:1019::3 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide adult content blocking and also include "Reliability & Performance" + "Threat Protection" features Neustar Recursive DNS Business Secure Relevant 156.154.70.4 and 156.154.71.4 2610:a1:1018::4 and 2610:a1:1019::4 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide blocking unwanted and time-wasting content and also include "Reliability & Performance" + "Threat Protection" + "Family Secure" features Neustar Recursive DNS Reliability & Performance 1 Relevant 156.154.70.1 and 156.154.71.1 2610:a1:1018::1 and 2610:a1:1019::1 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide reliable and fast DNS lookups without blocking any specific categories NextDNS Anycast Relevant https://anycast.dns.nextdns.io tls://anycast.dns.nextdns.io https://nextdns.io/ NextDNS provides publicly accessible non-filtering resolvers without logging in addition to its freemium configurable filtering resolvers with optional logging NextDNS Ultra-low latency Relevant https://dns.nextdns.io tls://dns.nextdns.io https://nextdns.io/ NextDNS provides publicly accessible non-filtering resolvers without logging in addition to its freemium configurable filtering resolvers with optional logging OpenBLD.net DNS Strict Filtering (RIC) Relevant https://ric.openbld.net/dns-query tls://ric.openbld.net https://openbld.net/ OpenBLD.net DNS — Anycast/GeoDNS DNS-over-HTTPS, DNS-over-TLS resolvers with blocking: advertising, tracking, adware, malware, malicious activities and phishing companies, blocks ~1M domains. Has 24h/48h logs for DDoS/Flood attack mitigation. More strictly filtering policies with blocking — ads, marketing, tracking, clickbait, coinhive, malicious, and phishing domains OpenBLD.net DNS Adaptive Filtering (ADA) Relevant https://ada.openbld.net/dns-query tls://ada.openbld.net https://openbld.net/ OpenBLD.net DNS — Anycast/GeoDNS DNS-over-HTTPS, DNS-over-TLS resolvers with blocking: advertising, tracking, adware, malware, malicious activities and phishing companies, blocks ~1M domains. Has 24h/48h logs for DDoS/Flood attack mitigation. Recommended for most users, very flexible filtering with blocking most ads networks, ad-tracking, malware and phishing domains RethinkDNS Non-filtering Relevant https://basic.rethinkdns.com/ tls://max.rethinkdns.com https://www.rethinkdns.com/configure Safe DNS Relevant 195.46.39.39 and 195.46.39.40 https://www.safedns.com/ Safe Surfer Relevant 104.155.237.225 and 104.197.28.121 2.dnscrypt-cert.safesurfer.co.nz (IP: 104.197.28.121) NZ https://www.safesurfer.co.nz/ Verisign Public DNS Relevant 64.6.64.6 and 64.6.65.6 2620:74:1b::1:1 and 2620:74:1c::2:2 https://www.verisign.com/security-services/public-dns/ Wikimedia DNS Relevant https://wikimedia-dns.org/dns-query tls://wikimedia-dns.org (IP: 185.71.138.138 and IPv6: 2001:67c:930::1) https://meta.wikimedia.org/wiki/Wikimedia_DNS dns0.eu Relevant 193.110.81.0 and 185.253.5.0 https://zero.dns0.eu/ tls://zero.dns0.eu quic://zero.dns0.eu EU https://www.dns0.eu/ dns0.eu is a free, sovereign and GDPR-compliant recursive DNS resolver with a strong focus on security to protect the citizens and organizations of the European Union 114DNS Family Regional 114.114.114.110 and 114.114.115.110 https://www.114dns.com/ 114DNS Normal Regional 114.114.114.114 and 114.114.115.115 https://www.114dns.com/ 114DNS Safe Regional 114.114.114.119 and 114.114.115.119 https://www.114dns.com/ Applied Privacy DNS Regional https://doh.applied-privacy.net/query tls://dot1.applied-privacy.net https://applied-privacy.net/ ByteDance Public DNS Regional 180.184.1.1 and 180.184.2.2 CIRA Canadian Shield DNS Protected Regional 149.112.121.20 and 149.112.122.20 https://protected.canadianshield.cira.ca/dns-query tls://protected.canadianshield.cira.ca (IP: 149.112.121.20 and IPv6: 2620:10A:80BB::20) 2620:10A:80BB::20 and 2620:10A:80BC::20 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CIRA Canadian Shield DNS Family Regional 149.112.121.30 and 149.112.122.30 https://family.canadianshield.cira.ca/dns-query tls://family.canadianshield.cira.ca (IP: 149.112.121.30 and IPv6: 2620:10A:80BB::30) 2620:10A:80BB::30 and 2620:10A:80BC::30 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CIRA Canadian Shield DNS Private Regional 149.112.121.10 and 149.112.122.10 https://private.canadianshield.cira.ca/dns-query tls://private.canadianshield.cira.ca (IP: 149.112.121.10 and IPv6: 2620:10A:80BB::10) 2620:10A:80BB::10 and 2620:10A:80BC::10 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CZ.NIC ODVR Regional 193.17.47.1 and 185.43.135.1 https://odvr.nic.cz/doh tls://odvr.nic.cz 2001:148f:ffff::1 and 2001:148f:fffe::1 CZ https://www.nic.cz/odvr/ Comss.one DNS Regional https://dns.controld.com/comss tls://comss.dns.controld.com quic://comss.dns.controld.com RU https://www.comss.ru/page.php?id=7315 DNS for Family Regional 94.130.180.225 and 78.47.64.161 https://dns-doh.dnsforfamily.com/dns-query tls://dns-dot.dnsforfamily.com quic://dnsforfamily.com (IP: 94.130.180.225) dnsforfamily.com (IP: 94.130.180.225) 2a01:4f8:1c0c:40db::1 and 2a01:4f8:1c17:4df8::1 dnsforfamily.com (IPv6: [2a01:4f8:1c0c:40db::1]) https://dnsforfamily.com/ Digitale Gesellschaft DNS Regional https://dns.digitale-gesellschaft.ch/dns-query (IP: 185.95.218.42 and IPv6: 2a05:fc84::42) tls://dns.digitale-gesellschaft.ch (IP: 185.95.218.43 and IPv6: 2a05:fc84::43) CH https://www.digitale-gesellschaft.ch/dns/ Fondation Restena DNS Regional https://kaitain.restena.lu/dns-query (IP: 158.64.1.29 and IPv6: 2001:a18:1::29) tls://kaitain.restena.lu (IP: 158.64.1.29 and IPv6: 2001:a18:1::29) LU https://www.restena.lu/en/service/public-dns-resolver IIJ.JP DNS Regional https://public.dns.iij.jp/dns-query tls://public.dns.iij.jp JP https://public.dns.iij.jp/ JupitrDNS Regional 35.215.30.118 and 35.215.48.207 https://dns.jupitrdns.com/dns-query tls://dns.jupitrdns.com quic://dns.jupitrdns.com https://jupitrdns.com/ LibreDNS Regional 88.198.92.222 https://doh.libredns.gr/dns-query tls://dot.libredns.gr (IP: 116.202.176.26) GR https://libredns.gr/ LibreDNS Ads Regional https://doh.libredns.gr/ads GR https://libredns.gr/ OneDNS Pure Edition Regional 117.50.10.10 and 52.80.52.52 https://www.onedns.net/ OneDNS Block Edition Regional 117.50.11.11 and 52.80.66.66 https://www.onedns.net/ OpenNIC DNS Regional 217.160.70.42 2001:8d8:1801:86e7::1 https://www.opennic.org/ Quad101 Regional 101.101.101.101 and 101.102.103.104 https://dns.twnic.tw/dns-query tls://101.101.101.101 2001:de4::101 and 2001:de4::102 TW https://101.101.101.101/ SWITCH DNS Regional dns.switch.ch IP: 130.59.31.248 https://dns.switch.ch/dns-query tls://dns.switch.ch (IP: 130.59.31.248 and IPv6: 2001:620:0:ff::2) dns.switch.ch IPv6: 2001:620:0:ff::2 CH https://www.switch.ch/security/info/public-dns/ SkyDNS RU Regional 193.58.251.251 RU https://www.skydns.ru/en/ Yandex DNS Basic Regional 77.88.8.8 and 77.88.8.1 https://common.dot.dns.yandex.net/dns-query tls://common.dot.dns.yandex.net 2a02:6b8::feed:0ff and 2a02:6b8:0:1::feed:0ff RU https://dns.yandex.com/ Yandex DNS Safe Regional 77.88.8.88 and 77.88.8.2 https://safe.dot.dns.yandex.net/dns-query tls://safe.dot.dns.yandex.net 2a02:6b8::feed:bad and 2a02:6b8:0:1::feed:bad RU https://dns.yandex.com/ Yandex DNS Family Regional 77.88.8.3 and 77.88.8.7 https://family.dot.dns.yandex.net/dns-query tls://family.dot.dns.yandex.net 2a02:6b8::feed:a11 and 2a02:6b8:0:1::feed:a11 RU https://dns.yandex.com/ AhaDNS Small (Risky) 5.2.75.75 https://doh.nl.ahadns.net/dns-query tls://dot.nl.ahadns.net 2a04:52c0:101:75::75 NL https://ahadns.com/ AhaDNS Small (Risky) 45.67.219.208 https://doh.la.ahadns.net/dns-query tls://dot.la.ahadns.net 2a04:bdc7:100:70::70 US https://ahadns.com/ Arapurayil Small (Risky) Host: https://dns.arapurayil.com/dns-query 2.dnscrypt-cert.dns.arapurayil.com (IP: 3.7.156.128) https://dns.arapurayil.com/ BlackMagicc DNS Small (Risky) 103.178.234.160 https://robin.techomespace.com/dns-query tls://robin.techomespace.com:853 2405:19c0:2:ea2e::1 https://bento.me/blackmagicc Captnemo DNS Small (Risky) 2.dnscrypt-cert.captnemo.in (IP: 139.59.48.222:4434) IN https://captnemo.in/dnscrypt/ DNS Forge Small (Risky) 176.9.93.198 and 176.9.1.117 https://dnsforge.de/dns-query tls://dnsforge.de 2a01:4f8:151:34aa::198 and 2a01:4f8:141:316d::117 DE https://dnsforge.de/ DNSWarden Small (Risky) https://dns.dnswarden.com/uncensored tls://uncensored.dns.dnswarden.com https://dnswarden.com/customfilter.html Dandelion Sprout's Official DNS Server Small (Risky) https://dandelionsprout.asuscomm.com:2501/dns-query tls://dandelionsprout.asuscomm.com:853 quic://dandelionsprout.asuscomm.com:48582 https://github.com/DandelionSprout/adfilt/tree/master/Dandelion%20Sprout's%20Official%20DNS%20Server FFMUC DNS Small (Risky) https://doh.ffmuc.net/dns-query tls://dot.ffmuc.net 2.dnscrypt-cert.ffmuc.net (IP: 5.1.66.255:8443) 2.dnscrypt-cert.ffmuc.net (IPv6: [2001:678:e68:f000::]:8443) https://ffmuc.net/ Lelux DNS Small (Risky) https://resolver-eu.lelux.fi/dns-query tls://resolver-eu.lelux.fi FI https://lelux.fi/resolver/ OSZX DNS OSZX DNS Small (Risky) 51.38.83.141 https://dns.oszx.co/dns-query tls://dns.oszx.co 2.dnscrypt-cert.oszx.co (IP: 51.38.83.141:5353) 2001:41d0:801:2000::d64 2.dnscrypt-cert.oszx.co (IPv6: [2001:41d0:801:2000::d64]:5353) UK https://dns.oszx.co/ OSZX DNS PumpleX Small (Risky) 51.38.82.198 https://dns.pumplex.com/dns-query tls://dns.pumplex.com 2.dnscrypt-cert.pumplex.com (IP: 51.38.82.198:5353) 2001:41d0:801:2000::1b28 2.dnscrypt-cert.pumplex.com (IPv6: [2001:41d0:801:2000::1b28]:5353) UK https://dns.oszx.co/ Privacy-First DNS Japan Server Small (Risky) 172.104.93.80 https://jp.tiar.app/dns-query tls://jp.tiar.app 2.dnscrypt-cert.jp.tiar.app (IP: 172.104.93.80) 2400:8902::f03c:91ff:feda:c514 Provider: 2.dnscrypt-cert.jp.tiar.app IP: [2400:8902::f03c:91ff:feda:c514] JP https://tiarap.org/ Privacy-First DNS Singapore Server Small (Risky) 174.138.21.128 https://doh.tiar.app/dns-query tls://dot.tiar.app quic://doh.tiar.app 2.dnscrypt-cert.dns.tiar.app (IP: 174.138.21.128) 2400:6180:0:d0::5f6e:4001 2.dnscrypt-cert.dns.tiar.app (IPv6: [2400:6180:0:d0::5f6e:4001]) SG https://tiarap.org/ Privacy-First DNS Cached via third-party Small (Risky) https://jp.tiarap.org/dns-query JP https://tiarap.org/ Privacy-First DNS Cached via third-party Small (Risky) https://doh.tiarap.org/dns-query SG https://tiarap.org/ Seby DNS Small (Risky) 45.76.113.31 tls://dot.seby.io 2.dnscrypt-cert.dns.seby.io (IP: 45.76.113.31) RS https://dns.seby.io/ fvz DNS Small (Risky) 2.dnscrypt-cert.dnsrec.meo.ws (IP: 185.121.177.177:5353) http://meo.ws/ fvz DNS Small (Risky) 2.dnscrypt-cert.dnsrec.meo.ws (IP: 169.239.202.202:5353) http://meo.ws/ ibksturm DNS Small (Risky) https://ibksturm.synology.me/dns-query (IP: 213.196.191.96) tls://ibksturm.synology.me (IP: 213.196.191.96) quic://ibksturm.synology.me (IP: 213.196.191.96) 2.dnscrypt-cert.ibksturm (IP: 213.196.191.96:8443) https://ibksturm.synology.me/ rDNS | Reverse DNS What is reverse DNS? A reverse DNS lookup is a DNS query for the domain name associated with a given IP address. This accomplishes the opposite of the more commonly used forward DNS lookup, in which the DNS system is queried to return an IP address. Standards from the Internet Engineering Task Force (IETF) suggest that every domain should be capable of reverse DNS lookup, but as reverse lookups are not critical to the normal function of the Internet, they are not a hard requirement. As such, reverse DNS lookups are not universally adopted. How does reverse DNS work? Reverse DNS lookups query DNS servers for a PTR (pointer) record; if the server does not have a PTR record, it cannot resolve a reverse lookup. PTR records store IP addresses with their segments reversed, and they append ".in-addr.arpa" to that. For example if a domain has an IP address of 192.0.2.1, the PTR record will store the domain's information under 1.2.0.192.in-addr.arpa. In IPv6, the latest version of the Internet Protocol, PTR records are stored within the ".ip6.arpa" domain instead of ".in-addr.arpa." What are reverse DNS lookups used for? Reverse lookups are commonly used by email servers. Email servers check and see if an email message came from a valid server before bringing it onto their network. Many email servers will reject messages from any server that does not support reverse lookups or from a server that is highly unlikely to be legitimate. Spammers often use IP addresses from hijacked machines, which means there will be no PTR record. Or, they may use dynamically assigned IP addresses that lead to server domains with highly generic names. Logging software also employs reverse lookups in order to provide users with human-readable domains in their log data, as opposed to a bunch of numeric IP addresses. mDNS | Multicast DNS What is multicast DNS? mDNS is meant to deal with having names for machines on local networks without needing to register them on DNS servers. This is especially useful when there are no DNS servers you can control – think of a home with a couple of devices who need to interact locally without going to the internet. Examples: Chromecast and network printers are some good examples. In the context of WebRTC, mDNS has been introduced to protect against the JavaScript application accessing the local IP addresses that are exchanged during ICE negotiation. This is achieved by the browser replacing its local IP addresses with random mDNS ones that it registers on the local network. ICE | Interactive Connectivity Establishment It is a standard method of NAT traversal used in WebRTC. It is defined in IETF RFC 5245. ICE deals with the process of connecting media through NATs by conducting connectivity checks. ICE collects all available candidates (local IP addresses, reflexive addresses – STUN ones and relayed addresses – TURN ones). All the collected addresses are then sent to the remote peer via SDP. Once the WebRTC Client has all the collected ICE addresses of itself and its peer, it starts initiating connectivity checks. These checks essentially try sending media over the various addresses until success. The downside of using ICE is the time it takes, which can be 10s of seconds. To run faster, a new mechanism was added in WebRTC called Trickle ICE. Ping | How to Ping a Specific Port? The Ping (Packet Internet or Inter-Network Groper) is a network tool for checking whether a remote system is up and running. In other words, the command determines if a certain IP address or a host are accessible. Ping uses a network layer protocol called Internet Control Message Protocol (ICMP) and is available on all operating systems. On the other hand, port numbers belong to transport layer protocols, such as TCP and UDP. Port numbers help identify where an Internet or other network message is forwarded when it arrives. Why Can't I Ping a Specific Port? Network devices use ICMP to send error messages and information on whether communication with an IP address is successful or not. ICMP differs from transport protocols as ICMP is not used to exchange data between systems. Ping uses ICMP packets, and ICMP does not use port numbers which means a port can’t be pinged . How Can I Ping a Specific Port? (Workaround) However, we can use ping with a similar intention to check if a port is open or not. Some network tools and utilities can simulate an attempt to establish a connection to a specific port and wait to see if the target host responds. If there is a response, the target port is open. If not, the target port is closed, or the host is unable to accept a connection because there is no service configured to listen for connections on that port. Tools to Ping a Port Telnet (Windows / Linux) On Windows, open the CMD Prompt (searching for "CMD") or Powershell (searching for "Powershell) On Linux, you can use the command directly at the prompt Command: telnet Example: telnet 10.0.0.100 8006 (Port 8006 is used by Proxmox) If the port is open, telnet establishes a connection. Otherwise, it states a failure NC | Netcat (Linux) Command: nc -vz Example: nc -vz 10.0.0.100 8006 (Port 8006 is used by Proxmox) The output informs the user if the connection to the specified port is successful or not. If it is successful, the port is open NMAP | Network Mapper (Linux) Command: nmap -p Example: nmap -p 8006 10.0.0.100 (Port 8006 is used by Proxmox) The output informs the user about the port’s state and service type, latency, and the time elapsed until the completion of the task To ping more than one port. Command: nmap -p Powershell (Windows) Open Powershell (searching for "Powershell) Command: Test-NetConnection -p Example: Test-NetConnection 10.0.0.100 -p 8006 (Port 8006 is used by Proxmox) If the port is open and the connection passes, the TCP test is successful. Otherwise, a warning message appears saying the TCP connection failed Installing the Tools Telnet (Windows / Linux) Ubuntu | Command: sudo apt install telnet CentOS/Fedora | Command: yum -y install telnet Windows | Check Here NC | Netcat (Linux) Debian, Ubuntu, and Mint Check if Netcat is installed| Command: netcat -h Fedora, Red Hat Enterprise Linux, and CentOS Check if Netcat is installed| Command: ncat -h If not installed | Command: sudo apt install netcat NMAP | Network Mapper (Linux) Check if NMAP is installed| Command: nmap -version If not installed Ubuntu or Debian | Command: sudo apt install nmap CentOS or RHEL | Command: sudo yum install nmap Telnet | Teletype Network Telnet is a network protocol that allows users to connect to and communicate with remote computers using a transmission control protocol/Internet protocol (TCP/IP) network. It provides a command-line interface that acts like a virtual terminal, allowing users to access a remote system as if they were physically there. It was developed in 1969 and has been an essential tool for connecting computers and devices remotely. Despite being an old protocol, it still plays a critical role in modern-day remote access solutions. Security Issue : Telnet is a popular choice for remote access because it's reliable and secure, and it's also easy to use and configure. However, it does have some security concerns because it lacks encryption and transmits data in clear text. This means that anyone with access to the network could potentially intercept and read the data, including passwords and sensitive data. Alternatives like SSH offer more secure remote management options. Common uses Remote management : Users can access and manage network nodes, such as servers, routers, and switches, from a distance Initial device setup : Users can set up network hardware Testing services : Users can test services Debugging email problems : Users can send emails directly from the server to detect errors Configuring servers : Users can quickly and easily implement changes to the directory structure, file access rights, or passwords Accessing legacy systems : Some legacy computer systems still rely on Telnet for remote access. It helps connect to these systems, run applications, process data, and manage resources. Troubleshooting network connectivity : It can be used to test connectivity to a network device or server. By establishing a Telnet connection to the device or server, you can check whether it’s reachable, identify any errors or connectivity issues, and diagnose network problems. How to use it to troubleshooting network connectivity You can check if a specific port is open simply: Open the PowerShell Typing the command: telnet Example: telnet 10.0.0.100 8006 (Port 8006 is used by Proxmox) If the port is open, telnet establishes a connection. Otherwise, it states a failure Installing Telnet Ubuntu Command: yum -y install telnet CentOS/Fedora Command: sudo apt install telnet Windows Open “Control Panel“ Open “Programs“ Select the “Turn Windows features on or off ” option Check the “Telnet Client” box Click “OK“. A box will appear that says “Windows features” and “Searching for required files“. When complete, the Telnet client should be installed in Windows NMAP | Network Mapper NMAP (Network Mapper) is a free and open source utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine: What hosts are available on the network What services (application name and version) those hosts are offering What operating systems (and OS versions) they are running What type of packet filters/firewalls are in use and other characteristics It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. Installing NMAP on Linux Check if NMAP is installed| Command: nmap -version If not installed Ubuntu or Debian | Command: sudo apt install nmap CentOS or RHEL | Command: sudo yum install nmap Running NMAP Run TCP Scan | Command: nmap -sT Run Script to find Vulnerabilities | Command: nmap --script vuln Wireshark | Open-Source Network Packet Analyzer Wireshark, Originally named Ethereal but renamed in May 2006, is a free and open-source network packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. A network packet analyzer presents captured packet data in as much detail as possible. You could think of a network packet analyzer as a measuring device for examining what’s happening inside a network cable, just like an electrician uses a voltmeter for examining what’s happening inside an electric cable (but at a higher level, of course). Intended Purposes Network administrators use it to troubleshoot network problems Network security engineers use it to examine security problems QA engineers use it to verify network applications Developers use it to debug protocol implementations People use it to learn network protocol internals What is not provided Wireshark isn’t an intrusion detection system Wireshark will not manipulate things on the network, it will only “measure” things from it Features Available for UNIX and Windows Capture live packet data from a network interface Open files containing packet data captured with tcpdump/WinDump, Wireshark, and many other packet capture programs Import packets from text files containing hex dumps of packet data Display packets with very detailed protocol information Save packet data captured Export some or all packets in a number of capture file formats Filter packets on many criteria Search for packets on many criteria Colorize packet display based on filters Create various statistics Capabilities Live capture from many different network media Wireshark can capture traffic from many different network media types, including Ethernet, Wireless LAN, Bluetooth, USB, and more The specific media types supported may be limited by several factors, including your hardware and operating system Import files from many other capture programs Wireshark can open packet captures from a large number of capture programs Export files for many other capture programs Wireshark can save captured packets in many formats, including those used by other capture programs Many protocol dissectors There are protocol dissectors (or decoders, as they are known in other products) for a great many protocols Ubuntu | Installing Wireshark Using the APT (Advanced Package Tool) Method) The software repository of Ubuntu includes Wireshark by default, which enables you to install the package using the APT. It is the easiest and most straightforward method. It ensures you have the latest version of Wireshark when the Ubuntu system is updated. Execute the following command in the Ubuntu terminal. Install the Wireshark | Command: sudo apt install wireshark You will be asked if a "non-superuser can capture packets". This means that a user other than the "root" user can run Wireshark. If you have another user, select "Yes " Add your user to the wireshark group | Command: sudo usermod -aG wireshark Example: sudo usermod -aG wireshark john01 If you use the "root" user, select "No " and you won't need to perform anything else OPTIONAL | If you want to change your "non-superuser packet capture" option later, use the Command: sudo dpkg-reconfigure wireshark-common Verify if the Wireshark was installed checking its version | Command: wireshark --version Launch the Wireshark | Command: sudo wireshark To uninstall Wireshark | Command: sudo apt-get remove --purge wireshark Using the PPA (Personal Package Archive) Method If the Ubuntu version of your computer is older, you can use the PPA maintained by the Wireshark developers. Add the official Wireshark PPA to your list of repositories |Command: sudo add-apt-repository ppa:wireshark-dev/stable -y Update the package list | Command: sudo apt update Install the Wireshark | Command: sudo apt install wireshark You will be asked if a "non-superuser can capture packets". This means that a user other than the "root" user can run Wireshark. If you have another user, select "Yes " Add your user to the wireshark group | Command: sudo usermod -aG wireshark Example: sudo usermod -aG wireshark john01 If you use the "root" user, select "No " and you won't need to perform anything else OPTIONAL | If you want to change your "non-superuser packet capture" option later, use the Command: sudo dpkg-reconfigure wireshark-common Verify if the Wireshark was installed checking its version | Command: wireshark --version Launch the Wireshark | Command: sudo wireshark To uninstall Wireshark | Command: sudo apt-get-repository –remove ppa:wireshark-dev/stable -y Network Protocols Network protocols are the sets of standards that allow two or more machines connected to the internet to communicate with each other. It works as a universal language, which can be interpreted by computers from any manufacturer, using any operating system. They are responsible for taking data transmitted over the network and dividing it into small pieces, which are called packets. Each packet carries source and destination addressing information. Protocols are also responsible for systematizing the establishment, control, traffic and closure phases. Key elements that define network protocols: Syntax: Represents the format of the data and the order in which it is presented Semantics: Refers to the meaning of each syntactic set that gives meaning to the message sent Timing: Defines an acceptable packet transmission speed Types of Network Protocols For communication between computers to be carried out correctly, both computers must be configured according to the same parameters and comply with the same communication standards. The network is divided into layers, each with a specific function. The different types of network protocols vary according to the type of service used and the corresponding layer. The main layers and their main protocol types: Application Layer: WWW, HTTP, SMTP, Telnet, FTP, SSH, NNTP, RDP, IRC, SNMP, POP3, IMAP, SIP, DNS, PING Transport Layer: TCP, UDP, RTP, DCCP, SCTP Network Layer: IPv4, IPv6, IPsec, ICMP Physical Link Layer: Ethernet, Modem, PPP, FDDi Transmission Control Protocol (TCP) TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. Internet Protocol (IP) IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks. User Datagram Protocol (UDP) UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications. Post office Protocol (POP) POP3 is designed for receiving incoming E-mails. Simple mail transport Protocol (SMTP) SMTP is designed to send and distribute outgoing E-Mail. File Transfer Protocol (FTP) FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc. Hyper Text Transfer Protocol (HTTP) HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly. Hyper Text Transfer Protocol Secure (HTTPS) HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets. SSL - Secure Sockets Layer It is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today. A website that implements SSL/TLS has "HTTPS" in its URL instead of "HTTP." TLS - Transport Layer Security It is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website. TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). In this article we will focus on the role of TLS in web application security. TLS was proposed by the Internet Engineering Task Force (IETF), an international standards organization, and the first version of the protocol was published in 1999. The most recent version is TLS 1.3, which was published in 2018. Telnet Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer. Gopher Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle. Protocols used by SAP Common Programming Interface for Communication (CPI-C) SAP uses Common Programming Interface for Communication (CPIC) protocol to transfer data between systems. CPIC is an SAP specific protocol. Open Data Protocol (OData) The Open Data Protocol (OData) is a standardized protocol for exposing and accessing information from various sources. OData is based on core protocols, including HTTP, AtomPub (Atom Publishing Protocol), XML, and JSON (Java Script Object Notation). MQTT - Message Queuing Telemetry Transport MQTT is a message protocol for machine-to-machine communication (M2M) and IoT. You can use the MQTT source system to set up a connection to an MQTT broker (MQTT server). It is most commonly run over TCP/IP stack, but there are MQTT implementations that use other protocols. The supported communication protocol between SAP S/4HANA and SAP Cloud Platform Enterprise Messaging will be MQTT (over Websocket). With the feature of Enterprise Event Enablement of S/4HANA, you can pass the S/4HANA event to the external systems via the middleware called SAP Cloud Platform Enterprise Messaging. HTTP vs MQTT: HTTP is typically a transient interface in which each request is a short-lived session. MQTT sessions are long-lived. Another important difference is that HTTP operates on a command-response basis. A command gets sent to the server and a response returns. TCP vs UDP | Protocol Comparison Whether your data is transferred quickly and in full depends on which network protocols you use, UDP or TCP. They both do the same job but in different ways. One is more reliable and the other one is faster. TCP (transmission control protocol) is connection-based, so it establishes a connection between the receiver and sender and maintains it while transferring data. It guarantees that the data arrives completely intact. UDP (User Datagram Protocol) is connectionless, so it doesn’t establish a prior connection between two parties. It has the potential to lose data along the way, but in return you’ll have much higher speeds. Reliability TCP: High UDP: Lower Speed TCP: Lower UDP: High Transfer Method TCP: Packets are delivered in a sequence UDP: Packets are delivered in a stream Error Detection and Correction TCP: Yes UDP: No Congestion Control TCP: Yes UDP: No Acknowledgement TCP: Yes UDP: Only the Checksum (Checksum is the final two bytes of the UDP header, a field that's used by the sender and receiver to check for data corruption) Warning : UDP is not recommended for transmitting large files. SSL vs TLS | Protocol Comparison Protocol Evolution : SSL 1.0 > SSL 2.0 > SSL 3.0 > TLS 1.0 > TLS 1.1 > TLS 1.2 > TLS 1.3 SSL (Secure Sockets Layer) Secure Sockets Layer (SSL) is a protocol that encrypts and secures data transmitted over the internet. SSL protects data from being intercepted by hackers and prevents them from stealing personal or financial information. SSL works by: Encryption: SSL encrypts data sent between a browser and a website or between two servers Authentication: SSL authenticates web servers. SSL initiates an authentication process between two devices called a handshake Integrity: SSL digitally signs data to verify that it hasn't been tampered with SSL was introduced by Netscape in 1995 and was the first widely used protocol for securing online transactions. Although it has been replaced by a more updated protocol called Transport Layer Security (TLS), SSL is still commonly used today. TLS (Transport Layer Security) Transport Layer Security (TLS) is a security protocol that encrypts data sent between computers over the internet. It's used to protect data from hackers and ensure that all parties involved in a transaction are who they claim to be. TLS has three main functions: Encryption: Hides sensitive data during transfer Authentication: Verifies the identities of the client and server Integrity: Verifies that data hasn't been tampered with or forged TLS is the most widely used security protocol today. It's primarily used to encrypt communication between web browsers and servers, but it can also secure email and other protocols. TLS handshakes are a multi-step process that involves the client authenticating the server and the client and server exchanging a shared secret. TLS replaced SSL in 2015 after SSL was compromised by vulnerabilities. Most people still use the term SSL because it's more widely known. Protocol Comparison Stands For SSL: Secure Sockets Layer TLS: Transport Layer Security Version History SSL: Replaced with TLS. SSL moved through versions 1.0, 2.0, and 3.0 TLS: Upgraded version of SSL. TLS has moved through versions 1.0, 1.1, 1.2, and 1.3 Algorithm SSL: Supports older algorithms with known security vulnerabilities TLS: Utilizes advanced encryption algorithms (Fortezza algorithm is not supported) Activity SSL: It is now considered deprecated due to significant vulnerabilities TLS: Currently the versions 1.2 and 1.3 are actively used due to its robust security Alert Messages SSL has only two types of alert messages. Alert messages are unencrypted TLS alert messages are encrypted and more diverse Message Authentication SSL: Uses Message Authentication Code (MAC) protocols TLS: Deploys Hashed Message Authentication Code (HMAC) protocols Cipher Suites SSL: Supports older algorithms with known security vulnerabilities TLS: Uses advanced encryption algorithms Handshake SSL: Handshake is complex and slow TLS: Handshake is simplified (it has fewer steps), faster, and more secure Connection SSL: Establishes connection using a port TLS: Establishes connection using protocol Public Cloud Services Comparison Cloud services are application and infrastructure resources that exist on the Internet. Third-party providers contract with subscribers for these services, allowing customers to leverage powerful computing resources without having to purchase or maintain hardware and software. Services Microsoft Azure Amazon AWS Google Cloud Analytics Azure Stream Analytics Amazon Kinesis Cloud Dataflow App Hosting Azure Cloud Services Amazon Elastic Beanstalk Google App Engine Automation Azure Automation AWS Opsworks Compute Engine Management Block Storage Azure Managed Storage Amazon Elastic Block Storage Persistent Disk Cloud Agnostic Container Azure AKS Amazon EKS GKE Cloud Specific Container Azure Container Service EC2 Container Service Container Engine Compliance Azure Trust Center AWS Cloud HSM Google Cloud Plataform Security Computing Virtual Machine Elastic Compute Cloud (EC2) Compute Engine Content Delivery Network (CDN) Azure CDN Amazon CloudFront Cloud CDN DNS Services Azure Traffic Manager AWS Route 53 Cloud DNS Identity & Access Management Azure Active Directory AWS Identity and Access Management Cloud Identity Access Management Key Management Services Azure Key Vault AWS KMS Google Cloud KMS Load Balancing Load Balancing for Azure Elastic Load Balancing Cloud Load Balancing Log Monitoring Azure Operational Insights Amazon CloudTrail Cloud Logging NoSQL Database Options Azure DocumentDB AWS DynamoDB Cloud Datastore Notifications Azure Notification Hub Amazon Simple Notification Service - Object Storage Azure Blob Storage Amazon Storage (S3) Cloud Storage Performance Monitoring Azure Application Insights Amazon CloudWatch Stackdriver Monitoring Private Connectivity Azure Express Route AWS Direct Connect Cloud Interconnect Relational Database Azure Relational Database Amazon RDS Cloud SQL Scaling Options Azure Autoscale Auto Scaling Auto Scaler Serverless Computing Azure Functions AWS Lambda Google Cloud Functions Virtual Network Azure Virtual Network Amazon VPC Cloud Virtual Network References: Palo Alto Networks (www.paloaltonetworks.com ); Wikipedia (www.wikipedia.org); Google (www.google.com ); Oracle (www.oracle.com ); Raspberry PI (www.raspberrypi.org ); Microsoft (www.microsoft.com ); CloudFlare (www.cloudflare.com ); NordVPN (nordvpn.com )
- SAP NFe | Finance
Finance Currency Types Account Master Data Document Split Currency Types T-Code : SPRO Path : IMG -> Financial Accounting -> Financial Accounting Global Settings -> Ledgers -> Ledger -> Define Settings for Ledgers and Currency Types Section : Currency Types SAP Version : SAP S/4 HANA 2020 Currency Types List 00 = Document Currency 01 = Document Currency, Group Valuation 02 = Document Currency, Profit Center Valuation 10 = Company Code Currency 11 = Company Code Currency, Group Valuation 12 = Company Code Currency, Profit Center Valuation 20 = Controlling Area Currency 30 = Group Currency 31 = Group Currency, Group Valuation 32 = Group Currency, Profit Center Valuation 40 = Hard Currency 50 = Index-Based Currency 60 = Global Company Currency 70 = Controlling Object Currency Currency Type in the Controlling Area The controlling area currency type determines which currency is allowed as controlling area currency and whether the CO area currency can differ from the currency of the assined company codes. CO area currency is either set by the user or derived from other organizational units. The Assignment Control is a very important setting when the subject is controlling area currency type. There are 2 options: 1 = Controlling Area Same As Company Code 2 = Cross-Company-Code Cost Accounting 1 Controlling Area Same As Company Code Relationship (1:1): The financial accounting and cost accounting views of the organization are identical. Currency Type: The system will automatically assign currency type 10 (Company Code). 2 Cross-Company-Code Cost Accounting Relationship (1:n): Cost accounting is carried out in multiple company codes in the same controlling area. The Company Codes must use: The same number of posting periods (you can check it in the fiscal year variant) The same Chart of Account Hint : A 1:n relationship is appropriate, for example, if the organization has independent subsidiaries using a global cost accounting system, since it is possible to perform internal allocations between company codes. Account Master Data T-Code : FS00 | G/L Account Centrally Control Data | Account Control (Company Code) Balances in Local Currency Only Indicates that balances are updated only in local currency when users post items to this account. You set this if you do not want the system yp update transaction figures se parately by currency. Recommended for some Balance Sheet Accounts: Not managed as open items and not kept in foreign currencies. Managed as open items and and have the same types of items posted in different currencies, but always allow clearing to be made if the local currency amounts correspond. Example : You set up a clearing account for GR/IR and post these itema to it. Goods Receipt (Posted always in Local Currency) EUR 890 Invoice Receipt (Posted Invoice Currency) USD 1000 EUR 890 Both items can be cleared if the clearing account balances are recorded in Local Currency Only. Unless you set the indicator for this account, the system will translate the USD to EUR during the clearing procedure to determine the account in EUR required to clear 1000 USD. If the translation rate is 0.89, the system displays 900 EUR for the invoice receipt and 890 EUR for the goods receipt when the open items are processed. This means that to clear both od these items, you will also have to enter a difference posting for 10 EUR, and the system will automatically make an additional exchange rate difference posting for this amount. Posting without tax allowed Indicates that acoount can be posted without tax code. It is possible to post both taxable and non-taxable items to that account. But If you post with tax code the system checks the entry against the Tax Category. Tax Category You only use Tax Category if the account is tax-relevant, If not, leave the field in blank. Example of tax categories: "*" All Tax Types Permitted "+ " Only Output Tax Permitted "- " Only Input Tax Permitted "> " Output Tax Account "< " Input Tax Account Control Data | Account Management (Company Code) Open Item Management Indicator activated: The items posted are marked as open or cleared. Indicator Inactivated: The items posted has no offsetting option, with open and clared marks. Accounts managed as open items: Clearing accounts Blank Clearing Account Payroll Clearing Account Cash Discount Clearing Account GR/IR Clearing Account Accounts that are NOT managed as open items: Bank Accounts Tax Accounts Raw Material Accounts Reconciliation Accounts (There are managed implicitly using the subledger open item function) Profit and Loss Accounts Materials Management (MM) Accounts (Posted with a posting key that has account type 'M') Create/Bank/Interest | Control of Document Creation ( Company Code) Post Automatically Only Indicates that this account can only be posted to by the system using account determination tables. Docum ent Split Document Splitting is a function delivered initially within the New G/L, similar to FI-SL splitting available from release 4.7 onwards. It is an essential tool for drawing up complete financial statements for the selected dimensions (e.g. Segment, Profit Center, Business Area, Fund, Grant or Customer field) at any time. Document splitting splits up line items during the posting for selected dimensions such as receivable lines by "Profit Center". Also, to affect a zero balance setting in the document for selected dimensions such as "Segment", document splitting can be used. The zero balance setting may generate additional clearing lines in the general ledger view. Seq Transaction Name Module Reference SAP Path Comments 001 GSP_CD Maintain constans FI-GL 002 GSP_KD Maintain account determination FI-GL 003 GSP_KD1 Maintain acct deter: 0 balance FI-GL 004 GSP_KD2 Maintain acct deter: Additional rows FI-GL 005 GSP_LD Define item type FI-GL business transaction - do not change 006 GSP_LZ1 SAP internal item cat. Assigment FI-GL assignment do de cima 007 GSP_LZ2 Allocation: acct number - item type FI-GL Clsssify G/L Accounts for Document Splitting 008 GSP_MD Define Splitting Method FI-GL 009 GSP_PD Define business process FI-GL do not change 010 GSP_RD Define Split Rule FI-GL 011 GSP_VD Define business process variant FI-GL 012 GSP_VZ1 Transaction->process var. assignment FI-GL Assigment: Transaction Code - Accounting Transaction Variant 013 GSP_VZ2 MM movem. Type->process var. assgmt FI-GL Assigment: MM Movement Type - Accounting Transaction Variant 014 GSP_VZ3 FI doc type->process var. assignment FI-GL Classify FI Document Type for Document Splitting Views Entry View | Based on table BSEG as used in Classic G/L General Ledger View | Based on the New G/L tables for ECC (ACDOCA for S/4 HANA) You can choose between displaying the document either in its original form in the entry view or with the generated clearing lines from the perspective of a ledger in the general ledger view. Issues Balancing Field is not Filled |Error messages for example "the balancing field is not filled" may arise while you are working with relevant business processes. These issues are usually based on missing or incorrect document split customizing New G/L Migration | Subsequent activation of document split functionality within a productive environment (with existing transactional data) is critical. It has to be handled with a separate migration project Subsequent Changes | Processes in a customer system are dynamic and changes in document split customizing may arise. If subsequent changes are necessary, please refer to the long text of the warnings and also to OSS Note 891144 1. Document Split Functionality With the functionality 'document splitting' a complete financial statement for selected dimensions can be provided at any time. Document splitting splits up line items for selected dimensions such as "Segment", "Profit Center", etc. Document Splitting Method | A splitting method contains the splitting rules governing how the individual item categories are dealt with Splitting Rule | Depending on the business transactions the rule governs how the individual item categories will be processed by the system Business Transaction | SAP delivers 10 business transactions. A business transaction describes the structure of a business process for each document type. For each business transaction, you can determine which item categories (can) appear in the transaction. Business transactions are only used in document splitting Item category | The item category characterizes the items of an accounting document. You need to classify the individual document items so that the system knows how to handle them. Therefore, an item category has to be assigned to all G/L accounts (T-Code: GSP_LZ2) Processing category | The processing category controls how the amounts are split. 0 | Transfer a fixed value (No Splitting) 1 | Splitting by base item categories specified 2 | Splitting based on current account balance Warning When using document splitting SAP recommends to avoid posting mixed business processes A new document type for each business process needs to be defined in order to separate them. Generally it has to be ensured that each business process is posted with an appropriate document type (Example: Within SAP standard delivered customizing for business transaction "0300 Vendor Invoices" it is not possible to post customer or bank account lines) 2. New G/L Scenarios In order to define the relevant fields to be updated within open items and totals, scenarios have to be assigned to the ledgers used. SAP standard delivers 6 scenarios (Also custom fields can be assigned). To split the posted items of a particular ledger by the selected criteria (Segment, Profit Center, Custom Field [ZZxxx], etc.), the relevant New G/L scenario has to be assigned to the ledger. 2.1. Define Document Splitting Method The document splitting method contains the rules governing how the individual item categories are dealt with. In case changes need to be applied to standard customizing, SAP recommends copying the standard method 0000000012 and applying the changes. 2.1.1. Define Document Splitting Method T-Code | SM30 ( V_T8G01) Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions -> Document Splitting -> Extended Document Splitting -> Define Document Splitting Method Step 1 | Create an own defined method (e.g. Z000000012) Step 2 | Select all rules included in the standard method and copy it to the Z000000012 Step 3 | Apply the changes needed Step 4 | Activate the new to be used document splitting method 2.2. Activate Document Splitting T-Code | SM34 (VC_FAGL_SPLIT) Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Activate Document Splitting Step 1 | Document Splitting Assignment - Document splitting method has to be assigned (e.g. Z000000012) Step 2 | Activating Inheritance of Account Assignments Inheritance of Account Assignments The indicator "Inheritance of Account Assignments" transfers the account assignments which are defined as split criteria. The values of the split criteria are always taken into consideration together as a combination of the account assignments. The field values are inherited only in case the account assignment combination is unique within the complete document. That means the account assignments are being inherited if the values of the split criteria in the complete document are the same. Please consider that only account assignments relevant for the balance sheet (G/L split criteria) are taken over since it is rather a fallback mechanism for the unassigned processes Hint: There is also a possibility to deactivate inheritance for some specific business transactions. Deactivating Inheritance of Account Assignments T-Code | GSP_RD Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions -> Document Splitting -> Extended Document Splitting -> Define Document Splitting Rules Step 1 | In the "Header Data", double click in the "Method + Business Transaction + Variant" desired Step 2 | Flag the indicator " No Inheritance of A/c Assignments" Hint: This indicator 'No Inheritance of A/c Assignments' can be set/removed in the definition of the business transaction (Only available in ERP2005) Activation Standard A/C Assignment on the Splitting Method Level The constant defines default account assignments for all line items for which it is not possible to derive any account assignments via the splitting rule or the inheritance. To activate this function select indicator "Standard A/C Assgnmt" and assign the constant. Constant Definition T-Code | SM34 (FAGL_CONSTANTS_GLOBAL) Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Edit Constant for Nonassigne d Processes Step 1 | Create the Constant (eg. Zxxx) Step 2 | Assign Profit Center Deactivate Constant Default at Business Transaction Level T-Code | GSP_RD Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions -> Document Splitting -> Extended Document Splitting -> Define Document Splitting Rules Step 1 | In the "Header Data", double click in the "Method + Business Transaction + Variant" desired Step 2 | Flag the indicator " No Default of A/c Assignments" There is also a possibility to deactivate the default account assignment (constant) set on method level for some specific business transactions. Deactivate Document Splitting at Company Code Level Document split can be deactivated at company code level. In case one or more company codes in your system should not use document splitting functionality, then choose the "inactive" indicator at company code level. Define Document Splitting T-Code | SM34 (VC_FAGL_SPLIT) Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Activate Document Splitting Step 1 | In the Dialog Structure, click in "Deactivation per Company Code" Step 2 | Flag the indicator "Inactive" in the desired Company Code Warning: If you perform any cross company code postings please make sure that all company codes involved use document splitting Hint: In addition the company codes which are used in cross company postings have to be assigned in Transaction "OBY6" to companies in a 1:1 relation 2.3. Document splitting characteristics Document splitting is a tool for drawing up complete financial statements for selected dimensions. Additional zero balance items are automatically created in case the balance of account assignment objects is not zero. Document splitting characteristics can be defined for General Ledger and additional characteristics for controlling and assets. Characteristics for General Ledger Accounting Characteristics for Controlling Characteristics for Cash Discounts Capitalized to Assets 2.3.1. Document splitting Characteristics for General Ledger In this IMG-step the account assignments taken into consideration in document splitting are defined. It can be defined if a zero balance setting for the characteristic and a partner field has to be used. If the zero balance flag has been activated, the system makes sure that the document balances to zero on account assignment level. The account assignment can also be defined as mandatory. The system accepts postings if the account assignment has been filled in the general ledger view. Either it can be filled in the entry view by entering it or it is derived from the document splitting rules. If a field is defined as a splitting characteristic, but the relevant scenario or custom field is not assigned to a ledger, then it will not be updated in certain new g/l tables. The account assignments specified have to be maintained at least in one of the ledgers. Otherwise the mandatory check is not processed. 2.3.2. Define Document Splitting Characteristics for Controlling Document splitting characteristics for controlling are being transferred only into relevant line items. The CO account assignments are just needed for the cost elements. Therefore the accounts of the corresponding line items need to be defined as a cost element. 2.3.3. Characteristics for Cash Discounts Capitalized to Assets (Post-Capitalization of Cash Discount to Assets) he activation of the "Post-Capitalization of Cash Discount to Assets" has the effect that the cash discount of an asset-relevant payment is not posted to the cash discount account, but directly to the asset. 2.3.4. Zero balance indicator and balance zero clearing account The zero balance indicator setting, ensures that the document is balanced according to document split characteristics for the selected dimensions such as "Segment". In case the balance of account assignment objects is not zero after document splitting the system generates additional clearing items. The triggered line items in the document are posted to the zero balance clearing account defined for each account key in customizing. Define Zero-Balance Clearing Account T-Code | GSP_KD1 Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Define Zero-Balance Clearing Account Warning: Therefore, a clearing account has to be created for the additional clearing line items. 2.4. Account key assignment (define zero-balance clearing account) As explained above in some business processes additional clearing line items have to be created automatically so a full financial statement per splitting criteria is available. The automatic posting is made to a zero-balance clearing account defined in the account key. One or more zero-balance clearing accounts may be used. To post to different clearing accounts, each clearing account has to be assigned to a separate account key and each account key to the relevant business transaction variants. Define Zero-Balance Clearing Account T-Code | GSP_KD1 Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Define Zero-Balance Clearing Account 2.5. Constant definition In order to set default account assignments within the document splitting, one or more constants can be defined. Edit Constants for Non-assigned Processes T-Code | GSP_CD Path | IMG -> Financial Accounting (New) -> General Ledger Accounting (New) -> Business Transactions >- Document Splitting -> Edit Constants for Non-assigned Processes For defining the constant only the defined split criteria can be chosen. A default value can either be assigned to all or just to several split criteria. The default values are always set as a combination, meaning all or nothing. Example: Split criteria A and B is set as default If fields A and B are both not filled during posting, the default values of the constant are set. If field A is set with the default value of the constant and B is not filled, the constant fills the value of field B. If field A is set but not with the default value of the constant, nothing is done by the constant. If any other split criteria is filled which is not defined within the constant, the constant fills fields A and B. If an assigned split criteria is set with default 'blank', the system considers 'blank' as a value. Two different ways of using a constant exist: General constant for all business processes Specific constant assigned to explicit item categories References: SAP (www.sap.com ); SAP Support (support.sap.com ); SAP Help (help.sap.com ); SAP Blog (blogs.sap.com )
- SAP NFe | SAP Optimization
When we are working on daily activities, doing customizing, testing and checking, it is very common to work with different screens logged in different environments and clients. Using the same color can be tricky and lead to mistakes. A good alternative is to change the colors to identify between the DEV and QA environment, or even between DEV Gold and DEV unit test. SAP Optimization SAP GUI Layout Color Parameter ID SAP Field Commands Adding transaction codes (T-Codes) in the SAP Menu Removing SAP Initial Picture Show Keys within Dropdown Lists SAP GUI Layout Color When we are working on daily activities, doing customizing, testing and checking, it is very common to work with different screens logged in different environments and clients. Using the same color can be tricky and lead to mistakes. A good alternative is to change the colors to identify between the DEV and QA environment, or even between DEV Gold and DEV unit test. In this example we are going to change the colors of the same environment but of different clients. SAP DEV Client 100 (Gold) SAP DEV Client 200 (Unit Test) Log in Click in "More" SAP GUI Settgins and actions Options SAP DEV Client 100 (Gold) Visual Design Colors Settings Colors in System And choose the desired color In this case, I am setting client 100 with the golden color (yellow). SAP DEV Client 200 (Unit Test) Log in the other client Click in "More" SAP GUI Settgins and actions Options And repeat the steps. Visual Design Colors Settings Colors in System And choose the desired color In this case, I am setting client 200 with green color. Now you can log in and log out and these clients will keep the different colors and you will be able to work on both clients at the same time with no mistakes. Warning : Screens, backgrounds and options may differ due to the chosen SAP GUI version or theme. Parameter ID Go to "Maintain User Profile" T-Code: SU3 In the section "Patameters" Add Parameter ID Parameter Value In this example a Controlling Area is set using the Parameter ID "CAC". BUK - Company code CAC - Controlling Area ERB - Operating Concern FWS - Currency Unit GJR - Fiscal Year KPL - Chart Of account WRK - Plant SAP Field Commands To call a transaction | In the same session Command: /n How: Enter: /nxxxx (xxxx = transaction code) To call a transaction | In the same session, whereby the initial screen is skipped Command: /* How: Enter: /*xxxx (xxxx = transaction code) To call a transaction | In a additional session Command: /o How: Enter: /oxxxx (xxxx = transaction code) To end the current transaction Command: /n How: Enter: /n (Unsaved changes are lost without warning) To delete the current session Command: /i To generate a session list Command: /o To end the current transaction and return to the starting menu Command: /ns000 To log off from the system Command: /nend To log off from the system without a confirmation prompt Command: /nex How: Enter: /nex (Changes that were not saved are lost without warning) Adding transaction codes (T-Codes) in the SAP Menu In the initial screen Go to Extras -> Settings And Select "Display Technical Names" You can see in the screenshot: Before activation, only transaction names are displayed. Then you can see the displayed T-Codes. Knowing the T-Codes, you can access the transaction using the command prompt directly, saving you some time. Instead of navigating through the SAP menu every time. Removing SAP Initial Picture In the initial screen Go to Extras -> Settings And Select "Do Not Display Picture" The default image on most SAP installations is the same. It's the standard "a drop in water" image. There are companies that customize that image, changing it to the company logo. But you have this option to remove it, and leave the home screen a little cleaner. Show Keys within Dropdown Lists Dropdown lists in SAP without these flags only show available descriptions. After activating this option you will be able to see, not only the descriptions, but also the object names. By selecting "Sort by Key", the dropdown will be sorted alphabetically by object names. In the SAP GUI Go to Options Then, go to "Interaction Design" -> "Visualization 1" In the section "Controls" Select: Show Keys Within Dropdown List Sort By Keys Within Dropdown lists for Most Efficient Keyboard Input References: SAP (www.sap.com ); SAP Support (support.sap.com ); SAP Help (help.sap.com ); SAP Blog (blogs.sap.com )




