top of page

Search Results

43 results found with an empty search

  • SAP NFe | (CV) SAP FICO Arquiteto de Soluções

    Somos movidos pelo propósito de criar valor e gerar impacto para nossos clientes. Ajudando empresas a atingirem seus objetivos e construírem um futuro melhor. Disponivel para projetos: 100% Remotos SAP S/4 HANA FICO Arquiteto de Soluções, Lider ou Consultor Senior Modelo PJ Baixar CV Disponibilidade Taxa/Hora SAP S/4 HANA FI 1909 SAP Design Thinking Deloitte Lean Six Sigma Belt SAP S/4 HANA FI 1909 1/6 Arquiteto de soluções SAP S/4 FICO com 18+ anos de experiência em implementação e integração de negócios, adequação e cumprimento de projetos de grande porte com alta complexidade, capaz de implementar e resolver desafios de negócios de missão crítica. Tenho um currículo repleto de projetos entregues com sucesso, fornecendo consultoria técnica qualificada e treinamento personalizado. Experiência Finance 18 Years ▇▇▇▇▇▇▇▇▇ Controlling 18 Years ▇▇▇▇▇▇▇▇▇ Material Ledger 18 Years ▇▇▇▇▇▇▇▇▇ CO-PC 18 Years ▇▇▇▇▇▇▇▇▇ CO-PA 18 Years ▇▇▇▇▇▇▇▇▇ Cash Mgnt 18 Years ▇▇▇▇▇▇▇▇▇ Credit Mgnt 10 Years ▇▇▇▇▇ Tax 14 Years ▇▇▇▇▇▇ FM 04 Years ▇▇▇▇ ABAP 03 Years ▇▇▇ CFIN 03 Years ▇▇▇ FI-CA 01 Years ▇ Retail 04 Years ▇▇▇▇ Número de Projetos Full Lifecycle 05 Prjs ▇▇▇▇▇ S/4 HANA 07 Prjs ▇▇▇▇▇▇▇ Greenfield 06 Prjs ▇▇▇▇▇▇ Rollout 10 Prjs ▇▇▇▇▇▇▇▇▇ Improvements 09 Prjs ▇▇▇▇▇▇▇▇ Blueprints 02 Prjs ▇ QA 02 Prjs ▇▇ PoC 01 Prj ▇ Upgrades 01 Prj ▇ Indústrias Agribusiness 03 Prjs ▇▇▇ Automotive 01 Prj ▇ Beverage 02 Prjs ▇▇ Biotech 01 Prj ▇ Chemical 06 Prjs ▇▇▇▇▇ Cons. Goods 01 Prj ▇ Finance 01 Prj ▇ Food 02 Prjs ▇▇ Healthcare 01 Prj ▇ Manufacture 03 Prjs ▇▇▇ Media 01 Prj ▇ Mining 01 Prj ▇ Oil & Gas 01 Prj ▇ Paper 01 Prj ▇ Pharma 04 Prjs ▇▇▇▇ Metals 01 Prj ▇ Public Sector 01 Prj ▇ Retail 03 Prjs ▇▇▇ Tech. / Serv. 03 Prjs ▇▇▇ Missão Ajudar as empresas a executar melhor o SAP Melhorando processos, executando soluções custo efetivas e criando valor Aplicando as melhores práticas e trazendo o sistema de volta ao padrão Portfolio de Consultorias Accenture | Capgemini | Cast Group | Deloitte | Engineering | Everis | EY | iGate | Infosys | PwC | SAP Integrações Integração com MM, SD, PP, PS, QM, PM, BW/BI, PI/PO e PLM cProjects, para projetar soluções integradas SAP e sistemas legados. Soluções SAP Solutions for Tax Engine, Country versions, Revenue Recognition, Legal statements, Bank communication and Consolidation. Migração de Dados Coleta de dados | Limpeza de dados | Transformação de dados | Migração de dados SAP CFIN Central Finance Transformation LSMW Legacy System Migration (com código ABAP incorporado) LMTC Legacy Transfer Migration Cockpit Indústrias Agronegócio | Aeroespacial | Automotivo | Bebidas | Biotecnologia | Química | Bens de consumo | Finanças | Alimentos | Fracking | Assistência médica | Fabricação | Mídia | Metais e mineração | Petróleo e gás | Metais preciosos | Setor público | Papel e celulose | Farmacêutico | Varejo | Serviços | Tecnologia | Telecomunicações SAP IS-Solutions SAP PSCD Public Sector Collection and Disbursement | SAP FI-CA Contract Accounting | SAP POS-DM (Retail/Varejo) Gestão de Dados de Ponto de Venda Educação 2016 MBA Strategic Management in Information Technology FGV 2015 Alumni Program Technology, Organizations and Innovation MIT 2015 Bachelor’s Degree Economics (Leave of Absence) Paulista University 2011 Bachelor’s Degree Accounting Paulista University 2004 Bachelor’s Degree Business Administration Mackenzie University Certificações 2021 Design Thinking [+] SAP Certified Associate Design Thinking SAP 2020 SAP S/4 FI [+] SAP S/4 HANA 1909 for Financial Accounting Associates SAP 2013 ITIL [+] ITIL v3 Foundation Certification EXIN 2012 COBIT COBIT 4.1 Foundation Certification ISACA 2009 Lean/Six Sigma Lean/Six Sigma Certification (Yellow Belt) Deloitte 2008 SAP FI SAP ECC 6.0 for Financial Accounting Associates SAP Qualificação e Atividades Profissionais 2020 Agile Agile with Jira (SCRUM and KANBAN) Coursera 2020 SAP TRM SAP TRM Tax and Revenue Management Capgemini 2020 SAP PSCD SAP PSCD Public Sector Collection and Disbursement Capgemini 2020 SAP S/4 FI SAP S/4 Financial Accounting in S/4HANA 1909 SAP 2017 SAP ABAP SAP ABAP Academy SAP 2015 SAP Simple FI SAP HANA Simple Finance, S/4 HANA Migration SAP 2014 SAP NF-e SAP NF-e Nota Fiscal Eletronica 3.10 with GRC Tech Consulting 2013 ITIL ITIL V3 Foundations KA Solution 2012 SAP Material Ledger SAP CO Brazil Localization (Material Ledger) SAP 2012 SAP NF-e GRC SAP NF-e 10.0 with GRC, WBRNFE_10 SAP 2012 SAP NewGL SAP NewGL (New General Ledger) SAP 2012 COBIT COBIT 4.1 Foundations KA Solution 2012 SQL SQL, Microsoft SQL Server Writing Queries KA Solution 2011 SAP CO SAP CO Academy (Controlling Accounting) SAP 2010 HPQC HP Quality Center SAP 2010 SAP InfoPak SAP InfoPak, Documentation Tool SAP 2009 Lean/Six Sigma Lean/Six Sigma (Green Belt Academy) Deloitte 2009 IFRS IFRS, Concepts and Preparation Deloitte 2008 SAP FI SAP FI Brazil Localization SAP 2008 SAP SolMan SAP Solution Manager Deloitte 2008 HPQC HP Quality Center, Mercury HP 2007 SAP FI SAP FI Academy (Financial Accounting) SAP 2007 SAP R/3 SAP BootCamp R/3 4.6c, FI,CO,MM,SD,PP Modules Deloitte

  • SAP S/4 HANA Country Versions

    Topics: SAP S/4 HANA Scope Configuration; TaaS (Tax as a Service); Complex Architectural Integration; SAP vs Oracle (ERP Cost); Country Versions Available / Supported Languages; Country-Specific Functions; E-Reporting (Electronic Report); Digital Reporting Across the Globe; VAT with SAF-T; SAFT-T Applicable (i.SAF) / (XAF); IT14SD; B2B GST; e-Audit; IRAS Audit File (IAF); E-Books via myDATA; Spanish SII; Electronic VAT Filing; E-Invoicing (CUFE); SPED; ACR; DRC Country Version Overview Country Version Complex Architectural Integration / TaaS (Tax as a Service) E-Reporting / Digital Reporting Across the Globe Advanced Compliance Reporting (ACR) SAP vs Oracle (Solutions and Costs) SAP Supported Country Version SAP Supported Languages Country-Specific Functions SAP S/4 HANA Scope Configuration Country Version An SAP country version consists of the components Function including Customizing and documentation Language For SAP country versions you have to distinguish between Standard country versions The country-specific functions are already contained on the standard delivery CD Add-on or modification country versions These country versions are delivered in separate data carriers. For Add-on country version, these are some customizing settings delivered Costing sheet, chart of accounts Customizing settings payment transactions Country-specific balance sheet and profit and loss structure Account determination Tax calculation procedure, withholding tax code Value-added tax code Calendar Cost elements, cost element hierarchy Asset Accounting chart of depreciation Procedure when you want to implement a new country version Obtain information regarding the availability and functions of new country version If the new country version is not a standard country version, you will have to install the country version (function) Install the language of the country (if required) Complex Architectural Integration / TaaS (Tax as a Se rvice) With the complexity in the integration architecture for the new digital world comes new and more complex challenges. If you company decides to: Add a new purchasing technology Or have a cloud-based sourcing procurement (i.e. Ariba, Coupa) Or use a new e-commerce platform for sales Or to do B2B transactions Or just a billing platform or app Or the headoffice decides to have a better expenses control Or use a expenses management platform (i.e. Concur) Or maybe acquire other company All these new technologies, which are being designed to facilitate the advancement of this digitization, helping companies to comply with the new legal requirements, e-Invoicing and Electronic Reporting, come at a cost. You need to understand what is a legal requirement, a business requirement versus cost and time, to measure the benefits of these new tools available in the market and make a strategic decision. Although IT (software and hardware), which can be acquired in the market, is not strategic, it can give your company business leverage over competitors. E-Reporting (Electronic Report ) Nowadays, globalization and digitalization of companies are moving very quickly all over the world. Each year, more and more countries move away from paper and implement electronic media, such as e-invoicings and e-reportings. Digital Rep orting Across the Globe Continent Country Digital Reporting Africa Angola VAT with SAF-T (introduced July 2019) Africa Egypt Measures annunced in 2020 for the upload of AP and AR VAT Data in .CSV Files, used to populate the VAT Retun Africa Kenya Public consultation of e-Invoicing (announced November 2019) E-Invoicing Legislation (It was expected in 2020) Africa South Africa IT14SD Reconciliation of Return to Ledgers for Income Tax, VAT, PAYE and Customs Asia China Golden Tax System Disclose Full Invoice Details before obtaining Valid Invoice Number No SAF-T or e-Audit Asia India B2B GST e-Invoicing (introduction phased announced / optional from February 2020) Asia Indonesia E-Invoice Mandatory No SAF-T or e-Audit Asia Kazakhastan SAF-T (it was expected in 2019) On a Voluntary Basis Asia Malaysia With GST repealed GST Aufit File (GAP) is no longer applicable With SSF reinstated (it was expected GAP File to be introduced soon) Asia Russia Comprehensive Invoice Details Filed with VAT Return Asia Singapore E-Invoicing (since 2018) Simplified SAF-T: IRAS Audit File (IAF) Upon request Asia United Arab Emirates FAF File (introduction expected) Europe Austria SAF-T Applicable Depends on requested information Upon request Europe Czech Republic Comprehensice Invoice Details Due with Every Tax Return No e-Audit B2G e-Invoicing Europe France Reduced SAF-T (applicable since 2014) Data of Statutory Accounting B2B e-Invoicing (mandatory since 2023) Pre-clerance though Chorus Pro Portal Europe Germany SAF-T Applicable (GoBD) Depending on the Scope of Audit Upon Request Europe Greece E-Books to be Submitted via myDATA Platform E-Invoicing Provisions (announced) Both measures Expected in 2020 Europe Hungary Data Export Function on Invoicing Software (since January 2016) Online Connection established between Invoice Invoicing Software and the Tax Authorities' system (July 2017) Submission of Electronic Invoice Details (July 2018) Europe Ireland Electronic Submission of Payroll Tax Data (from 2019 at time of Payment) Europe Italy Mandatory use of e-Invoicing Platform SdI from Domestic Invoicing (since 2019) VAT Reporting e-Submission for Non-Demestric Invoices Received and Issued Europe Lithuania SAFT-T Applicable (i.SAF) for VAT Invoices (Issued and Received), also Additional Customs Information (i.VAZ for the submission od Data on Consignment and Other Goods Documents) On Regular Basis (since October 2016) Europe Luxemburg SAFT-T Applicable OECD SAFT-T based: GL, Invoices, Payments, Customers, Suppliers, Tax Table Upon requet Europe Netherlands SAF-T Applicable (XAF) Financial GL Data Optional Regime Europe Norway SAF-T Financial Data Mandatory upon Request (January 2020) Europe Poland SAF-T Applicable (JPK / since July 2016) JPK_VDEK File to Replace the VAT Return (April 2020 for Large Businesses) Several Other Files (Bank Statements, Warehouse Info, Comprehensive GL Info / to be Available Upon Request) Electronic Financial Statements (2019) Europe Portugal SAF-T Applicable GL, Supplier and Customer Info, Tax Table, Invoices, Product Tables Both monthly and upon request B2G e-Invoicing (from 2019) Europe Romania SAF-T (it was expected to be introduced by end of 2020) E-Audit Not Applicable, but based on the Law (it is an option further to be implemented) RTR Mandatory for Large Taxpayers (optional for the rest) Europe Slovenia Standardised File used for Electronic Tax Data in General Used in Tax Audit and Similar Procedures Upon Request Europe Spain Spanish SII (implemented in 2017) Europe Switzerland Electronic VAT Filing mandatory (2020) Europe UK Making Tax Digital (MTD) Digitalization of Tax Submissions VAT (only from April 2019) Oceania Australia E-Audit (introduced 2019 but upon request) No SAF-T South America Argentina Digital VAT Books (introduction expected October 2019) Final roll out in 2020) South America Brazil SPED System Disclose Full Invoice Details before obtaining Valid Invoice Number On a Regular Basis South America Colombia E-Invoicing (CUFE) Roll-out expected by end of 2020 Advanced Compliance Reporting (ACR) Advanced compliance reporting is a global compliance reporting solution that helps you to create, generate, and submit compliance reports to the governments on time and in the correct format. It helps you to ensure compliance with complex and ever-changing legal requirements. Country/Region-Specific Reports The following country/region-specific reports are already available in ACR. For detailed information on how to run the reports, click the link of the report below: Region Reports Business Catalogs Business Role Templates Argentina Daily VAT - Electronic Duplicate SAP_FIN_BC_GL_REPORTING_AR SAP_BR_GL_ACCOUNTANT_AR Form 731 Official Last Official Document Number Purchase VAT Sales VAT Sales and Purchase Print Format Australia GST Report SAP_FIN_BC_GL_REPORTING_AU SAP_BR_GL_ACCOUNTANT_AU Austria Advance VAT Return - U30 SAP_FIN_BC_GL_REPORTING_AT SAP_BR_GL_ACCOUNTANT_AT Annual VAT Return - U1 SAP_FIN_BC_AP_ANALYTICS_AT SAP_BR_AP_MANAGER_AT Balance of Payments – Form L1 (Cross Border Services) EC Sales List Belgium Annual Sales Listing SAP_FIN_BC_GL_REPORTING_BE SAP_BR_GL_ACCOUNTANT_BE Balance of Payments - F01DGS Balance of Payments - F01MER Balance of Payments - F02CMS Balance of Payments - S03CCR EC Sales List VAT Return Withholding Tax Report Brazil EFD ICMS IPI Report SAP_FIN_BC_GL_REPORTING_BR SAP_BR_GL_ACCOUNTANT_BR ECD Report ECF Report EFD Contribuições Report Canada Goods and Services Tax/Harmonized Sales Text (GST/HST) Report SAP_FIN_BC_GL_REPORT_CA SAP_BR_GL_ACCOUNTANT_CA Provincial Sales Tax - Manitoba (PST-MB) Report Provincial Sales Tax - British Columbia (PST-BC) Report Provincial Sales Tax - Saskatchewan (PST-SK) Report Quebec Sales Tax (QST) Report China Audit Report GBT24589: Account Payables and Receivables SAP_FIN_BC_AP_OPER_CN SAP_BR_AP_ACCOUNTANT_CN Audit Report GBT24589: Assets Accounting SAP_FIN_BC_GL_REPORTING_CN SAP_BR_GL_ACCOUNTANT_CN Audit Report GBT24589: Common Information SAP_FIN_BC_CASH_CF_CN SAP_BR_CASH_MANAGER_CN Audit Report GBT24589: General Ledger Input VAT Transfer Input VAT Deduction Cash Flow Statements Statement of Changes in Owner's Equity - Yearly Colombia 1001 Report Format: Payments in Accounts and Tax Withholding in Source – Payed SAP_FIN_BC_GL_REPORTING_CO SAP_BR_GL_ACCOUNTANT_CO 1003 Report Format: Withholding Taxes - Payable 1005 Report Format: Deductible Taxes on Sales to Be Paid 1006 Report Format: Generated Taxes on Sales to Be Paid and Consumption Tax 1007 Report Format: Revenues in the Year 1008 Report Format: Open Items of Balance Debtors on December 31st 1009 Report Format: Liability Balance on December 31st VAT Declaration Czech Republic EC Sales List SAP_FIN_BC_GL_REPORTING_CZ SAP_BR_GL_ACCOUNTANT_CZ Cash Flow Statement Financial Statements VAT Declaration Denmark EC Sales List SAP_FIN_BC_GL_REPORTING_DK SAP_BR_GL_ACCOUNTANT_DK VAT Return Egypt VAT Return SAP_FIN_BC_GL_REPORTING_EG SAP_BR_GL_ACCOUNTANT_EG Finland EC Sales List SAP_FIN_BC_GL_REPORTING_FI SAP_BR_GL_ACCOUNTANT_FI VAT Return France Balance of Payments - Form ECO SAP_FIN_BC_GL_REPORTING_FR SAP_BR_GL_ACCOUNTANT_FR Balance of Payments - Form RTE EC Sales List Overdue Invoices VAT Return Withholding Tax Report Hungary Audit Report SAP_FIN_BC_GL_REPORTING_HU SAP_BR_GL_ACCOUNTANT_HU EC Sales List VAT Return India GSTR-1 SAP_FIN_BC_AP_ANALYTICS_IN SAP_BR_AP_MANAGER_IN GSTR-3B SAP_FIN_BC_GL_REPORTING_IN SAP_BR_GL_ACCOUNTANT_IN Withholding Tax Report Indonesia VAT Return SAP_FIN_BC_GL_REPORTING_ID SAP_BR_AP_MANAGER_ID VAT In (Company Code Level) SAP_FIN_BC_AR_TAX_REP_ID SAP_BR_GL_ACCOUNTANT_ID VAT In (Business Place Level) SAP_FIN_BC_AP_REPORTING_ID VAT Out (Company Code Level) VAT Out (Business Place Level) VAT Exports (Company Code Level) VAT Exports (Business Place Level) Withholding Tax (PPh 23 and PPh 26) Report Withholding Tax (PPh Pasal 15) Report Withholding Tax (PPh Pasal 22) Report Withholding Tax (PPh Pasal Article 4(2)) Report Cash Flow Statements Ireland EC Sales List SAP_FIN_BC_AP_ANALYTICS_IE SAP_BR_AP_MANAGER_IE Ireland Return Trading Details SAP_FIN_BC_GL_REPORTING_IE SAP_BR_GL_ACCOUNTANT_IE VAT Report Withholding Tax Report Israel VAT Return (PCN874) SAP_FIN_BC_GL_ACCOUNT_IL SAP_FIN_BC_GL_ACCOUNT_IL Italy VAT Return SAP_FIN_BC_GL_REPORTING_IT SAP_BR_GL_ACCOUNTANT_IT Withholding Tax Report Japan VAT Return SAP_FIN_BC_AP_ANALYTICS_JP SAP_BR_AP_MANAGER_JP Withholding Tax using White Return (Payment-Based) SAP_FIN_BC_GL_JE_PROC_JP_PC SAP_BR_GL_ACCOUNTANT_JP Withholding Tax using Blue Return (Invoice - Based) Trade Credit Check Central Bank Payment Luxembourg Annual VAT Return SAP_FIN_BC_GL_REPORTING_LU SAP_BR_GL_ACCOUNTANT_LU Balance of Payments EC Sales List Malaysia Goods and Services Tax Return SAP_FIN_BC_GL_REPORTING_ML SAP_BR_GL_ACCOUNTANT_ML GST Audit File Sales and Service Tax Report Mexico Chart of Accounts SAP_FIN_BC_GL_REPORTING_MX SAP_BR_GL_ACCOUNTANT_MX Account Balance SAP_FIN_BC_AP_REPORTING_MX SAP_BR_AP_ACCOUNTANT_MX Auxiliary Report for Accounts Journal Entries Details VAT Declaration DIOT Report Withholding Tax Report Netherlands EC Sales List SAP_FIN_BC_GL_REPORTING_NL SAP_BR_GL_ACCOUNTANT_NL VAT Return Norway Customer Line Items SAP_FIN_BC_AR_REPORTING_NO SAP_BR_AR_ACCOUNTANT_NO Supplier Line Items SAP_FIN_BC_AP_REPORTING_NO SAP_BR_AP_ACCOUNTANT_NO G/L Account Line Items SAP_FIN_BC_GL_REPORTING_NO SAP_BR_GL_ACCOUNTANT_NO VAT Return Philippines CAS Report (including General Ledger, Purchase Journal, General Journal, Sales Journal, Inventory Report) SAP_FIN_BC_GL_REPORTING_PH SAP_BR_GL_ACCOUNTANT_PH VAT Return (Monthly and Quarterly) SAP_FIN_BC_AP_ANALYTICS_PH SAP_BR_AP_MANAGER_PH VAT Summary List (including Summary List of Sales, Summary List of Purchases, Summary List of Importation) Withholding Tax Report Customer Withholding Tax Summary Poland Cash Flow Statement SAP_FIN_BC_GL_REPORTING_PL SAP_BR_GL_ACCOUNTANT_PL Customer Balances and Line Items SAP_FIN_BC_AP_ANALYTIC_PL_PC SAP_BR_AP_MANAGER_PL EC Sales List Fixed Asset Forms Poland G/L Account Balances and Line Items Overdue Invoices Supplier Balances and Line Items VAT Return Withholding Tax Declaration (IFT2) Withholding Tax Declaration (IFT2R) Portugal Annual VAT Declaration (Annex L and M) SAP_FIN_BC_GL_REPORTING_PT SAP_BR_GL_ACCOUNTANT_PT Annual Sales and Purchase (Annex O and P) EC Sales List Mapas Fiscais Romania Domestic Sales Purchase List (Declaration 394) EC Sales List (Declaration 390) Fixed Asset Chart G/L Account Trial Balances Sales & Purchase Journal VAT Return (VAT 300 Declaration) Russia Financial Statements for Russia SAP_FIN_BC_GL_REPORTING_RU SAP_BR_GL_ACCOUNTANT_RU Invoice Journal for Russia Property Tax Declaration for Russia Purchase and Sales Ledger for Russia VAT Return for Russia VAT Return Clarification Request Processing for Russia Saudi Arabia VAT Return SAP_FIN_BC_GL_REPORTING_SA SAP_BR_GL_ACCOUNTANT_SA Withholding Tax Report SAP_FIN_BC_AP_ANALYTICS_SA SAP_BR_AP_MANAGER_SA Singapore Goods and Services Tax Return SAP_FIN_BC_GL_REPORTING_SG SAP_BR_GL_ACCOUNTANT_SG South Africa BBBEE Supplier Classification SAP_FIN_BC_GL_REPORTING_ZA SAP_BR_GL_ACCOUNTANT_ZA VAT Declaration VAT Returns South Korea Cash Flow Statements SAP_FIN_BC_GL_REPORTING_KR SAP_BR_GL_ACCOUNTANT_KR Trial Balance SAP_FIN_BC_AP_ANALYTICS_KR SAP_BR_AP_MANAGER_KR VAT Declaration SAP_FIN_BC_CM_CF_KR SAP_BR_CASH_MANAGER_KR Withholding Tax - Business Income Report Withholding Tax - Other Income Report Spain EC Sales List SAP_FIN_BC_GL_REPORTING_ES SAP_BR_GL_ACCOUNTANT_ES Form 347: Annual Statement of Transactions with Third Parties SAP_FIN_BC_AP_ANALYTICS_ES SAP_BR_AP_MANAGER_ES Form 347: Incoming Cash Transactions VAT Return - Form 303 Withholding Tax Report Sweden EC Sales List SAP_FIN_BC_GL_REPORTING_SE SAP_BR_GL_ACCOUNTANT_SE Switzerland Switzerland National Bank Reporting SAP_FIN_BC_GL_REPORTING_CH SAP_BR_GL_ACCOUNTANT_CH VAT Return Taiwan, China VAT Declaration SAP_FIN_BC_GL_REPORTING_TW SAP_BR_GL_ACCOUNTANT_TW Thailand VAT Return - PP30 SAP_FIN_BC_GL_REPORTING_TH SAP_BR_GL_ACCOUNTANT_TH Cash Flow Statements SAP_FIN_BC_AP_REPORTING_TH Turkey Input VAT Declaration SAP_FIN_BC_GL_REPORTING_TR_PC SAP_BR_GL_ACCOUNTANT_TR Inventory Ledger Purchase Sales Declaration Sales Invoice List United Arab Emirates FAF Return SAP_FIN_BC_GL_REPORTING_AE SAP_BR_GL_ACCOUNTANT_AE VAT Declaration United Kingdom EC Sales List SAP_FIN_BC_GL_REPORTING_GB SAP_BR_GL_ACCOUNTANT_GB Reverse Charge Sales List SAP_FIN_BC_AP_ANALYTICS_GB SAP_BR_AP_MANAGER_GB VAT Return Withholding Tax Report United States Withholding Tax (1099 - MISC) Report SAP_FIN_BC_AP_ANALYTICS_US SAP_BR_AP_MANAGER_US Withholding Tax (1042-S) Report Withholding Tax (1099-G) Report Withholding Tax (1099-INT) Report Withholding Tax (1099-K) Report Venezuela Purchase VAT SAP_FIN_BC_GL_REPORTING_VE SAP_BR_GL_ACCOUNTANT_VE Sales VAT VAT Return VAT Withholding Tax Declaration VAT Withholding Tax Certificate Withholding Tax Income Certificate Withholding Tax Declaration - Other Income SAP vs Oracle What ERP is the best option for your company? The two big gest players in the market for big size, multinational companies are SAP and Oracle. SAP is a German multinational software company based in Walldorf with regional offices in 180 countries, founded in 1972. Oracle is an American multinational computer technology, company headquartered Texas, United States, founded in 1977. ERP Cost Neither SAP nor Oracle offer public pricing, which makes it difficult to determine exactly how much either solution will cost your business to implement. There are also many different pricing packages and plans to consider when it comes to determining how much you’ll pay for either platform. A customized package with full implementation and support could be as high as a five- to six-figure investmen t. These are costs that can be used as references and it may vary (between 2022 and 2023) SAP Cloud Based (per user / per month): $100 - $ 150 Oracle Cloud Services (per user / per month): $150 - $200 Warning : The cost to implement an ERP depends on many variables, such as technology, country, consultancy, company size, company sector, legal requirements, business requirements, project methodology, project duration, project size, areas/modules (finance , production, sales, procurement, human resources and so on) and others. Area SAP (Business One Professional) Oracle (Fusion Cloud ERP) Accounting Standard features such as accounts payable (A/P), accounts receivable (A/R) and fixed asset management Standard and advanced features covering accounts payable to asset management retirement and amortization Budgeting Basic budgeting features for managing and executing general planning Advanced tools including asset lifecycle management in addition to standard budgeting features Pricing Straightforward pricing tools to manage product pricing Pricing tools can match market, currency, exchange rate and calculate profit margins, rebates and discounts Human Resources Well-designed employee portal, payroll and e-recruiting functionality to help with both retention and employee turnover Good reporting capabilities including visual representations CRM Integrates marketing, sales and finance to create a whole story of customers to help with contextual sales Good marketing support AI and ML HANA computing platform is basis of all SAP offerings and AI digital assistant "CoPilot" makes data accessible AI tools like Digital Assistant are built into all parts of Oracle software and use natural language to sort databases A high degree of financial focus is evident in both ERPs offerings. Accounting and reconciliation-based financial software are common features and present the ability to simplify recordkeeping, consolidate across departments and locations and integrate sales and procurement across entire supply chains. In addition to supporting multiple currencies and languages, both platforms provide regulatory compliance settings and forms as well as real-time data management. Country Versions Available World Map of Local Versions and Languages of SAP Products . SAP Disclaimer This information is designed in order to give SAP customers a quick overview of localized SAP Products & solutions and laguages & local version availability. All information about these products and solutions is referring to their latest version and all listed products and solution available in February 2023 . Information sources are the respective release information and the SAP Products Availability Matrix (PAM). Chanfes to the availability of products and solutions may occur. All information is not legally binding and only for information purposes. The information about SAP Partner Local Versions is provided for infomational purposes only, without representation or warranty of any kinf, e.g. completeness, functionality or actuality. Area Product / Solution Local Versions Languages Enterprise Resource Planning SAP ERP Central Component 65 39 Enterprise Resource Planning SAP S/4 HANA 64 39 Enterprise Resource Planning SAP S/4 HANA Cloud, Public Edition 51 32 Enterprise Resource Planning SAP S/4 HANA Cloud, Private Edition 63 39 Enterprise Resource Planning SAP Business One 51 28 Enterprise Resource Planning SAP Business ByDesign 70 40 Human Capital Management SAP ERP ECC Human Resources 105 35 Human Capital Management SAP SucessFactores Employee Central 104 45 Human Capital Management SAP SucessFactores Employee Central Payroll 52 34 SAP Document and Reporting Compliance SAP Document and Reporting Compliance, on-premise edition 31 39 SAP Document and Reporting Compliance SAP Document and Reporting Compliance for S/4 HANA Cloud 47 32 SAP Document and Reporting Compliance SAP Document and Reporting Compliance for S/4 HANA and Cloud, private edition 57 39 Travel and Spend Management SAP Concur, Concur Expense 31 30 SAP Business Network for Procurement SAP Business Network for Procurement 40 24 Sustainability SAP Responsible Desing and Production (RDP) 6 6 SAP Supported Languages You can see in the table below the languages available per product / solution. Languages SAP ECC SAP S/4 HANA SAP S/4 HANA Cloud Public SAP S/4 HANA Cloud Private SAP Business One SAP Business ByDesign SAP ECC Human Resources SAP SucessFactors EC SAP SucessFactors ECP Arabic X X X X X TH X X X Bulgarian X X X X TH X X X Catalan X X TH X X X Chinese (simplified) X X X X X X X X X Chinese (traditional) X X X X X X X X X Croatian X X X X TH X X X Czech X X X X X TH X X X Danish X X X X X TH X X X Dutch X X X X X X X X X English X X X English (UK) X X English (US) X X X X X X Estonian X X TH X X Finnish X X X X X TH X X X French X X X X X French (Canadian) X French (FR) X X X X German X X X X X X X X German (Germany) X German (Swiss) X Greek X X X X X TH X X X Hebrew X X X X X X X X X Hindi X X TH X X X Hungarian X X X X X TH X X X Indonesian X Italian X X X X X X X X X Japanese X X X X X X X X X Kazakh X X X X TH X Korean X X X X X X X X X Latvian X X TH X Lithuanian X X TH X Malay X X X X TH X Norwegian X X X X X TH X X X Polish X X X X X X X X X Portuguese X X X X Portuguese (BR) X X X TH X X X Portuguese (Portugal) X Romanian X X X X TH X X X Russian X X X X X TH X X X Serbian X X X X X X X Serbian (Latin) TH Slovak X X X X X TH X X X Slovenian X X X X TH X X X Spanish X X X X Spanish (ES) X X X X X Spanish (Mexico) X Spanish (LATAM) X X Swedish X X X X X TH X X X Thai X X X X TH X X X Turkish X X X X X TH X X X Ukrainian X X X TH X X X Vietnamese X X TH X X X Weish X Remark SAP ECC and S/4 HANA Languages for which at least one product of the SAP Business Suite is supported, including continuous support (maintenance an d subsequent releases) through standard delivery channels. This excludes: (1) Farsi (Persian language) which is only available for a specific release and support package level, see SAP Note SAP 981731 for details, (2) Indonesian (Bahasa Indonesia) and Malay (Bahasa Malaysia) which are only supported for specific products. SAP Business One A convenient option to make additional languages available is using a partner solution (for some Local Versions bundled with functional add-ons) or to define customer specific UI terms using respective SAP tools. Malaysia, India, Indonesia, Philippines, Singapore and South Africa use English, Luxembourg uses French or German. Others use local languages. SAP Business ByDesign * TH * The SAP Translation Hub can be enabled to leverage translations via the Language Adaptation Tool and supports the listed target languages, amongst others (check all supported languages from source language “English (United States)” by ‘’Translation Provider SAP Machine Translation’). Quality score from translation provider ‘SAP Machine Translation’ is set to a fix value 25% to indicate that all machine translation proposals need to be reviewed by language experts. 10 additional languages added by partners as of 01.07.22. HU, FI, CZ, Slovak, Catalan, HR, BG, Arabic + Vietnamese and Thai . If you need support to review the translation proposals from SAP Translation Hub, you can contact the SAP Language Service Partners (see general description of their services and a list of those partners). SAP ECC Human Resources Languages for which at least one product of the SAP Business Suite is supported, including continuous support (maintenance an d subsequent releases) through standard delivery channels. This excludes: (1) Farsi (Persian language) which is only available for a specific release and support package level, see SAP Note SAP 981731 for details, (2) Indonesian (Bahasa Indonesia) and Malay (Bahasa Malaysia) which are only supported for specific products. SAP SucessFactors EC Languages for which at least one product of the SAP SuccessFactors Suite is supported, including continuous support (maintena nce and subsequent releases) through standard delivery channels. See SAP SuccessFactors Languages and Locales - SAP Help Portal for more details. Estonian and Latvian will be delivered, soon. Country-Specific Functions Your SAP ERP system offers a wide range of local versions, each of which is designed to allow you to run your business operations in a particular country or region. Integration Local versions do not constitute separate application components. Instead, the functions are contained in the various application components. This means that the Financial Accounting (FI) component, for example, does not just contain generic FI functions, but it includes local functions as well. Important : All of the SAP standard local versions are mutually compatible. This means, for example, that you can use the local versions for Brazil, China, and Turkey in a single physical system. You can see below the most of the country-specific functions and the main areas. Americas Argentina Sales tax calculation Withholding tax Reporting Localized version of the Payroll (PY) component, Payroll Argentina (PY-AR) Brazil Tax calculation Automatic generation of Notas Fiscais (E-Invoicing) Statutory reporting / SPEDs (E-Reporting) Localized version of the Payroll (PY) component, Payroll Brazil (PY-BR) Canada Master Data Bank Directories Automatic Transfer of Bank Directory: Report Documentation Accounting: Payment Transactions Country-Specific Definitions for the Payment Method Check Management Travel Management Travel Expenses Human resources Payroll Chile Check routine for tax number Financial reports (journal, cash journal, general ledger, material ledger, sales ledger, purchase ledger, balance sheet for tax purposes) Withholding tax reports (different reports for different vendors, stamp tax report) Management of prenumbered forms Numbering and printing of delivery notes and invoices; renumbering and reprinting; administration; referencing invoice to delivery note; canceled documents. Colombia Colombian chart of accounts Value-added tax Withholding taxes Inflation Accounting for assets and financials Mexico Inflation accounting for assets, inventories, and financials Financial reports (withholding tax report, top fifty customers and vendors) Travel expenses (reimbursement of foreign currency receipts in local currency; data medium exchange in local and hard currency; maximum limits for nondeductible travel expenses) Mexican version of the Payroll (PY) component, Payroll Mexico (PY-MX) Peru Check routines for tax numbers and official document numbers, as required by law Financial reports (journal, cash journal, general ledger, sales ledger, purchase ledger, COA report) Management of prenumbered forms This includes numbering and printing of delivery notes and invoices; renumbering and reprinting; form administration; references in invoices to delivery notes (and vice versa, if official number available); canceled documents. United States Sales and use tax Withholding tax, including reporting Asset accounting Bank accounting, including check management and lockbox procedure Localized version of Transaction Manager in Treasury and Risk Management (FIN-FSCM-TRM-TM) Localized version of the Payroll (PY) component, Payroll United States (PY-US) Venezuela Inflation accounting for assets, inventories, and financials Financial reports (sales ledger, purchase ledger) Venezuelan version ofPayroll (PY), Payroll Venezuela (PY-VE) Path : https://help.sap.com/docs/SAP_ERP_SPV/2b3095764fd345bf960dae86b1f8e6ac/a372c2531bb9b44ce10000000a174cb4.html SAP S/4 HANA Scope Configuration Accounting and Financial Close J58 Accounting and Financial Close (‏J58‏) 1GA Accounting and Financial Close - Group Ledger IFRS (‏1GA‏) 2FD Accounting for Incoming Sales Orders (‏2FD‏) 1J2 Advance Compliance Reporting (‏1J2‏) J62 Asset Accounting (‏J62‏) 1GB Asset Accounting - Group Ledger IFRS (‏1GB‏) BFH Asset Under Construction (‏BFH‏) 1GF Asset Under Construction - Group Ledger IFRS (‏1GF‏) 1GO Cash Journal (‏1GO‏) 1GI General Ledger Allocation Cycle (‏1GI‏) BEJ Inventory Valuation for Year-End Closing (‏BEJ‏) 1ZT Managing Material Price Changes and Inventory Values (‏1ZT‏) BF7 Period-End Closing - Maintenance Orders (‏BF7‏) BEI Period-End Closing - Plant (‏BEI‏) 2VB Purchase Order Accruals (‏2VB‏) 2QY SAP Fiori Analytical Apps for Asset Accounting in Finance (‏2QY‏) BGC SAP Fiori Analytical Apps for G/L Accounting in Finance (‏BGC‏) Advanced Accounting and Financial Close 1J2 Advance Compliance Reporting (‏1J2‏) 3AF Group Account Preparation for Financial Consolidation (‏3AF‏) 2U6 Group Reporting - Data from External Systems (‏2U6‏) 287 Group Reporting - Data from SAP Group Reporting Data Collection (‏287‏) 1SG Group Reporting - Financial Consolidation (‏1SG‏) 28B Group Reporting - Plan Consolidation (‏28B‏) Financial Operations J60 Accounts Payable (‏J60‏) J59 Accounts Receivable (‏J59‏) 19O Automated Dynamic Discounts with SAP Ariba Discount Management (‏19O‏) 1MV Cash Application Integration (‏1MV‏) 2UV Combined Invoice – Goods and Service Items (‏2UV‏) 2UT Complementary Invoice – Pricing (‏2UT‏) 19W Contingent Workforce Invoice Processing via SAP Fieldglass (‏19W‏) 1S0 Customer Payments (‏1S0‏) 2UW Delivery of Goods on Behalf of Another Company (‏2UW‏) 1S2 Digital Payments (‏1S2‏) 2RP Electronic Documents (‏2RP‏) 2M0 External Customer Payments (‏2M0‏) 2LZ External Digital Payments (‏2LZ‏) 1J5 Invoice, Taxes and Complementary Postings (‏1J5‏) 2PD Provisioning of Overdue Receivables (‏2PD‏) 2JB SAP Fiori Analytical Apps for Financial Accounting (‏2JB‏) 43D Tax Service Integration (‏43D‏) Advanced Financial Operations 1QM Advanced Credit Management (‏1QM‏) BD6 Basic Credit Management (‏BD6‏) Cost Management and Profitability Analysis 2I3 Commitment Management (‏2I3‏) 1HB Financial Plan Data Upload from File (‏1HB‏) BEV Internal Order - Actual (‏BEV‏) 1KU Leveraging SAP RealSpend (‏1KU‏) J55 Margin Analysis (‏J55‏) J54 Overhead Cost Accounting (‏J54‏) BEG Standard Cost Calculation (‏BEG‏) 2QL Universal Allocation (‏2QL‏) Enterprise Risk and Compliance 2OH Continuous Control Monitoring with SAP Process Control (‏2OH‏) 1WC Embargo Control (‏1WC‏) 2U2 Key Risk Indicator Monitoring with SAP Risk Management (‏2U2‏) 1W8 Legal Control (‏1W8‏) Treasury Management J77 Advanced Bank Account Management (‏J77‏) J78 Advanced Cash Operations (‏J78‏) 19O Automated Dynamic Discounts with SAP Ariba Discount Management (‏19O‏) 2O0 Bank Fee Management (‏2O0‏) Bank Communication File Exchange 1EG Bank Integration with File Interface (‏1EG‏) 16R Bank Integration with SAP Multi-Bank Connectivity (‏16R‏) BFA Basic Bank Account Management (‏BFA‏) BFB Basic Cash Operations (‏BFB‏) References: SAP (www.sap.com ); SAP Support (support.sap.com ); SAP Help (help.sap.com); SAP Blog (blogs.sap.com ); Oracle (www.oracle.com ); Wikipedia (www.wikipedia.org ); Forbes (www.forbes.com )

  • SAP NFe | US Localization

    Topics: USGAAP, Financial Accounting, US Treasure, Bank Communication, US Taxation US Localization Overview The complexity of US localization is medium and supported by SAP. General Information ISO Codes: US / USA Country Codes: +1 Capital: Washington, D.C. Official Language(s): English Currency: USD (United States Dollar) Complexity Information Complexity Ranking: Medium Frequency of Legal Changes: Dynamic Interpretation of Law Text: Difficult Main SAP localization points Financial Accounting Treasure Taxation References: SAP (www.sap.com )

  • SAP NFe | Windows

    Topics: Operating Systems | Windows | AVMA Key | Network Protocols Up Windows Windows Windows Activation | Product Key License Windows Server 2022 | Roles and Features Creating a VHD Virtual Hard Disk Remote Access / Remote Desktop Timezone (NTP Server) CMD Prompt Powers hell Storage Drive | Formatting and Allocation SSD vs HDD Windows Microsoft Windows is a computer operating system developed by Microsoft. It was first launched in 1985 as a graphical operating system built on MS-DOS. The initial version was followed by several subsequent releases, and by the early 1990s, the Windows line had split into two separate lines of releases: Windows 9x for consumers Windows NT for businesses and enterprises In the following years, several further variants of Windows would be released: Windows CE in 1996 for embedded systems Pocket PC in 2000 (renamed to Windows Mobile in 2003 and Windows Phone in 2010) for personal digital assistants and, later, smartphones Windows Holographic in 2016 for AR/VR headsets And several other editions Windows | Local Users and Groups Manage Local Users and Group | Application: lusrmgr.msc Use the Print Screen Button to open Screen Snipping Activating Print Screen Shortcut | Windows Settings > Easy of Access > Keyboard | Print Screen Shortcut On Windows Activation | Product Key License Windows Activation Mechanism Evaluation Grace Period License Key: Provided automatically by Microsoft to test their products Retail Licensing: You only need the applicable retail key License Key: Transferable, more expensive, support from software publisher OEM - Original Equipment Manufacturer License Key: Tied to hardware, non-transferable, cheaper, support from manufacturer ESD - Electronic Software Delivery License Key: Delivered electronically, can be transferable, pricing varies MAK - Multiple Activation Key Volume Licensing Activation Method: Volume license agreement KMS - Key Management Services Licensing Activation Method: Activates a variety of Microsoft Products for free. You just need a KMS server AVMA - Automatic Virtual Machine Activation Activation Method: Activates Virtual Windows Servers (using Hyper-V) for free. Windows Host needs a valid license key (paid) and the guest needs a generic public key (free) ESD | Electronic Software Delivery | Windows Server Standard or DataCenter Activation steps from Evaluation Edition to Retail Edition using ESD License Key, using Powershell. Check your Current Edition | Command: DISM /online /Get-CurrentEdition If you have an evaluation edition, you need to change it. Your edition will show "Eval" at the end Check your allowed target editions | Command: DISM /online /Get-TargetEditions It will show the possible target editions Salve License Agreement | Command: DISM /online /Set-Edition: /GetEula:C:\license.rtf In this step you change to the target edition Change Product Key | Command: DISM /online /Set-Edition: /ProductKey: /AcceptEula Use your ESD License Key acquired to activate your Windows Server AVAMA | Automatic Virtual Machine Activation | Windows Server DataCenter On virtualization hosts, AVMA offers several benefits. Server data center managers can use AVMA to: Activate VMs in remote locations Activate VMs with or without an internet connection Track VM usage and licenses from the virtualization host, without requiring any access rights on the virtualized systems AVMA requires a Windows Server Datacenter edition with the Hyper-V server host role installed AVMA does not work with other server virtualization technologies How to implement On the server that hosts the VMs, install, and configure the Microsoft Hyper-V Server role Create a virtual machine and install a supported Windows Server operating system on it After installing Windows Server on the VM, install the AVMA key on the VM. From PowerShell, run the following command: Check your Current Edition | Command: DISM /online /Get-CurrentEdition If you have an evaluation edition, you need to change it. Your edition will show "Eval" at the end Check your allowed target editions | Command: DISM /online /Get-TargetEditions It will show the possible target editions Salve License Agreement | Command: DISM /online /Set-Edition: /GetEula:C:\license.rtf In this step you change to the target edition Change Product Key | Command: DISM /online /Set-Edition: /ProductKey: /AcceptEula You can use a generic key just to change the product, but that is not the activation (e.g.: VDYBN-27WPP-V4HQT-9VMD4-VMK7H) Change AVMA Key| Command: slmgr /ipk Check AVMA public key for activation at Microsoft page ( https://learn.microsoft.com/en-us/windows-server/get-started/automatic-vm-activation?tabs=server2022 ) Activate the AVAM Key | Command: slmgr /ato AVMA Public Keys Edition: Datacenter | Key: W3GNR-8DDXR-2TFRP-H8P33-DV9BG Edition: Datacenter Azure Edition | Key: F7TB6-YKN8Y-FCC6R-KQ484-VMK3J Edition: Standard | Key: YDFWN-MJ9JR-3DYRK-FXXRW-78VHK System Requirements Server Host Version: Windows Server 2022| Server Guest VM: Server 2022; Server 2019; Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2019 | Server Guest VM: Server 2019; Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2016 | Server Guest VM: Server 2016; Server 2012 R2 Server Host V ersion: Windows Server 2012 R2 | Server Guest VM: Server 2012 R2 Activation Errors Error: 0xC004F069 AVMA Activation falling for Windows Server 2022 Eval (Evaluation Edition), When you are traying to activate Windows Server 2022 Virtual Machine (Hyper-V) on Windows Server 2022 DataCenter. Solution: You need to change the Eval status of your edition. Please follow the steps above. The solution are in the initials steps, checking the target edition, saving the license agreement and changing product key. Windows Server 2022 | Roles and Features Activating WiFi (Wireless LAN Services) Go to Service Manager Add roles and features Role-based or feature-based installation Select the "Server" Select nothing in the "Server Roles" In the features, select "Wireless LAN Services " In the confirmation, click in install Wait until finish Restart the server If the Wireless LAN Service has not started: Open PowerShell Command: net start WlanSvc Wireless Lan Service Add Roles and Features Wireless Lan Service Role-based or Feature-Based Wireless Lan Service Wireless Available Wireless Lan Service Add Roles and Features 1/9 Creating a VHD Virtual Hard Disk Create a Virtual Hard Disk | Windows 11 Windows Settings | System > Storage > Advanced Storage Settings > Disks & Volumes > Create VHD Create and Attach Virtual Hard Disk Name Location Size Format | VHDX Type | Dynamically Click Create Initialise Disk Partition Style | GPT Click Initialise Format New Volume Label Drive Letter File System | NTFS Click Advance Allocation Unit Size | Default Click Format Windows11_CreateVHD_01 Windows11_CreateVHD_02 Windows11_CreateVHD_05 Windows11_CreateVHD_01 1/5 Remote Access / Remote Desktop What is Remote Desktop? Remote desktop is the ability to connect with and use a faraway desktop computer from a separate computer. Remote desktop users can access their desktop, open and edit files, and use applications as if they were actually sitting at their desktop computer. Employees often use remote desktop software to access their work computers when they are traveling or working from home. What is RDP (Remote Desktop Protocol)? The Remote Desktop Protocol (RDP) is a protocol, or technical standard, for using a desktop computer remotely. Remote desktop software can use several different protocols, including RDP, Independent Computing Architecture (ICA), and virtual network computing (VNC), but RDP is the most commonly used protocol. RDP was initially released by Microsoft and is available for most Windows operating systems, but it can be used with Mac operating systems too. The RDP protocol opens a dedicated network channel for sending data back and forth between the connected machines (the remote desktop and the computer currently in use). It always uses network port 3389 for this purpose. Mouse movements, keystrokes, the desktop display, and all other necessary data are sent over this channel via TCP/IP , which is the transport protocol used for most types of Internet traffic. RDP also encrypts all data so that connections over the public Internet are more secure. Pros and Cons of using RDP Pros It does not require a VPN It keeps data stored securely on the user's desktop, instead of storing it on cloud servers or on the user's unsecured personal devices RDP enables companies with a legacy on-premises IT setup to allow their employees to work from home Cons It may cause users to experience lag, especially if their local Internet connection is slow It has some serious security vulnerabilities that leave it open to cyber attacks Preparing the Client Computer Open Settings, go to System > Remote Desktop Set Remote Desktop to "On" Make sure you Network Profile is set as "Private" Check the topic about changing the "Network Profile" Accessing the Computer On the host computer, open the Remote Desktop Connection You can type "Remote Desktop Connect" on search bar On the computer field, you can insert the IP or Hostname (if the computer is in the same network) Confirm that you want to connect Inform the "User" and "Password" from the Client Computer Saving Credentials (User and Password) for Quick Connection Due to a security Windows policy, the Windows Defender Credential Guard does not allow to save credentials anymore. But you can bypass this, without changing any policy or editing any register. Open the Powershell Check all Credentials stored | Command: cmdkey /list Check the Terminal Server Credentials | Command: cmdkey /list:TERMSRV/* Delete Old Credentials | Command: cmdkey /delete: (Optional) You can delete the Remote Access credentials | Command: cmdkey /delete /ras Create a New credential with Password | Command: cmdkey /generic: /user: /pass: Do Not Use the Command "/add: ", or the credential will be blocked by Windows Defender Credential Guard Example: cmdkey /add: /user: /pass: Timezone (NTP Server) What is NTP? NTP stands for 'Network Time Protocol', a networking protocol that allows devices to synchronize their clocks over the internet. It's used by many devices, including computers, phones, clocks, and payment terminals. What is Clock Strata? NTP uses a hierarchical, semi-layered system of time sources. Each level of this hierarchy is termed a stratum and is assigned a number starting with zero for the reference clock at the top. A server synchronized to a stratum n server runs at stratum n + 1. Stratum 0 | These are high-precision timekeeping devices such as 'Atomic Clocks ' Stratum 1 | These are computers whose system time is synchronized to within a few microseconds of their attached stratum 0 devices Stratum 2 | These are computers that are synchronized over a network to stratum 1 servers. Often a stratum 2 computer queries several stratum 1 servers Hint : The upper limit for stratum is 15. Stratum 16 is used to indicate that a device is unsynchronized. List of Top Public Time Servers NIST Internet Time Service | time.nist.gov Google Public NTP | time.google.com Public Amazon Time Sync Service |time.aws.com Cloudflare NTP | time.cloudflare.com Microsoft NTP server | time.windows.com Apple NTP server | time.apple.com Facebook NTP | time.facebook.com How to change the Windows NTP server Go to 'Control Panel ' Select 'Date and Time ' Go to 'Internet Time ' tab Click on 'Change Settings ... ' Insert the new NTP | Server: Example: time.nist.gov CMD Prompt To access the "Command Prompt" you just need search for "CMD'. Automount | Automatic Mounting of New Disks and Drives When you restart your computer and you MicroSD disk is not automatic mounted (showed as a driver), you can activate with these two options. CMD - Open Command Prompt DISKPART - Open the Windows Diskpart prompt AUTOMOUNT - Display if the automount is enable or disabled AUTOMOUNT ENABLE - Enable the automount AUTOMOUNT DISABLE - Disable the automount Restart the computer Registry Editor Option Search for "Regedit" and open it Search for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mountmgr "NoAutoMount" DWORD "0" Enable "1" Disable Powershell To access the "Powershell Prompt" you just need search for "Powershell'. Driver Signing Policy | How to Install Unsigned Windows Drivers on Hardware Disabling driver signature enforcement | Command: bcdedit /set NOINTEGRITYCHECKS ON You will receive the message "The operation completed successfully" Disabling load test-signed kernel-mode drivers enforcement | Command: bcdedit /set TESTSIGNING ON You will receive the message "The operation completed successfully" Restart the Windows Update your hardware driver using the "Device Manager" (Using Search Bar) Accept the pop-up and the driver will be installed After the installation don't forget to turn on the Windows Policy Enforcement using the same commands with "OFF" at the end Working with Hyper-V and Windows PowerShell Return a list of Hyper-V commands | Command: Get-Command -Module hyper-v | Out-GridView Get Help information about the Get-VM Hyper-V command | Command: Get-Help Get-VM Return a list of virtual machines | Command: Get-VM Windows Server 2022 | Network profile | Changing Public to Private Open PowerShell Check the network profile by looking at Name, Alias or Index | Command: Get-NetConnectionProfile You can change the Profile using | Command: Set-NetConnectionProfile -InterfaceIndex -NetworkCategory Example, Category Private using Name : Set-NetConnectionProfile -InterfaceAlias Network -NetworkCategory Private Example, Category Private using Alias: Set-NetConnectionProfile -InterfaceAlias Ethernet -NetworkCategory Private Example, Category Private using Index : Set-NetConnectionProfile -InterfaceIndex 19 -NetworkCategory Private Network Commands Resolve-DnsName | Command: Resolve-DnsName -Name Example: Resolve-DnsName -Name www.bing.com Functionality: The Resolve-DnsName cmdlet performs a DNS name query resolution for the specified name. This cmdlet is functionally similar to the nslookup tool which allows users to query for names NSLookUp | Command: nslookup Example DNS records: nslookup -type=any google.com Example A record: nslookup google.com Example TXT record: nslookup -type=txt google.com Example NS records: nslookup -type=ns google.com Example SOA record: nslookup -type=soa google.com Example MX record: nslookup -type=mx google.com Example debug mode: nslookup -debug google.com Example Reverse DNS: nslookup 8.8.8.8 Functionality: Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The nslookup command-line tool is available only if you have installed the TCP/IP protocol. Alternatives: Dig: (Domain Information Groper) / Host (The host command in Linux is a simple utility for performing DNS lookups) Traceroute | Command: tracert Example: tracert 8.8.8.8 Functionality: A traceroute provides a map of how data on the internet travels from its source to its destination. When you connect with a website, the data you get must travel across multiple devices and networks along the way, particularly routers IPConfig | Command: IPCONFIG Example "/?" Display the help message with all commands: IPCONFIG /? Example "/All" Display full configuration information (MAC Addresses): IPCONFIG /ALL Example "/Release" Release IPv4 address: IPCONFIG /RELEASE Example "/Renew" Renew IPv4 address: IPCONFIG /RENEW Functionality: IPConfig is a console application program that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain Name System settings Storage Drive | Formatting and Allocation File System A file system is a framework for organizing files in an operating system or external storage device. It lays out what information can be stored and what filenames, permissions, and other attributes can be attached to the files you save. Allocation Unit Size Allocation Unit Size, also known as "Cluster Size" or "Block Size", refers to the size of the chunks that a solid state drive (SSD) or hard disk drive (HDD) is divided into. When you increase the size of the allocation unit, the "chunk," you decrease the total number of allocation units on your drive. If you decrease the size of the allocation unit, the opposite happens, you increase the number of allocation units on the drive. Example: If you have a disk with: Disk: 16 Mb (or 16,384 Kb) And format it with: Allocation Unit Size for NTFS: 4069 bytes (or 4 Kb) You will have this number of clusters: Clusters: 16.384 kb / 4 Kb = 4.096 Clusters (or Units) If you reformat it to: Allocation Unit Size for NTFS: 32 Kb You will have this number of clusters: Clusters: 16.384 kb / 32 Kb = 512 Clusters (or Units) Important : If a file is too big to fit in a single block, then it will be split and span multiple blocks. If a file is smaller than the block size, then it will be stored in that block, but the entire block volume will be used up. This can result in inefficient storage in some extreme cases. Hint: If you are not sure, sure the "default allocation size" File Formats As Microsoft-developed formats, Windows supports: FAT32 (File Allocation Table 32-bit version) exFAT (Extensible File Allocation Table) NTFS (New Technology File System) They also work on Apple devices, though some of these formats are read-only, meaning you won't be able to save files on a Mac, just look at them. FAT32 FAT32, part of the File Allocation Table family of file systems, is the oldest of the three, having been originally created for floppy disk storage. It was introduced in Windows 95, but remains the most common file system today thanks to its usage in memory cards and flash drives. FAT32 isn’t as efficient as newer systems, but it is compatible with a wide range of new and old devices. Since it’s been around for so long, FAT32 has become the de facto standard for a lot of machines, so much so that many flash drives are still sold with FAT32 formatting by default for maximum compatibility. Works With: Windows, macOS, Linux, game consoles, just about anything with a USB port Storage Limitations: 4GB file size and 8TB partition size limit. Best For: Storing small files on removable storage for use with a range of devices Partition Volume / Allocation Unit Size 32 MB - 64 MB / 0.5 KB (512 Bytes) 64 MB - 128 MB / 1 KB 128 MB - 256 MB / 2 KB 256 MB - 8 GB / 4 KB 8 GB - 16 GB / 8 KB 16 GB - 32 GB /16 KB exFAT The Extended File Allocation Table (exFAT) file system was introduced in 2006, and added to Windows XP and Vista operating systems via a software update. It exists as a middle ground between the older FAT32 and the more modern NTFS formats. ExFAT was made to be very portable and optimized for flash drives. It’s lightweight like FAT32, but without the same file size restrictions. That said, it lacks some of the features of the NTFS file system. Overall, it's not as widely compatible as FAT32, but more broadly compatible than NTFS. Works With: All versions of Windows and modern versions of macOS. Older Linux versions need additional software, but any Linux distribution running Linux Kernel 5.7 or newer—like Ubuntu 22.04—has native exFAT support. Storage Limitations: 128 petabyte maximum file size, 128 petabyte maximum partition size. Lacks some of the newer features that come with NTFS. Best For: Storing and writing larger files you need to use on multiple devices. Partition Volume / Allocation Unit Size 7 MB - 256 MB / 4 KB (4096 Bytes) 256 MB - 32 GB / 8 KB 32 GB - 256 TB / 16 KB NTFS The New Technology File System (NTFS) is Microsoft’s main file system. All recent Windows machines use it by default, and if you install a newer version of Windows on a drive, it will format that drive in NTFS. It differs from FAT32 and exFAT in that it's a journaling file system, meaning it tracks changes before they're written to help with data recovery in the event of a system failure. Works With: All Windows versions. Read-only on Mac and some Linux distributions. Supported on Xbox One, X/S Limitations: Limited cross-platform compatibility. Best For: Internal drives running newer Windows operating systems or removable storage for Windows PCs. Partition Volume / Allocation Unit Size 7 MB - 16 TB / 4 KB (4096 Bytes) 16 TB - 32 TB / 8 KB 32 TB - 64 TB / 16 KB 64 TB - 128 TB / 32 KB 128 TB - 256 TB / 64 KB 256 TB - 512 TB / 128 KB 512 TB - 1 PB / 265 KB SSD vs HDD SSDs and HDDs are both storage devices, but the way they work is quite different. The main difference between a solid state drive (SSD) and a hard disk drive (HDD) is how data is stored and accessed. Pros and Cons Speed : (SSD) Faster x (HDD) Slower Price : (SSD) More Expensiver x (HDD) Cheaper Hardware : (SSD) Non-mechanical (Flash) x (HDD) Mechanical (Moving parts) Resistance : (SSD) Shock-Resistant x (HDD) Fragile Purpose : (SSD) Best for storing Operating Systems and Gaming Apps x (HDD) Best for storing extra Data, like Documents, Photos and Movies Speed Solid-state drives are much faster than hard disk drives, and the speed difference between the two types is significant. On the paper performance: HDDs: It can copy 30 to 150 MB per second (MB/s) SATA SSDs (Standard): Perform the same action at speeds of 500 MB/s NVMe SSDs (Newer): It can get up to astounding speeds of 3,000 to 3,500 MB/s Real performance for an average user: SDD Read 3000 MB/s Write 2000 MB/s HDD Read 60 MB/s Write 30 MB/s Warning : If you are transferring files from an HDD to an SSD (or vice versa), speed will be the bottleneck of the lower speed one (HDD) Lifespan These days, the lifetime of an SSD is nearly the same as that of an HDD: around five years on average. A bad device may fail after three years, but a good one can last you ten or more. SSDs used to have shorter lifespans, but SSD technology has improved substantially. While it’s true that SSD cells can’t be written to as many times as the disk in an HDD, this isn’t really an issue in practice. In theory, if more data is written to a cell, it wears out faster. But thanks to wear leveling, the SSD spreads write operations evenly across all cells to minimize cell death and prolong the lifespan of the drive. Additionally, modern SSDs contain spare cells that replace dead cells. This is called bad block management, and it’s why the larger the SSD, the longer its lifespan. If you were to write data to an SSD 24/7, it would still take decades for the drive to break down. SSD vs. HDD lifespan is now about equal. But if you’re worried, you can always run a hard drive test to monitor your drive’s health. Reliability Since SSDs don’t contain moving parts, they’re less prone to damage if you drop or bang your computer. This also makes SSDs more reliable in extreme environments and in high or low temperatures. You can typically expect a modern SSD to last at least as long as an HDD. SDDs fare better than HDDs in laptops because they’re portable; the rough handling of a laptop can more easily damage the intricate moving parts of an HDD. You can safely run Windows CHKDSK on an SSD so that it avoids the parts that have decayed and died, but never try to defrag an SSD. Defragmenting the drive writes and rewrites data, which can age your SSD faster. If you’re still working with an HDD, it’s good to know how to defrag on Mac or PC. Security and data recovery If your drive fails, you can usually recover the data on it. This is true with both HDDs and SSDs, though with a few key differences. Since SSDs are newer, many data recovery services charge more to work with them. But since they’re faster, you might be able to recover your data faster than with an HDD. SSDs use the TRIM command to destroy data when files are deleted. This is part of how SSDs equalize wear across all cells, but it also makes it harder to recover deleted files. You should keep this in mind when considering SSD or HDD for storage. Data recovery for SSDs is best handled by professionals in a lab with specialized equipment and software. Whichever type of drive you use, the best way to protect your data is with regular backups to external storage devices or cloud storage. Look up how to clone your hard drive so you have everything handy in case of an emergency. You won’t need to worry about SSD data recovery when you already have a fresh copy. Capacity If you’re concerned about how much information you can store on each type of drive, don’t worry. There are no differences in storage capacity. You can get HDDs and SSDs from as small as 128 GB up to 20 TB or more. However, one of the biggest differences between HDDs and SSDs is the price per gigabyte, so the SSD will be much more expensive. Prices The market for flash storage is volatile and varies based on supply and demand. While SSDs are much cheaper than they used to be, there is still a significant price difference. 1 TB internal HDD costs roughly $60 1 TB internal SSD averages around $120 Additional Information Energy Consumption: With no mechanical components, SSDs draw less power than their spinning counterparts. That means better battery life, and it’s one reason why most newer laptops come with SSDs. Hard disk drives require more power because they’re constantly in motion. Noise: You’re probably familiar with the sound of an HDD spinning up as it gets to work — 7200 RPMs to be exact — or perhaps the clicking sound that indicates an impending hard drive failure. SSDs, by contrast, don’t have moving parts and are completely silent. Best For HDD: Those looking to back up and store large amounts of data that they don’t need to access frequently People with modest computing needs Those buying or building a PC on a budget SSD Those who use resource-intensive programs like multimedia editing suites Gamers who want to play anything new Anyone who opens and copies files from their drive often References: Wikipedia (www.wikipedia.org ); Google (www.google.com ); Oracle (www.oracle.com ); Raspberry PI (www.raspberrypi.org ); Microsoft (www.microsoft.com ); CloudFlare (www.cloudflare.com )

  • SAP NFe | SAP S/4 HANA ACDOCA Tables

    Topics: SAP Tables | Relationships | Key Fields | S/4 HANA ACDOCA and Elements | Table Joins SAP S/4 HANA Tables SAP Tables SAP S/4 HANA ACDOCA and Elements SAP Tables Relationship | Material Master Record Table Category Internal Table SAP Tables Environment | Structural | Organizational Table Description Type Area T-Code Key Field1 Key Field 2 Key Field 3 Key Field 4 Add Field Explanation SKA1 G/L Account Master (Chart of Accounts) Master Data Accounting FS00 SAKNR KTOPL SKAT G/L Account Master Record (Chart of Accounts: Description) Master Data Accounting FS00 SAKNR KTOPL SPRAS SKB1 G/L account master (company code) Master Data Accounting FS00 SAKNR BUKRS ACDOCA Universal Journal Entry Line Items Transactional Accounting FB01 BELNR RBUKRS GJAHR RLDNR S/4 HANA Universal Journal (Single Source of Truth). All Financial and Management Accounting Postings ACDOCP Plan Data Line Items Transactional Accounting REQTSN DATAPAKID RECORD RACCT S/4 HANA Universal Journal for Plan Data Line Items BKPF Accounting Document Header Transactional Accounting FB01 BELNR BUKRS GJAHR BSEG Accounting Document Segment Transactional Accounting FB01 BELNR BUKRS GJAHR REGUS Accounts blocked by Payment proposal Transactional Accounts Payable F110 BUKRS KOART LAUFI LAUFD Find payment proposals that are blocking payment runs CSKS Cost Center Master Record Master Data Cost Center KS01 KOSTL KOKRS DATBI CSKT Cost Center Texts Master Data Cost Center KS01 KOSTL KOKRS DATBI SPRAS COBK CO Object: Document Header Transactional Cost Center COEP CO Object: Line Items (by Period) Transactional Cost Center COSP CO Object: Cost Totals for External Postings ("COSP") Transactional Cost Center CSKA Cost Elements (Data Dependent on Chart of Accounts) Master Data Cost Element FS00 / KA01 KSTAR KTOPL CSKB Cost Elements (Data Dependent on Controlling Area) Master Data Cost Element FS00 / KA01 KSTAR KOKRS DATBI CSKU Cost Element Texts Master Data Cost Element FS00 / KA01 KSTAR KTOPL SPRAS KNA1 General Data in Customer Master Master Data Customer BP / XD01 KUNNR KNB1 Customer Master (Company Code) Master Data Customer BP / XD01 KUNNR BUKRS KNB4 Customer Payment History Master Data Customer BP / XD01 KUNNR BUKRS KNB5 Customer master (dunning data) Master Data Customer BP / XD01 KUNNR BUKRS MABER KNBW Customer master record (withholding tax types) X Master Data Customer BP / XD01 KUNNR BUKRS WITHT KNVD Customer master record sales request form Master Data Customer KUNNR VKORG VTWEG SPART KNVP Customer Master Partner Functions Master Data Customer KUNNR VKORG VTWEG SPART KNVV Customer Master Sales Data Master Data Customer KUNNR VKORG VTWEG SPART MAKT Material Descriptions Master Data Material MM01 MATNR SPRAS MARA General Material Data Master Data Material MM01 MATNR MARC Plant Data for Material Master Data Material MATNR WERKS MARM Units of Measure for Material Master Data Material MATNR MEINH MBEW Material Valuation Master Data Material MATNR BWKEY BWTAR MLAN Tax Classification for Material Master Data Material MATNR ALAND MVKE Sales Data for Material Master Data Material MATNR VKORG VTWEG PRODH T179 Materials: Product Hierarchies Master Data Material PRODH T001 Company Codes Customizing Organizational OBY6 BUKRS T001W Plants/Branches Customizing Organizational WERKS T002 Language Keys Customizing Organizational SPRAS T003 Document Types Customizing Organizational BLART T004 Directory of Charts of Accounts Customizing Organizational KTOPL T005 Countries Customizing Organizational LAND1 T006 Units of Measurement Customizing Organizational MSEHI T008 Blocking Reasons for Automatic Payment Transcations Customizing Organizational ZAHLS T009 Fiscal Year Variants Customizing Organizational PERIV T011 Financial Statement Versions Customizing Organizational VERSN T012 House Banks Customizing Organizational HBKID BUKRS T014 Credit control areas Customizing Organizational KKBER T016 Industries (Branch) Customizing Organizational BRSCH T030 Standard Accounts Table Customizing Organizational OBYC KTOPL KTOSL BKLAS KOMOK KONTS Check the transaction OBYC (Automatic Accounting Posts - Procedures | Account Determination) T030H Acct Determ.for Open Item Exch.Rate Differences Customizing Organizational OBA1 HKONT KTOPL WAERS CURTP Use to check the Account Determination for Open Item Exchange Rate Differences Account | This is used in FAGL_FCV (Foreign Currency Valuation) PROJ Project definition Master Data PS PSPNR PRPS WBS (Work Breakdown Structure) Element Master Data Master Data PS PSPNR CEPC Profit Center Master Data Table Master Data Profit Center KE51 PRCTR KOKRS DATBI CEPCT Texts for Profit Center Master Data Master Data Profit Center KE51 PRCTR KOKRS DATBI SPRAS T000 Clients Customizing System SCC1 MANDT DD03L Table Fields System System SE16H FIELDNAME You can check which tables a specific field is in PRGN_CORR2 Correction Table for Modif. Transaction Codes in Area Menu System System T_TCODE S_TCODE REL_NAME You can check the old transaction that was replaced by new ones TSTC SAP Transactional Codes System System SE93 TCODE LFA1 Supplier Master (General Section) Master Data Vendor BP / XK01 LIFNR LFB1 Vendor Master (Company Code) Master Data Vendor BP / XK01 LIFNR BUKRS LFB5 Vendor master (dunning data) Master Data Vendor BP / XK01 LIFNR BUKRS MABER LFBK Vendor Master (Bank Details) Master Data Vendor BP / XK01 LIFNR BANKS BANKL BANKN LFBW Vendor master record (withholding tax types) X Master Data Vendor BP / XK01 LIFNR BUKRS WITHT LFM1 Vendor master record purchasing organization data Master Data Vendor BP / XK01 LIFNR EKORG LFM2 Vendor Master Record: Purchasing Data Master Data Vendor BP / XK01 LIFNR EKORG LTSNR WERKS SAP S/4 HANA ACDOCA and Elements Field Data Element Short Description Check Table Domain Data Type Length Decimal Places Search Help Origin of Input Help RCLNT MANDT Client T000 MANDT CLNT 3 0 H_T000 Input help implemented with check table RLDNR FINS_LEDGER Ledger in General Ledger Accounting FINSC_LEDGER FINS_LEDGER CHAR 2 0 Input help implemented with check table RBUKRS BUKRS Company Code T001 BUKRS CHAR 4 0 C_T001 Input help implemented with check table GJAHR GJAHR Fiscal Year GJAHR NUMC 4 0 BELNR BELNR_D Accounting Document Number BELNR CHAR 10 0 DOCLN DOCLN6 Six-Character Posting Item for Ledger DOCLN6 CHAR 6 0 RYEAR GJAHR_POS General Ledger Fiscal Year GJAHR NUMC 4 0 DOCNR_LD FINS_DOCNR_LD Ledger specific Accounting Document Number BELNR CHAR 10 0 RRCTY RRCTY Record Type RRCTY CHAR 1 0 Input help with fixed values .INCLUDE ACDOC_SI_00 Universal Journal Entry: Transaction, Currencies, Units STRU 0 0 RMVCT RMVCT Transaction type T856 RMVCT CHAR 3 0 H_T856 Input help implemented with check table VORGN VORGN Transaction Type for General Ledger VORGN CHAR 4 0 VRGNG CO_VORGANG CO Business Transaction TJ01 J_VORGANG CHAR 4 0 H_TJ01 Input help implemented with check table BTTYPE FINS_BTTYPE Business Transaction Type FINSC_BTTYPE FINS_BTTYPE CHAR 4 0 Input help implemented with check table AWTYP AWTYP Reference procedure TTYP AWTYP CHAR 5 0 Input help implemented with check table AWSYS AWSYS Logical system of source document TBDLS LOGSYS CHAR 10 0 Input help implemented with check table AWORG AWORG Reference Organizational Units AWORG CHAR 10 0 AWREF AWREF Reference document number AWREF CHAR 10 0 AWITEM FINS_AWITEM Reference Document Line Item NUMC6 NUMC 6 0 AWITGRP FINS_AWITGRP Group of Reference Document Line Items NUMC6 NUMC 6 0 SUBTA FINS_SUBTA Partial Document to be balanced to zero NUMC6 NUMC 6 0 XREVERSING FINS_XREVERSING Indicator: Item is reversing another item XFELD CHAR 1 0 Input help with fixed values XREVERSED FINS_XREVERSED Indicator: Item is reversed XFELD CHAR 1 0 Input help with fixed values XTRUEREV FINS_XTRUEREV Indicator: True reversal (i.e. cancellation) XFELD CHAR 1 0 Input help with fixed values AWTYP_REV AWTYP_REV Reversal: Reference Transaction of Document to Be Reversed TTYP AWTYP CHAR 5 0 Input help implemented with check table AWORG_REV AWORG_REV Reversal: Reference Organizations of Document to Be Reversed AWORG CHAR 10 0 AWREF_REV AWREF_REV Reversal: Reference Document No. of Document to Be Reversed AWREF CHAR 10 0 SUBTA_REV FINS_SUBTA_REV Reversal: Partial Document to be balanced to zero NUMC6 NUMC 6 0 XSETTLING FINS_XSETTLING Indicator: Item is settling or transferring another item XFELD CHAR 1 0 Input help with fixed values XSETTLED FINS_XSETTLED Indicator: Line item is settled or transferred XFELD CHAR 1 0 Input help with fixed values PREC_AWTYP FINS_PREC_AWTYP Preceding Document Reference Transaction TTYP AWTYP CHAR 5 0 Input help implemented with check table PREC_AWSYS FINS_PREC_AWSYS Logical System of Preceding Reference Document TBDLS LOGSYS CHAR 10 0 Input help implemented with check table PREC_AWORG FINS_PREC_AWORG Preceding Document Reference Organizational Units AWORG CHAR 10 0 PREC_AWREF FINS_PREC_AWREF Preceding Document Reference Document Number AWREF CHAR 10 0 PREC_AWITEM FINS_PREC_AWITEM Preceding Reference Document Line Item NUMC6 NUMC 6 0 PREC_SUBTA FINS_PREC_SUBTA Preceding Partial Document to be balanced to zero NUMC6 NUMC 6 0 PREC_AWMULT FINS_PREC_AWMULT_UUID ID of multiple Preceding Document References SYSUUID RAW 16 0 XSECONDARY FINS_SECONDARY_ENTRY Secondary journal entry BOOLE CHAR 1 0 Input help with fixed values SRC_AWTYP FINS_SRC_AWTYP Source Document Reference Transaction TTYP AWTYP CHAR 5 0 Input help implemented with check table SRC_AWSYS FINS_SRC_AWSYS Logical System of Source Reference Document TBDLS LOGSYS CHAR 10 0 Input help implemented with check table SRC_AWORG FINS_SRC_AWORG Source Document Reference Organizational Units AWORG CHAR 10 0 SRC_AWREF FINS_SRC_AWREF Source Document Reference Document Number AWREF CHAR 10 0 SRC_AWITEM FINS_SRC_AWITEM Source Reference Document Line Item NUMC6 NUMC 6 0 SRC_AWSUBIT FINS_SRC_AWSUBIT Source Reference Document Sub-Item NUMC6 NUMC 6 0 XCOMMITMENT FINS_XCOMMITMENT Indicator: Commitment XFELD CHAR 1 0 Input help with fixed values OBS_REASON FINS_OBSOLETE_ITEM_REASON Reason why this item is obsolete FINS_OBSOLETE_ITEM_REASON CHAR 1 0 Input help with fixed values .INCLUDE ACDOC_SI_CURRKEYS Universal Journal Entry: Currency Keys STRU 0 0 RTCUR FINS_CURRT Balance Transaction Currency TCURC WAERS CUKY 5 0 Input help implemented with check table RWCUR FINS_CURRW Transaction Currency TCURC WAERS CUKY 5 0 Input help implemented with check table RHCUR FINS_CURRH Company Code Currency TCURC WAERS CUKY 5 0 Input help implemented with check table RKCUR FINS_CURRK Global Currency TCURC WAERS CUKY 5 0 Input help implemented with check table ROCUR FINS_CURR1 Freely Defined Currency 1 TCURC WAERS CUKY 5 0 Input help implemented with check table RVCUR FINS_CURR2 Freely Defined Currency 2 TCURC WAERS CUKY 5 0 Input help implemented with check table RBCUR FINS_CURR3 Freely Defined Currency 3 TCURC WAERS CUKY 5 0 Input help implemented with check table RCCUR FINS_CURR4 Freely Defined Currency 4 TCURC WAERS CUKY 5 0 Input help implemented with check table RDCUR FINS_CURR5 Freely Defined Currency 5 TCURC WAERS CUKY 5 0 Input help implemented with check table RECUR FINS_CURR6 Freely Defined Currency 6 TCURC WAERS CUKY 5 0 Input help implemented with check table RFCUR FINS_CURR7 Freely Defined Currency 7 TCURC WAERS CUKY 5 0 Input help implemented with check table RGCUR FINS_CURR8 Freely Defined Currency 8 TCURC WAERS CUKY 5 0 Input help implemented with check table RCO_OCUR FINS_CO_OCUR CO Object Currency TCURC WAERS CUKY 5 0 Input help implemented with check table .INCLUDE ACDOC_SI_UNIT_OF_MEASURES Universal Journal Entry: Unit of Measures STRU 0 0 RUNIT MEINS Base Unit of Measure T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table RVUNIT RVUNIT Unit of Measure for Valuation Quantity T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table RRUNIT RRUNIT Unit of Measure for Reference Quantity T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table RIUNIT FINS_RIUNIT Unit of Measure for Inventory Quantity T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table QUNIT1 FCO_QUNIT1 Additional Unit of Measure 1 T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table QUNIT2 FCO_QUNIT2 Additional Unit of Measure 2 T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table QUNIT3 FCO_QUNIT3 Additional Unit of Measure 3 T006 MEINS UNIT 3 0 H_T006 Input help implemented with check table CO_MEINH FCO_MEINH Unit of Measure for CO Valuation Quantity MEINS UNIT 3 0 RACCT RACCT Account Number SKB1 SAKNR CHAR 10 0 SAKO Input help implemented with check table .INCLUDE ACDOC_SI_GL_ACCAS Universal Journal Entry: G/L additional account assignments STRU 0 0 RCNTR KOSTL Cost Center CSKS KOSTL CHAR 10 0 Input help implemented with check table PRCTR PRCTR Profit Center CEPC PRCTR CHAR 10 0 Input help implemented with check table RFAREA FKBER Functional Area TFKB FKBER CHAR 16 0 Input help implemented with check table RBUSA GSBER Business Area TGSB GSBER CHAR 4 0 H_TGSB Input help implemented with check table KOKRS KOKRS Controlling Area TKA01 CACCD CHAR 4 0 CSH_TKA01 Input help implemented with check table SEGMENT FB_SEGMENT Segment for Segmental Reporting FAGL_SEGM FB_SEGMENT CHAR 10 0 Input help implemented with check table SCNTR SKOST Sender cost center CSKS KOSTL CHAR 10 0 Input help implemented with check table PPRCTR PPRCTR Partner Profit Center CEPC PRCTR CHAR 10 0 Input help implemented with check table SFAREA SFKBER Partner Functional Area TFKB FKBER CHAR 16 0 Input help implemented with check table SBUSA PARGB Trading partner's business area TGSB GSBER CHAR 4 0 H_TGSB Input help implemented with check table RASSC RASSC Company ID of Trading Partner T880 RCOMP CHAR 6 0 CSHDP_T880 Input help implemented with check table PSEGMENT FB_PSEGMENT Partner Segment for Segmental Reporting FAGL_SEGM FB_SEGMENT CHAR 10 0 Input help implemented with check table .INCLUDE ACDOC_SI_VALUE_DATA Universal Journal Entry: Value Fields STRU 0 0 .INCLUDE ACDOC_SI_VALUE_DATA_FLOW Universal Journal Entry: Non-cumulative Value Fields STRU 0 0 TSL FINS_VTCUR12 Amount in Balance Transaction Currency WERTV12 CURR 23 2 WSL FINS_VWCUR12 Amount in Transaction Currency WERTV12 CURR 23 2 WSL2 FINS_VWCUR12_2 Group Valuation Amount in Transaction Currency WERTV12 CURR 23 2 WSL3 FINS_VWCUR12_3 Profit-Center Valuation Amount in Transaction Currency WERTV12 CURR 23 2 HSL FINS_VHCUR12 Amount in Company Code Currency WERTV12 CURR 23 2 KSL FINS_VKCUR12 Amount in Global Currency WERTV12 CURR 23 2 OSL FINS_VOCUR12 Amount in Freely Defined Currency 1 WERTV12 CURR 23 2 VSL FINS_VVCUR12 Amount in Freely Defined Currency 2 WERTV12 CURR 23 2 BSL FINS_VBCUR12 Amount in Freely Defined Currency 3 WERTV12 CURR 23 2 CSL FINS_VCCUR12 Amount in Freely Defined Currency 4 WERTV12 CURR 23 2 DSL FINS_VDCUR12 Amount in Freely Defined Currency 5 WERTV12 CURR 23 2 ESL FINS_VECUR12 Amount in Freely Defined Currency 6 WERTV12 CURR 23 2 FSL FINS_VFCUR12 Amount in Freely Defined Currency 7 WERTV12 CURR 23 2 GSL FINS_VGCUR12 Amount in Freely Defined Currency 8 WERTV12 CURR 23 2 KFSL FINS_VGCUR12_FIX Fixed Amount in Global Currency WERTV12 CURR 23 2 KFSL2 FINS_VGCUR12_FIX2 Group Valuation Fixed Amount in Global Currency WERTV12 CURR 23 2 KFSL3 FINS_VGCUR12_FIX3 PrCtr Valuation Fixed Amount in Global Currency WERTV12 CURR 23 2 PSL FINS_VPCUR12 Total Price Variance in Global Currency WERTV12 CURR 23 2 PSL2 FINS_VPCUR12_2 Group Valuation Total Price Variance in Global Currency WERTV12 CURR 23 2 PSL3 FINS_VPCUR12_3 PrCtr Valuation Total Price Variance in Global Currency WERTV12 CURR 23 2 PFSL FINS_VPFCUR12 Fixed Price Variance in Global Currency WERTV12 CURR 23 2 PFSL2 FINS_VPFCUR12_2 Group Valuation Fixed Price Variance in Global Currency WERTV12 CURR 23 2 PFSL3 FINS_VPFCUR12_3 PrCtr Valuation Fixed Price Variance in Global Currency WERTV12 CURR 23 2 CO_OSL FINS_VCO_OCUR12 Amount in CO Object Currency WERTV12 CURR 23 2 HSLALT MLHSLALT Alternative Value in Local Currency WERTV12 CURR 23 2 KSLALT MLKSLALT Alternative Value in Group Currency WERTV12 CURR 23 2 OSLALT MLOSLALT Alternative Value in Freely Defined Currency 1 WERTV12 CURR 23 2 VSLALT ML4SLALT Alternative Value in Freely Defined Currency 2 WERTV12 CURR 23 2 BSLALT MLBSLALT Alternative Value in Freely Defined Currency 3 WERTV12 CURR 23 2 CSLALT MLCSLALT Alternative Value in Freely Defined Currency 4 WERTV12 CURR 23 2 DSLALT MLDSLALT Alternative Value in Freely Defined Currency 5 WERTV12 CURR 23 2 ESLALT MLESLALT Alternative Value in Freely Defined Currency 6 WERTV12 CURR 23 2 FSLALT MLFSLALT Alternative Value in Freely Defined Currency 7 WERTV12 CURR 23 2 GSLALT MLGSLALT Alternative Value in Freely Defined Currency 8 WERTV12 CURR 23 2 HSLEXT MLHSLEXT External Value in Local Currency WERTV12 CURR 23 2 KSLEXT MLKSLEXT External Value in Group Currency WERTV12 CURR 23 2 OSLEXT MLOSLEXT External Value in Freely Defined Currency 1 WERTV12 CURR 23 2 VSLEXT ML4SLEXT External Value in Freely Defined Currency 2 WERTV12 CURR 23 2 BSLEXT MLBSLEXT External Value in Freely Defined Currency 3 WERTV12 CURR 23 2 CSLEXT MLCSLEXT External Value in Freely Defined Currency 4 WERTV12 CURR 23 2 DSLEXT MLDSLEXT External Value in Freely Defined Currency 5 WERTV12 CURR 23 2 ESLEXT MLESLEXT External Value in Freely Defined Currency 6 WERTV12 CURR 23 2 FSLEXT MLFSLEXT External Value in Freely Defined Currency 7 WERTV12 CURR 23 2 GSLEXT MLGSLEXT External Value in Freely Defined Currency 8 WERTV12 CURR 23 2 HVKWRT MLHVKWRT Value at Sales Price in Local Currency WERTV12 CURR 23 2 MSL QUAN1_12 Quantity MENGV12 QUAN 23 3 MFSL QUAN1_12_FIX Fixed quantity MENGV12 QUAN 23 3 VMSL VQUAN1_12 Valuation quantity MENGV12 QUAN 23 3 VMFSL VQUAN1_12_FIX Fixed valuation quantity MENGV12 QUAN 23 3 RMSL RQUAN1_12 Reference quantity MENGV12 QUAN 23 3 QUANT1 FCO_QUAN1_L Additional Quantity 1 MENGV12 QUAN 23 3 QUANT2 FCO_QUAN2_L Additional Quantity 2 MENGV12 QUAN 23 3 QUANT3 FCO_QUAN3_L Additional Quantity 3 MENGV12 QUAN 23 3 CO_MEGBTR FCO_MEGBTR CO Valuation Quantity MENGV12 QUAN 23 3 CO_MEFBTR FCO_MEFBTR CO Valuation Quantity Fix MENGV12 QUAN 23 3 .INCLUDE ACDOC_SI_VALUE_DATA_BALANCE Universal Journal Entry: Cumulative Value Fields STRU 0 0 HSALK3 MLHSALK3 Inventory Value in Local Currency WERTV12 CURR 23 2 KSALK3 MLKSALK3 Inventory Value in Group Currency WERTV12 CURR 23 2 OSALK3 MLOSALK3 Inventory Value in Freely Defined Currency 1 WERTV12 CURR 23 2 VSALK3 ML4SALK3 Inventory Value in Freely Defined Currency 2 WERTV12 CURR 23 2 HSALKV MLHSALKV Alternative Inventory Value in Local Currency WERTV12 CURR 23 2 KSALKV MLKSALKV Alternative Inventory Value in Group Currency WERTV12 CURR 23 2 OSALKV MLOSALKV Alternative Inventory Value in Freely Defined Currency 1 WERTV12 CURR 23 2 VSALKV ML4SALKV Alternative Inventory Value in Freely Defined Currency 2 WERTV12 CURR 23 2 HPVPRS MLHPVPRS Moving Average Price in Local Currency WERTV12 CURR 23 2 KPVPRS MLKPVPRS Moving Average Price in Group Currency WERTV12 CURR 23 2 OPVPRS MLOPVPRS Moving Average Price in Another Currency WERTV12 CURR 23 2 VPVPRS ML4PVPRS Moving Average Price in Fourth Currency WERTV12 CURR 23 2 HSTPRS MLHSTPRS Standard Price in Local Currency WERTV12 CURR 23 2 KSTPRS MLKSTPRS Standard Price in Group Currency WERTV12 CURR 23 2 OSTPRS MLOSTPRS Standard Price in Another Currency WERTV12 CURR 23 2 VSTPRS ML4STPRS Standard Price in Fourth Currency WERTV12 CURR 23 2 HVKSAL MLHVKSAL Inventory Value at Sales Price in Local Currency WERTV12 CURR 23 2 LBKUM MLLBKUM Inventory Quantity MENGV12 QUAN 23 3 .INCLUDE ACDOC_SI_FIX Universal Journal Entry: Mandatory fields for G/L STRU 0 0 DRCRK SHKZG Debit/Credit Indicator SHKZG CHAR 1 0 Input help with fixed values POPER POPER Posting Period POPER NUMC 3 0 PERIV PERIV Fiscal Year Variant T009 PERIV CHAR 2 0 Input help implemented with check table FISCYEARPER JAHRPER Period/Year JAHRPER NUMC 7 0 BUDAT BUDAT Posting Date in the Document DATUM DATS 8 0 Input help based on data type BLDAT BLDAT Document Date in Document DATUM DATS 8 0 Input help based on data type BLART BLART Document Type T003 BLART CHAR 2 0 CSH_T003 Input help implemented with check table BUZEI BUZEI Number of Line Item Within Accounting Document BUZEI NUMC 3 0 ZUONR DZUONR Assignment number ZUONR CHAR 18 0 BSCHL BSCHL Posting Key TBSL BSCHL CHAR 2 0 H_TBSL Input help implemented with check table BSTAT BSTAT_D Document Status BSTAT CHAR 1 0 Input help with fixed values LINETYPE LINETYPE Item Category T8G02 LINETYPE CHAR 5 0 Input help implemented with check table KTOSL KTOSL Transaction Key CHAR3 CHAR 3 0 SLALITTYPE SLALITTYPE Subledger-Specific Line Item Type FINSTS_SLALITTY SLALITTYPE NUMC 5 0 Input help implemented with check table XSPLITMOD XSPLITMOD Item Changed by Document Splitting XFELD CHAR 1 0 Input help with fixed values USNAM USNAM User Name XUBNAME CHAR 12 0 TIMESTAMP TIMESTAMP UTC Time Stamp in Short Form (YYYYMMDDhhmmss) TZNTSTMPS DEC 15 0 EPRCTR EPRCTR Partner profit center for elimination of internal business CEPC PRCTR CHAR 10 0 Input help implemented with check table RHOART HOART Type of origin object (EC-PCA) HOART NUMC 2 0 Input help with fixed values GLACCOUNT_TYPE GLACCOUNT_TYPE Type of a General Ledger Account GLACCOUNT_TYPE CHAR 1 0 Input help with fixed values KTOPL KTOPL Chart of Accounts T004 KTOPL CHAR 4 0 H_T004 Input help implemented with check table LOKKT ALTKT_SKB1 Alternative Account Number in Company Code SKA1 SAKNR CHAR 10 0 SAKO Input help implemented with check table KTOP2 KTOP2 Chart of Accounts According to Country Legislation T004 KTOPL CHAR 4 0 H_T004 Input help implemented with check table .INCLUDE ACDOC_SI_GEN Universal Journal Entry: Fields for several subledgers STRU 0 0 REBZG REBZG Document No. of the Invoice to Which the Transaction Belongs BELNR CHAR 10 0 REBZJ REBZJ Fiscal Year of the Relevant Invoice (for Credit Memo) GJAHR NUMC 4 0 REBZZ REBZZ Line Item in the Relevant Invoice BUZEI NUMC 3 0 REBZT REBZT Follow-On Document Type REBZT CHAR 1 0 RBEST CO_RBEST Category of Reference Purchase Order BELEGTYP NUMC 3 0 Input help with fixed values EBELN EBELN Purchasing Document Number EKKO EBELN CHAR 10 0 Input help implemented with check table EBELP EBELP Item Number of Purchasing Document EKPO EBELP NUMC 5 0 Input help implemented with check table ZEKKN DZEKKN Sequential Number of Account Assignment NUM02 NUMC 2 0 SGTXT SGTXT Item Text TEXT50 CHAR 50 0 KDAUF KDAUF Sales Order Number VBELN CHAR 10 0 COBL_EX_VMVA Explicit search help interface to field KDPOS KDPOS Item number in Sales Order NUM06 NUMC 6 0 COBL_EX_VMPC2 Explicit search help interface to field MATNR MATNR Material Number MARA MATNR CHAR 40 0 MAT1 Input help implemented with check table WERKS WERKS_D Plant T001W WERKS CHAR 4 0 H_T001W Input help implemented with check table LIFNR LIFNR Account Number of Supplier LFA1 LIFNR CHAR 10 0 KRED Input help implemented with check table KUNNR KUNNR Customer Number KNA1 KUNNR CHAR 10 0 DEBI Input help implemented with check table FBUDA FBUDA Date on which services are rendered DATUM DATS 8 0 Input help based on data type Reference Transaction Object Type Name Structure Remote Function /OPT/ Accounting document ABR FS-RI Sett. Document ACE Accrual Engine ACEPS_AWKY ACEPS_DOCUMENT_SENDER ACES4 Accrual Engine BKPF_AWOBJ FI_DOCUMENT_SENDER AFRU Reporting document COBK_AWOBJ AC_DOCUMENT_AFRU_DISPLAY AIBU Assts und.const.set. BKPF_AWOBJ AMFI_SHOW_AM_DOCUMENT AMBU Asset Transaction BKPF_AWOBJ AMFI_SHOW_AM_DOCUMENT AMDP Depreciation posting BKPF_AWOBJ AC_DOCUMENT_RECORD ANLA Asset Transaction AS91 FIAA old assets data AUAK Settlement document K_SETTLEMENT_DOC_DISPLAY AXBTA Bus. Travel Account BCAEB Acc.Mgt Single Doc. BCASU Acc.Mgt Totals Doc. BEBD RE Billing Document AC_DOCUMENT_SENDER_BEBD BERD Settlement document AC_DOCUMENT_SENDER_CRM_REBATES BERE Transaction Data AC_DOCUMENT_SENDER_CRM_REBATES BKKEB BCA individual doc. BKK_DOCUMENT_SENDER_SU BKKPR Pmnt order from BCA BKK_AWOBPR BKKSU BCA totals document BKK_DOCUMENT_SENDER_SU BKPF Accounting document BKPF_AWOBJ FI_DOCUMENT_SENDER BKPFE Acctg doc.ECS BKPF_AWOBJ GLE_ECS_ITEM_SENDER BKPFF Actg doc.direct inpt BKPF_AWOBJ FI_DOCUMENT_SENDER BKPFI Acctg doc.f.initial. BKPF_AWOBJ ISH_ERP_FI_SD_VBRK_DISPLAY BKPFM Substitute Document BKPF_AWOBJ X FDM_COLL_DOCUMENT_SENDER BKPFO Actg Doc.Direct Inpt BKPF_AWOBJ FI_DOCUMENT_SENDER BKPFR Reorg. Transfer BKPF_AWOBJ FAGL_R_DOCUMENT_SENDER BKPWF BKPF_AWOBJ FAGL_R_DOCUMENT_SENDER CACS Commission Settlemt ACCHD_AWOR CACS_TRANSFER_DISPLAY_DOC CAJO Cash journal doc. FCJ_DISPLAY_DOCUMENT_IN_CAJO CATS Document from CATS COBK_AWOBJ AC_CATS_DISPLAY_DOCUMENT CF3P CIAP CMPEV MEV_AC_DOCUMENT_SENDER COBK Controlling Document COBK_AWOBJ K_DOCUMENT_SENDER COFIS Reconcil. ledger K_RCL_DOCUMENT_SENDER COPA Profitab. Analysis COPCA Profit center doc. CRMCS Claim Subm. Posting X CRMFM Funds Posting X AC_DOCUMENT_SENDER_CRMFM CRP CRP Document DBMCD DBM Cash Desk /DBM/CD_DOCUMENT_SENDER DBMDP DBM Down Payment /DBM/DP_DOCUMENT_SENDER DBMIB DBM Int. Billing Doc /DBM/IB_DOCUMENT_SENDER DBMSO DBM Workshop Order /DBM/CO_UI_ORDER_SENDER DBMTR DBM Time Recording /DBM/TR_DOCUMENT_SENDER DBMVM DBM Vehicle Mgmt. /DBM/VM_DOCUMENT_SENDER DELI DIDPC Down Payment Chains /SAPPCE/KY /SAPPCE/DPC_AC_DOCUMENT_DISP DIPNV Constr. Prog. Report COBK_AWOBJ /SAPPCE/PNV_AC_DOCUMENT_DISP EACC Accounting Engine CON_FIN_AC_DOCUMENT_SENDER EBKPF External accounting EBKPFAWOBJ ECCS Consolidation ENTD Deposit Refund Prog. AC_DOCUMENT_SENDER_BEBD EXTX Excise Tax BKPF-AWOBJ X FI_DOCUMENT_SENDER FARA FARR_ACCR_NAVIGATION FARR Rev. Recognition FARR_ACCR_NAVIGATION FCO Failure Cost Proc. FCO_DOCUMENT_DISPLAY FCVS FDIS Cash Management FEBEP Acct statement item FEBEPAWOBJ DISPLAY_AS_LINE FERC FERC: Reporting COBK_AWOBJ FERC_DOCUMENT_SENDER FICA Contract A/R and A/P FILA Lease accounting BKPF_AWOBJ AMFI_SHOW_AM_DOCUMENT FILC Consolidation FKKCO Contract A/R and A/P FKK_AC_DOCUMENT_FICA FKKKO FI-CA Document FKK_DOCUMENT_SENDER FKKSU Contract A/R and A/P FKK_AC_DOCUMENT_FICA FMBHI FM_LEDGER_SHOW_ORIG_DOCUMENT FMBL Budgetary Ledger FMBTR FM_LEDGER_SHOW_ORIG_DOCUMENT FMCA Funds Management doc FMCCF Cmmt Carryforw. Doc. FM_CCF_DOCUMENT_DISPLAY FMCJ PS Cash journal FMCJ_DOCUMENT_SENDER FMCO Proj.Cash Mngmnt doc COBK_AWOBJ PS13_CASH_DOCUMENT_SENDER FMED BCS Entry Documents FMED_S_AW FMKU_ED_DISPLAY FMLI BCS Change Document FMLI_S_AW FMKU_LI_DISPLAY FMPSO Request document BKPF_AWOBJ FI_PSO_DOCUMENT_SENDER FMRES Earmarked funds FM_LEDGER_SHOW_ORIG_DOCUMENT FOTP One-Time Postings BKPF_AWOBJ FPL00 FPL01 FPL02 FPL03 FS-BA GL Bank Analyzer AC_DOCUMENT_SENDER_FSBA FS-PM Policy Management GLAL0 FlexGL Allocation FI_DOCUMENT_SENDER GLX Spec. purpose ledger GLYEC Year-End Closing Doc FI_DOCUMENT_SENDER GM Grants Mgm. Doc. GMBD Grants Mgm. Doc. GM_BDGT_DOCUMENT_DISPLAY GMCTR Guaran. Min.Contract HRBLK Funds Block DOCUMENT_SENDER_HRFPM HRBUD Budget Planning DOCUMENT_SENDER_HRFPM HRCOM HR funds commitment DOCUMENT_SENDER_HRFPM HRPAY HR settlement post. AC_DOCUMENT_SENDER_HRPAY HRPRE HR funds precommt DOCUMENT_SENDER_HRFPM HRRES Funds Reservation DOCUMENT_SENDER_HRFPM HRTIM Time management post COBK_AWOBJ HRTIM_AA_DOC_SHOW_REMOTE IBKPF Document from IDoc FI_DOCUMENT_SENDER IDOC External IDoc doc. ISU IS-U billing request ISUDR ISU Agg. Invoice ISU_DEREG_RECTRANSF_DISP_DOC JVA Joint Venture JVAM Joint Venture BKPF_AWOBJ KADO Reval. of Act. Pstg CKMLDUVACT_DOCUMENT_SENDER KFPK Fixed price alloc. KFPRS_AC_DOCUMENT_SENDER_KFPK KOROP FS-RI Open Items KORUM FS-RI Transfer LOANS Loans X FVD_SM_SHOW_DOC MKPF Material document MKPF_AWKEY MB_DOCUMENT_SENDER_MKPF MLCU Cumulation fin.stats CKMLAVR_DOCUMENT_SENDER MLDUV Mat. Posting Reval. CKMLDUVACT_DOCUMENT_SENDER MLHD Material ledger MLHD_AWKEY CKML_F_AC_DOCUMENT_SENDER MYDLT Delta Posting Bal.Sh MY_DELTALAUF_RESULT_GET NFSC Nota Fiscal Brazil NFWRI ITMF_DOCUMENT_SENDER_NFWRI PAYRQ Payment request PCON Contract ME_DOCUMENT_SENDER PEAC Payment Engine X AC_DOCUMENT_SENDER_PE PORD Purchase order ME_DOCUMENT_SENDER PRCHG Price change MLHD_AWKEY CKML_F_AC_DOCUMENT_SENDER PREQ Purchase requisition ME_DOCUMENT_SENDER PYMTD Payment data REACC Real Estate document RE_INTERFACE_DOCUMENT_SENDER REACI Real Estate document RE_INTERFACE_DOCUMENT_SENDER RECOM Real Estate Contract RE_INTERFACE_CONTRACT_SENDER RESV Material Reservation FM_RESV_DOCUMENT_SENDER RETAX Real est. doc. in.tx RE_INTERFACE_DOCUMENT_SENDER RMBE SRM Document RMRP Invoice receipt X MRM_AC_DOCUMENT_SENDER_RMRP SLRV Only Special Pur.Ldg SLRV_DOCUMENT_SENDER TBRR Event-Based RevRecog FINS_TRR_CLOSE_DISPLAYDOCUMENT TR-TM Treasury Management TRCA_DOCUMENT_SENDER_TRTM TRAVL Posting: Travel Exp. AC_DOCUMENT_SENDER_TRAVL UKPF Rtl revaluation doc. SP_DOCUMENT_SENDER_UKPF VBAK Sales Document AC_DOCUMENT_SENDER_VBAK VBRK Billing document AC_DOCUMENT_SENDER_VBRK VBRR Original Document SD_REV_REC_ORIGINAL_DOCUMENT VOVP VZBL Int.doc.in PS SHOW_DOCUMENT_CREATE_REVERSE WBRK Vendor Bill.Document WLF_AC_DOCUMENT_SENDER_WBRK WTYD Warranty Claim WTYD_AWKEY WTYD_DOCUMENT_SENDER XIPAC /IRM/IPG_FI_TO_IP_NAVIGATE XIPST /IRM/IPG_FI_TO_IP_NAVIGATE Business Transaction Type Text ABAK Last retirement on Group Asset ABAW New Revaluation ABGA Asset Retirement ACEA ACE Accruals Postings ACPA One Allocation Plan Assess. ACPD One Allocation Plan Distrib. AFAB Legacy data transfer: pst. val ANZA Down Payment AS91 Legacy data transfer: cum. val AUAB Retirement of Inv. Meas. AuC AUFW Revaluation AUUA AuC: Transf. Retirem. to Asset AUUS AuC: Transf. Retirem. to Other AUUZ AuC: Transf. Acquis. on Asset AUVA AuC: Part. Clearing Down Pmnt AUVZ AuC: Part. Settlement of APC AUZF AuC: Acquisition Other Receiv. AZAF Down Payment Request AZBU Down Payment Clearing AZUM Down Payment - Transfer Postg AZVA AuC: Carryforward of Down Pmnt AZVZ AuC: Carryforward of APC CFPC CF: PCA internal posting COFI Online Posting from CO COFM CO-FM Integration GLA0 GL Act. Assessment:Integrative GLD0 GL Actual Distrib: Integrative GLYC G/L Year End Closing GPDP Distribution Primary Costs GPDS Distribution Secondary Costs HRP1 HR Payroll Accounting INVZ Investment Support JVAB JVA: Retirement JVUM JVA:Transfer Retirement KAMV Manual Cost Allocation KAZI Actual Cost Center Accrual KOAE Actual Settlement (external) KOAO Actual Settlement KPPE Std cost est. (ind.purch.ordr) KPPP Standard costing (primary) KPPS Standard costing (secondary) KPPZ Standard costing (overhead) KSII Actual Price Calculation KSPA Assessment to CO-PA KTDA COPA: TOP-DOWN: Actuals KZPI Actual Overhead (periodic) KZRI Interest Calculation (actual) NACH Post-Capitalization OCAB Asset OrgAssChg: Transfer RET OCZU Asset OrgAssChg: Transfer ACQ PRC5 Profit Center Document Entry RFAD Accrual / Deferral RFBC Balance Carryforward RFBU FI Postings RFCL Manual Clearing RFCV Foreign Currency Valuation RFIC Customer Invoice / Credit Memo RFIG FI Memo Postings RFIV Vendor Invoice / Credit Memo RFPI Incoming Payment RFPO Outgoing Payment RFRA G/L Realignment RFT1 Travel Expenses RFTP Tax Payable RKIB Actual Periodic Repostings RKIL Actual Inverse Activity Alloc. RKIU Actual Overhead Assessment RKIV Actual Overhead Distribution RKL Actual Activity Allocation RKLN Revaluation at Actual Price RKLT Actual Template Allocation RKLU Activity Allocation Reposting RKLX Predistribution of Fixed Costs RKU1 Repost Costs RKU2 Repost Revenue RKU3 Repost CO Line Items RMBK Adjustment of Inventory Value RMBL Material Debit/Credit RMM1 Post Closing Material Ledger RMM2 Material Ledger Initialization RMPR Change in Material Price RMRP Incoming Invoice RMRU Confirm Order RMWA Goods Movement RMWE Goods Receipt for Purch. Order RMWF Goods Receipt for Prodn. Order RMWI Inventory Difference RMWL Goods Issue Delivery RMWQ Goods Movement for Usage Dec. SD00 Billing Document TBCS COGS Split TBRR Event Based Revenue Recognitn. UMAB Asset Transfer (retirement) UMAI Posting Outflow Internal UMZI Posting Access Internal UMZU Asset Transfer (acquisition) SAP Tables Relationship | Material Master Record Material Master Record Table Category The table category defines whether a physical table exists for the logical table description defined in the ABAP Dictionary and how the table is stored on the database. Transparent Tables (TRANSP) There is a physical table on the database for each transparent table. The names of the physical table and the logical table definition in the ABAP/4 Dictionary agree. All the business and application data is stored in transparent tables. Structure (INTTAB) No data records exist on the database for a structure. Structures are used for the interface definition between programs or between screens and programs. Append Structure (APPEND) An Append structure defines a subset of fields which belong to another table or structure but which are treated as a separate object in the correction management. Append structures are used to support modifications. Pooled table Pooled tables can be used to store control data (e.g. screen sequences, program parameters or temporary data). Several pooled tables can be combined to form a table pool. The table pool corresponds to a physical table on the database in which all the records of the allocated pooled tables are stored. Cluster table Cluster tables contain continuous text, for example documentation. Several cluster tables can be combined to form a table cluster. Several logical lines of different tables are combined to form a physical record in this table category. This permits object-by-object storage or object-by-object access. In order to combine tables in clusters, at least part of the keys must agree. Several cluster tables are stored in one corresponding table on the database. Generated view structure (VIEW) A structure is generated for a view during activation. This structure is used as the interface for the runtime environment. It is not usually displayed in the ABAP Dictionary. Internal Table Internal tables are dynamic data objects containing any number of rows with a common row type. Internal tables are particularly well suited for editing mass data in business applications. As well as the row type, the data type of an internal table is also defined by its table category and a table key. Row Type The row type can be a non-generic data type from ABAP Dictionary or global class or interface, a non-generic type in the local program, or a predefined ABAP type. Any types can be used as row types, such as elementary types, structured types, table types, and reference types. Table Category The table category defines how individual rows can be accessed: Standard tables : They are managed using a row index. New rows can either be appended to end of the table or inserted at specific positions. Individual rows are accessed using the table key or the row index. Sorted tables : They are also managed using a row index, but are sorted by the table key in ascending order. New rows can be inserted or appended only if they are sorted. The rows are accessed in the same way as in standard tables. Hashed tables : They are managed using a hash algorithm. The rows are accessed using the table key only. Index operations are not possible. Generic Table Categories Two other generic table categories exist that can be used when typing formal parameters and field symbols. Any Table : covers all table categories Index Table : only covers those where index operations are possible (namely standard tables and sorted tables) Table Key Internal tables have a primary table key and can also have secondary table keys. If the row types are structured, the table key can consist of a list of structure components. Alternatively, the pseudo component table_line can be used to specify the entire table row as a key. Another option is to specify the standard key DEFAULT KEY. This key contains all components that are not numeric and are not themselves table types. The primary table key of a standard table can also be empty. Table keys in standard keys are always non-unique, which means multiple rows in the same table can have the same key. Hashed tables, on the other hand, always have a unique key. In sorted tables, this property can be defined using the additions UNIQUE and NON-UNIQUE. Editing Internal Tables Internal tables can be edited, for example, using the statements: READ TABLE LOOP AT INSERT INTO TABLE MODIFY TABLE DELETE TABLE Example Declares an internal table itab with a structured row type Fills the table by inserting rows Reads the rows sequentially in a loop / Assigns the fifth row to a field symbol declared inline * 1 Declare an internal table * --- DATA: BEGIN OF struc, col1 TYPE i, col2 TYPE i, END OF struc, itab LIKE STANDARD TABLE OF struc. * 2 Inserting rows * --- DO 10 TIMES. struc-col1 = sy-index. struc-col2 = sy-index ** 2. INSERT struc INTO TABLE itab. ENDDO. * 3 Reads in a loop * --- LOOP AT itab INTO struc. WRITE: / struc-col1, struc-col2. ENDLOOP. READ TABLE itab INDEX 5 ASSIGNING FIELD-SYMBOL(). WRITE: / -col1, -col2. References: SAP (www.sap.com ); SAP Support (support.sap.com ); SAP Help (help.sap.com ); SAP Blog (blogs.sap.com )

  • SAP NFe | General Investments

    Investments Overview ... Understanding the Math of Returns Each Country or institution has a different way to present the percentage of the returns to their investors, and it is good to understand it to avoid surprises. Frist, the meaning of the acronyms. AER : It stands for Annual Equivalent Rate. This figure shows what the interest rate would be if interest was paid and compounded on an annual basis. P.A. : It stands for Per Annum. This figure shows the simple interest rate. In European Countries is very common you see P.A. or AER. Specially AER when your investments has daily, monthly and quarterly payments. In South American Countries is very common, if your investments has monthly payments, the interest rate is showed per month. What are the differences mathematically ? Per Annum (Simple Interest) Amount Invested = $1.000,00 Interest Rate P.A. = 10% Returns after 1 year = $100 Total Amount after 1 year = $1.100,00 Per Month (Compound Interest) Amount Invested = $1.000,00 Interest Rate P.M. = 0,8333% Returns after 1 month= $8,33 ($1000 x 8,333%) Total Amount after 1 month = $1.008,33 Returns after 1 year = $8,33 ($1000 x 8,333%) Total Amount after 1 year = $1.008,33 Simple Interest Formula Simple Interest = P × i × n P=Principal i=Interest rate n=Term of the loan Compound Interest Formula A = Final amount P = Initial principal balance r = Interest rate n = Number of times AER = [ ( 1 + r _ n ) n - 1 ] x 100 A = P ( 1 + r n _ ) n Article written by Luiz C. Mariani | Published August 2023 Reference sources: SAP (www.sap.com ); Oracle (www.oracle.com ); Wikipedia ( www.wikipedia.org ); Forbes (www.forbes.com )

  • Cyber Security

    Topics: Web Security | DNS Setup DNSSEC | pfSense | Network Protocols | Gmail Advanced Optimization | Plus Addressing | Dotted Addressing Up Cyber Security Cyber Security Overview Cyber Security Solution | XDR vs SIEM Wazuh (XDR + SIEM Platform) Reverse Proxy Google | Gmail Optimization | DNSSEC Webserver DNS | Domain Name System Public DNS Servers rDNS |Reverse DNS mDNS | Multicast DNS Ping | How to Ping a Specific Port? Telnet | Teletype Network NMAP | Network Mapper Wireshark | Open-Source Network Packet Analyzer Network Protocols TCP vs UDP | Protocol Comparison SSL vs TLS | Protocol Comparison Public Cloud Services Comparison Cyber Security Overview Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. Information security protects the integrity and privacy of data, both in storage and in transit. Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources. End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization. Cyber Security Solution | XDR vs SIEM XDR (Extended detection and response) It is a comprehensive cybersecurity solution that combines multiple security technologies and data sources to provide enhanced threat detection, response, and remediation capabilities. XDR expands beyond traditional EDR (Endpoint Detection and Response) solutions and incorporates additional security telemetry data from various sources, such as network traffic, cloud environments, and other endpoints. Key features and benefits Enhanced visibility : XDR collects and analyzes data from diverse sources, including endpoints, network traffic, cloud platforms, and more. This broader visibility provides a comprehensive understanding of the organization's security posture and allows for the detection of complex threats that may span multiple layers. Advanced analytics and detection : XDR leverages advanced analytics, machine learning, and threat intelligence to detect and prioritize potential security incidents accurately. By applying behavioral analytics and anomaly detection, XDR can identify and flag suspicious activities or indicators of compromise. Automated and streamlined response : XDR streamlines the incident response process by automating investigation and remediation actions. It can orchestrate response activities across different security tools and endpoints, reducing the time and effort required to contain and mitigate threats. Threat hunting capabilities : XDR enables proactive threat hunting by allowing security teams to search for indicators of compromise (IoCs) and suspicious activities across the entire security ecosystem. This helps in identifying and eliminating threats before they cause significant damage. Improved operational efficiency : By consolidating and correlating security data from multiple sources, XDR simplifies security operations and reduces alert fatigue. It provides context-rich insights and actionable intelligence, enabling security teams to focus on critical threats and respond more efficiently. SIEM (Security information and event management) It is a cybersecurity solution that helps organizations collect, analyze, and correlate security event data from various sources within their IT infrastructure. SIEM systems provide real-time monitoring, threat detection, incident response, and compliance management capabilities. Key features and benefits Data Collection : SIEM collects log data, security events, and system activity logs from a wide range of sources, including network devices, servers, applications, firewalls, intrusion detection systems (IDS), and more. These logs contain valuable information about security events, user activities, and system behavior. Log Management : SIEM systems store and manage log data in a centralized repository or database. This allows for easy search, retrieval, and long-term retention of logs for compliance and forensic purposes. Event Correlation : SIEM analyzes and correlates log data from different sources to identify patterns, anomalies, and potential security incidents. It applies predefined rules or algorithms to match events and generate meaningful alerts or notifications. Real-Time Monitoring : SIEM continuously monitors security events in real time and provides dashboards and visualizations to give security teams a holistic view of the organization's security posture. It allows them to track activities, detect threats, and respond promptly to incidents. Threat Detection : SIEM uses rule-based correlation or advanced analytics techniques to detect potential security threats and malicious activities. It can identify patterns that indicate attacks, such as brute-force login attempts, suspicious network traffic, or unauthorized access attempts. Incident Response : SIEM provides workflows and automation capabilities to streamline incident response processes. It enables security teams to investigate and respond to security incidents efficiently, including threat containment, analysis, and remediation. Compliance Management : SIEM assists organizations in meeting regulatory compliance requirements by collecting and analyzing security logs for auditing purposes. It generates reports and provides evidence of compliance with standards such as PCI DSS, HIPAA, GDPR, and others. Log Retention and Forensics : SIEM systems store logs for extended periods, allowing security teams to perform forensic analysis and investigations when necessary. This helps in understanding the scope and impact of security incidents and supports post incident remediation efforts. XDR vs SIEM (Key Differences) 1. Data Sources: SIEM primarily focuses on log data from various sources within the network, such as firewalls, servers, applications, and network devices. It collects and analyzes logs to identify security events and generate alerts. XDR goes beyond logs and incorporates a broader range of security telemetry data. It collects and analyzes data from diverse sources, including endpoints, network traffic, cloud environments, and sometimes additional sources like cloud applications, email gateways, or user behavior analytics. 2. Endpoint vs. Network Focus: SIEM traditionally places more emphasis on network-focused data sources, analyzing logs from network devices and servers. While it can incorporate some endpoint data, the primary focus is on network-centric security events. XDR expands the scope to include both endpoint and network data. It incorporates endpoint detection and response (EDR) capabilities, analyzing endpoint activities, processes, and behaviors. It also includes network detection and response (NDR) functionalities to monitor network traffic and identify threats. 3. Threat Detection Approach: SIEM typically relies on rule-based correlation and signature-based detection to identify security incidents. It uses predefined rules and signatures to match events and generate alerts based on known patterns. XDR leverages advanced analytics, machine learning, and threat intelligence to detect sophisticated threats. It applies behavioral analytics, anomaly detection, and machine learning algorithms to identify anomalies, unknown threats, and indicators of compromise. 4. Response and Automation: SIEM systems provide alerting and reporting capabilities, allowing security teams to investigate and respond to incidents manually. While some level of automation is possible, the focus is primarily on generating alerts and providing analysis for human decision-making. XDR offers more extensive automation and orchestration capabilities. It can automate response actions, such as isolating compromised endpoints, blocking malicious network traffic, or initiating remediation tasks. 5. Holistic View and Context: SIEM provides visibility into security events and logs, allowing security teams to monitor activities and detect threats within the network. XDR aims to provide a unified and holistic view of the organization's security posture. By collecting and correlating data from various sources, including endpoints, network, and cloud. Wazuh (XDR + SIEM Platform) Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh unifies historically separate functions into a single agent and platform architecture. Active XDR protection from modern threats: Wazuh provides analysts real-time correlation and context. Active responses are granular, encompassing on-device remediation so endpoints are kept clean and operational. A comprehensive SIEM solution : The Wazuh Security Information and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events and incidents. Endpoint Security | Configuration Assessment, Malware Detection and File Integrity Monitoring Threat Intelligence | Threat Hunting, Log Data Analysis and Vulnerability Detection Security Operations | Incident Response, Regulatory Compliance and IT Hygiene Cloud Security | Container Security, Posture Management and Workload Protection How it is Structured Wazuh is structured around three pivotal components, each playing a distinct role: 1 | Indexer | The Indexer is the backbone of Wazuh, responsible for efficiently storing and managing vast amounts of security data. It plays a crucial role in facilitating rapid data retrieval and analysis Stage 1 Installation |Certificate creation Stage 2 Installation |Nodes installation Stage 3 Installation |Cluster initialization 2 | Server | Acting as the core processing unit, the Server interprets and analyzes the data collected by agents. It executes essential security operations, such as threat detection, incident response, and compliance management Stage 1 Installation | Wazuh server node installation Stage 2 Installation |Cluster configuration for multi-node deployment 3 | Dashboard | The Dashboard is the user-friendly interface that provides a visual representation of your security data. It offers pre-built dashboards for quick insights into security events, vulnerabilities, file integrity monitoring, configuration assessments, cloud infrastructure monitoring, and compliance standards Together, these three components form the foundation of Wazuh, offering a scalable and flexible solution to enhance your organization’s cybersecurity posture. Requirements OS: 64-bit Linux OS Versions: RHEL 7, 8, 9 | Amazon Linux 2 | CentOS 7, 8 | Ubuntu 16.04, 18.04, 20.04, 22.04 Hardware for 1-25 agents: Minimum: 2 CPU (cores) | 4 RAM (GBs) Recommended: 4 CPU (cores) | 8 RAM (GBs) Disk space for 1-25 agents: 50 GBs per 90 Days data Browser Compatibility: Chrome 95 or later | Firefox 93 or later | Safari 13.7 or later Browser w/Limited Support: Other Chromium-based browsers Browser Not Supported: Internet Explorer 11 is not supported Before Installation | Lessons Learned | Common constraints CPU/Memory Error | In the installation step the process can be aborted if the requirements are not met Even with the right CPUs/Memory RAM set, the script consider the available at the moment of installation, and the system will be consuming some of the resources. You can just increase a little more 1 Option: If you are using a VM, you can increase the CPU cores and Memory RAM 2 Option: You the "-i" in the end of the command to bypass that (you will see in the prompt command) Disk Space Error | In the final steps of the script (dashboard installation), the processes can fail and the installation reverted, due a lack of free disk Even with a large VM disk, this can happens due the way the Ubuntu setted the partitions 1 Option: You need to increase the partition before installation (How to do it) Virtual Hard Disk expands to Maximum Size If you are using a VM with a dynamically expanding disk, be aware that Wazuh may expand exponentially until it reaches the maximum disk size, despite the internal space being unused and available. Restrict the maximum size accordingly After Installation To deploy your first agent On the Wazuh Dashboard, go to Menu > Server Management > Endpoints Summary Lost Password | If you lost your initial admin password you can run this command Retrieve Users and Passwords | Command: tar -O -xvf wazuh-install-files.tar wazuh-install-files/wazuh-passwords.txt Deploying on Ubuntu This is the quickstart method, provided by Wazuh, to deploy the version v4.9.0 using the official bash script. You can check the official page for the latest version deployments. (https://documentation.wazuh.com/current/quickstart.html ) Open the terminal For non-root users, use the command "sudo " to perform administrative tasks (Optional) If your system id not updated | Update Ubuntu | Command: apt update Download the Wazuh installation assistant | Command: curl -sO https://packages.wazuh.com/4.9/wazuh-install.sh Execute the Wazuh Scrip using the assistant | Command: bash wazuh-install.sh -a (Optional) If the minimum hardware requirement error appears use "-i" | Command: bash wazuh-install.sh -a -i Login to wazuh using the Browser | Command: https:// Just wait a little longer if you get a message "Wazuh dashboard server is not ready yet " Initial user and password is informed at the end of installation Deploying on Docker This is the installation alternative method, provided by Wazuh, to deploy the version v4.8.2 on docker. You can check the official page for the latest version deployments. (https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html ) Open the terminal For non-root users, use the command "sudo " to perform administrative tasks (Optional) If your system id not updated | Update Ubuntu | Command: apt update Install Docker and Docker Compose | Command: apt install docker.io docker-compose -y Clone the Wazuh | Command: git clone https://github.com/wazuh/wazuh-docker.git -b v4.8.2 Check the new wazuh-docker directory | Command: ls Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Generate the certificate | Command: docker-compose -f generate-indexer-certs.yml run --rm generator Deploy Wazuh single-node using docker-compose in background | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: docker stats Login to wazuh using the Browser | Command: https:// Just wait a little longer if you get a message "Wazuh dashboard server is not ready yet " Initial user and password | User: admin / Password: SecretPassword Upgrading Wazuh on Docker If you have a previous version like v4.8.2, in this example you can upgrade to v4.9.0 Open terminal For non-root users, use the command "sudo " to perform administrative tasks Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Stop the outdated environment | Command: docker-compose down Checkout the tag for the current version | Command: git checkout v4.9.0 Start the new version of Wazuh | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: docker stats Restarting the Wazuh Container If you restart your VM, or for any other reason, your Wazuh dashboard starts giving errors, you can restart the Wazuh container to continue using it until you check the logs and fix the issues. Open terminal For non-root users, use the command "sudo " to perform administrative tasks Enter in the new wazuh-docker directory (single-node) | Command: cd wazuh-docker/single-node/ Stop the outdated environment | Command: docker-compose down Wait until all processes are "done" Start the new version of Wazuh | Command: docker-compose up -d Check the Docker Stats to see if all is done and running | Command: sudo docker stats Reverse Proxy A reverse proxy is a server that sits in front of web servers and forwards client (e.g. web browser) requests to those web servers. Reverse proxies are typically implemented to help increase security, performance, and reliability. In order to better understand how a reverse proxy works and the benefits it can provide, let’s first define what a proxy server is. Benefits of a P roxy To avoid state or institutional browsing restrictions To block access to certain content To protect their identity online Benefits of a Reverse Proxy Load balancing Protection from attacks GSLB (Global server load balancing) Caching SSL encryption Forward Proxy Flow Reverse Proxy Flow Forward Proxy Flow 1/2 Google | Gmail Optimization | DNSSEC Webserver Gmail Advanced Optimization Plus Addressing Probably you receive a lot of unsolicited emails every day. That happens because many companies sell your data for data brokers. The Google "Plus Addressing" feature helps you to add additional information in your gmail address. Gmail Address: "Email Address" + "@gmail.com" (e.g. "johndoe@gmail.com ") Gmail Plus Addressing: "Email Address" + "Plus Addressing" + "@gmail.com" (e.g. "johndoe+amazon@gmail.com ") Example : If your email is "johndoe@gmail.com " and you want to to create a Amazon Account You can add "+amazon" in you email. So your email will be on Amazon "johndoe+amazon@gmail.com " You will receive the amazon emails in your gmail like the other emails, but you will be able to see the receiver as "johndoe+amazon@gmail.com " If Amazon sells your data for data brokers you will know what they did Warning : Nowadays, many companies already know this trick and are blocking Plus Addressing Dotted Addressing Unlike Plus Addressing, companies don't block dots in the Gmail address. It's not as flexible, but it's another way to change your email address without having to create another Gmail account. Gmail Address: "Email Address" + "@gmail.com" (e.g. "johndoe@gmail.com ") Gmail Dotted Addressing: "Email prefix" + "." "+ "Email suffix" (e.g. "john.doe@gmail.com ") Gmail Filtering You can use some filters in Gmail to find specific emails. On the gmail account, go to 'Show Search Option" In the field 'Has the words' Filter for emails with no Label | Syntax: has:nouserlabels Filter by Labels with space | Label '[ Important ]' nested on '[ Personal ]'|Syntax: user label:{[-Personal-] [-Important-]} Filter removing a specific Label | Syntax: -{label:[-Personal-]-[-Important-]} Filter by emails with no label, from yourself, before a date | Syntax: has:nouserlabels -from:me before:01/01/2013 DNSSEC on Google Domain with Cloudflare Activating DNSSEC on Google Domains with Cloudflare In Cloudflare go to | DNS > Settings > Activate DNSSEC Get the: Tag Key Digest In Google Domains go to | DNS Paste the: Tag Key Algorithm = 13 Digest Type = SHA256 Digest Wait a couple minutes and it is done. You can go back to Cloudflare and see the message "Success! Your domain is protected with DNSSEC." Google Domains DNSSEC Google Domains DNSSEC 1/1 DNS | Domain Name System DNS is often compared to a phone book, and it allows users to type domain names into their browsers without having to remember IP addresses. Browser: www.google.com > DNS Translates > IP Address: 142.250.187.228 Example: when a user types "www.google.com " into their browser, DNS translates that domain name into an IP address that their browser can use to load the website. DNS Record Types IP address resolution CNAME | CNAME records maps a domain name to another (canonical) domain name. They can be used to resolve other record types present on the target domain name Example: CNAME = 'finance' on google, like 'finance.google.com', will be mapped to 'https://www.google.com/finance/' A | A records map a domain name to one or multiple IPv4 address(es) Example: A = 'google.com' will be mapped to '142.250.187.238' AAAA | AAAA records map a domain name to one or multiple IPv6 address(es) Example: AAAA = 'google.com' will be mapped to '2a00:1450:4009:827::200e' Email authentication MX | A mail exchange (MX) record is required to deliver email to a mail server DKIM | A DomainKeys Identified Mail (DKIM) record ensures email authenticity by cryptographically signing emails SPF | A Sender Policy Framework (SPF) record lists authorized IP addresses and domains that can send email on behalf of your domain DMARK | A Domain-based Message Authentication Reporting and Conformance (DMARC) record helps generate aggregate reports about your email traffic and provide clear instructions for how email receivers should treat non-conforming emails Specialized records TXT | A text (TXT) record lets you enter text into the DNS system NS | A nameserver (NS) record indicates which server should be used for authoritative DNS CCA | A Certificate Authority Authorization (CAA) record specifies which Certificate Authorities (CAs) are allowed to issue certificates for a domain SRV | A service record (SRV) specifies a host and port for specific services like voice over IP (VOIP), instant messaging, and more SVCB and HTTPS | Service Binding (SVCB) and HTTPS Service (HTTPS) records allow you to provide a client with information about how it should connect to a server upfront, without the need of an initial plaintext HTTP connection PTR | A pointer (PTR) record specifies the allowed hosts for a given IP address SOA | A start of authority (SOA) record stores information about your domain such as admin email address, when the domain was last updated, and more DS and DNSKEY | DS and DNSKEY records help implement DNSSEC, which cryptographically signs DNS records to prevent domain spoofing There are 4 DNS servers involved in loading a webpage DNS Recursor | The recursor can be thought of as a librarian who is asked to go find a particular book somewhere in a library. The DNS recursor is a server designed to receive queries from client machines through applications such as web browsers. Typically the recursor is then responsible for making additional requests in order to satisfy the client’s DNS query Root Nameserver | The root server is the first step in translating (resolving) human readable host names into IP addresses. It can be thought of like an index in a library that points to different racks of books - typically it serves as a reference to other more specific locations TLD Nameserver | The top level domain server (TLD) can be thought of as a specific rack of books in a library. This nameserver is the next step in the search for a specific IP address, and it hosts the last portion of a hostname (In example.com, the TLD server is “com”) Authoritative Nameserver | This final nameserver can be thought of as a dictionary on a rack of books, in which a specific name can be translated into its definition. The authoritative nameserver is the last stop in the nameserver query. If the authoritative name server has access to the requested record, it will return the IP address for the requested hostname back to the DNS Recursor (the librarian) that made the initial request DNS Lookup For most situations, DNS is concerned with a domain name being translated into the appropriate IP address. Often DNS lookup information will be cached either locally inside the querying computer or remotely in the DNS infrastructure. There are typically 8 steps in a DNS lookup. When DNS information is cached, steps are skipped from the DNS lookup process which makes it quicker. The example below outlines all 8 steps when nothing is cached 1. A user types ‘example.com’ into a web browser and the query travels into the Internet and is received by a DNS recursive resolver 2. The resolver then queries a DNS root nameserver (.) 3. The root server then responds to the resolver with the address of a Top Level Domain (TLD) DNS server (such as .com or .net), which stores the information for its domains. When searching for example.com, our request is pointed toward the .com TLD 4. The resolver then makes a request to the .com TLD 5. The TLD server then responds with the IP address of the domain’s nameserver, example.com 6. Lastly, the recursive resolver sends a query to the domain’s nameserver 7. The IP address for example.com is then returned to the resolver from the nameserver 8. The DNS resolver then responds to the web browser with the IP address of the domain requested initially DNS Lookup DNS Lookup and Webpage Query DNS Record Request Sequence DNS Lookup DNS Lookup and Webpage Query 1/2 Once the 8 steps of the DNS lookup have returned the IP address for 'example.com', the browser is able to make the request for the web page: 9. The browser makes a HTTP request to the IP address 10. The server at that IP returns the webpage to be rendered in the browser DNS resolver The DNS resolver is the first stop in the DNS lookup, and it is responsible for dealing with the client that made the initial request. The resolver starts the sequence of queries that ultimately leads to a URL being translated into the necessary IP address. A typical uncached DNS lookup will involve both recursive and iterative queries. It's important to differentiate between a recursive DNS query and a recursive DNS resolver. The query refers to the request made to a DNS resolver requiring the resolution of the query. A DNS recursive resolver is the computer that accepts a recursive query and processes the response by making the necessary requests. 3 types of DNS queries Recursive Query | In a recursive query, a DNS client requires that a DNS server (typically a DNS recursive resolver) will respond to the client with either the requested resource record or an error message if the resolver can't find the record Iterative Query | In this situation the DNS client will allow a DNS server to return the best answer it can. If the queried DNS server does not have a match for the query name, it will return a referral to a DNS server authoritative for a lower level of the domain namespace. The DNS client will then make a query to the referral address. This process continues with additional DNS servers down the query chain until either an error or timeout occurs Non-recursive Query | Typically this will occur when a DNS resolver client queries a DNS server for a record that it has access to either because it's authoritative for the record or the record exists inside of its cache. Typically, a DNS server will cache DNS records to prevent additional bandwidth consumption and load on upstream servers DNS Caching The purpose of caching is to temporarily stored data in a location that results in improvements in performance and reliability for data requests. DNS caching involves storing data closer to the requesting client so that the DNS query can be resolved earlier and additional queries further down the DNS lookup chain can be avoided, thereby improving load times and reducing bandwidth/CPU consumption. DNS data can be cached in a variety of locations, each of which will store DNS records for a set amount of time determined by a time-to-live (TTL) Public DNS Servers A free, global DNS resolution service that you can use as an alternative to your current DNS provider. It first appeared to simplify and direct internet traffic for users globally. Public DNS servers are accessible to anyone with an internet connection and are often provided by internet service providers or third-party companies. These servers are most commonly used by individuals and organizations that do not require a private network for their DNS queries. They offer a straightforward and efficient way to navigate the web, helping users access websites quickly and reliably. DNS Ports DNS Standard | Port: 53 | Protocol: TCP and UDP DoH DNS-over-HTTPS | Port: 443 | Protocol: HTTPS (HTTP + SSL/TLS) DoT DNS-over-TLS | Port: 853 | Protocol: TCP DoQ DNS-over-QUIC | Port: 853 | Protocol: UDP DNSCrypt | Port: 443, 4443, 5443 or 8443 | Protocol: TCP or UDP Providers Type Category DNS IPv4 DNS-over-HTTPS DNS-over-TLS DNS-over-QUIC DNSCrypt IPv4 DNS IPv6 DNSCrypt IPv6 Ctry Page Comments Google DNS Top 8.8.8.8 and 8.8.4.4 https://dns.google/dns-query tls://dns.google 2001:4860:4860::8888 and 2001:4860:4860::8844 https://developers.google.com/speed/public-dns/ Google DNS is a free, global DNS resolution service that you can use as an alternative to your current DNS provider Cloudflare DNS Standard Top 1.1.1.1 and 1.0.0.1 https://dns.cloudflare.com/dns-query (IPv6: https://dns.cloudflare.com/dns-query) tls://one.one.one.one 2606:4700:4700::1111 and 2606:4700:4700::1001 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet Cloudflare DNS Malware blocking only Top 1.1.1.2 and 1.0.0.2 https://security.cloudflare-dns.com/dns-query tls://security.cloudflare-dns.com 2606:4700:4700::1112 and 2606:4700:4700::1002 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet Cloudflare DNS Malware and adult content blocking Top 1.1.1.3 and 1.0.0.3 https://family.cloudflare-dns.com/dns-query tls://family.cloudflare-dns.com 2606:4700:4700::1113 and 2606:4700:4700::1003 https://1.1.1.1/ Cloudflare DNS is a free and fast DNS service which functions as a recursive name server providing domain name resolution for any host on the Internet OpenDNS (Cisco) Standard Top 208.67.222.222 and 208.67.220.220 https://doh.opendns.com/dns-query tls://dns.opendns.com 2.dnscrypt-cert.opendns.com (IP: 208.67.220.220) 2620:119:35::35 and 2620:119:53::53 2.dnscrypt-cert.opendns.com (IPv6: [2620:0:ccc::2]) https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime OpenDNS (Cisco) FamilyShield Top 208.67.222.123 and 208.67.220.123 https://doh.familyshield.opendns.com/dns-query tls://familyshield.opendns.com 2.dnscrypt-cert.opendns.com (IP: 208.67.220.123) https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime OpenDNS (Cisco) Sandbox Top 208.67.222.2 and 208.67.220.2 https://doh.sandbox.opendns.com/dns-query tls://sandbox.opendns.com 2620:0:ccc::2 IP: 2620:0:ccd::2 https://www.opendns.com/ Cisco OpenDNS is a service which extends the DNS by incorporating features such as content filtering and phishing protection with a zero downtime Quad9 DNS Standard Well Known 9.9.9.9 and 149.112.112.112 https://dns.quad9.net/dns-query tls://dns.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.9:8443) 2620:fe::fe IP: 2620:fe::fe:9 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::fe]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. Regular DNS servers which provide protection from phishing and spyware. They include blocklists, DNSSEC validation, and other security features Quad9 DNS Unsecured Well Known 9.9.9.10 and 149.112.112.10 https://dns10.quad9.net/dns-query tls://dns10.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.10:8443) 2620:fe::10 IP: 2620:fe::fe:10 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::fe:10]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. Unsecured DNS servers don't provide security blocklists, DNSSEC, or EDNS Client Subnet Quad9 DNS ECS support Well Known 9.9.9.11 and 149.112.112.11 https://dns11.quad9.net/dns-query tls://dns11.quad9.net 2.dnscrypt-cert.quad9.net (IP: 9.9.9.11:8443) 2620:fe::11 IP: 2620:fe::fe:11 2.dnscrypt-cert.quad9.net (IPv6: [2620:fe::11]:8443) https://quad9.net/ Quad9 DNS is a free, recursive, anycast DNS platform that provides high-performance, privacy, and security protection from phishing and spyware. Quad9 servers don't provide a censoring component. EDNS Client Subnet is a method that includes components of end-user IP address data in requests that are sent to authoritative DNS servers. It provides security blocklist, DNSSEC, EDNS Client Subnet AdGuard Default Well Known 94.140.14.14 and 94.140.15.15 https://dns.adguard-dns.com/dns-query tls://dns.adguard-dns.com quic://dns.adguard-dns.com 2.dnscrypt.default.ns1.adguard.com (IP: 94.140.14.14:5443) 2a10:50c0::ad1:ff and 2a10:50c0::ad2:ff 2.dnscrypt.default.ns1.adguard.com (IPv6: [2a10:50c0::ad1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use AdGuard Family Protection Well Known 94.140.14.15 and 94.140.15.16 https://family.adguard-dns.com/dns-query tls://family.adguard-dns.com quic://family.adguard-dns.com 2.dnscrypt.family.ns1.adguard.com (IP: 94.140.14.15:5443) 2a10:50c0::bad1:ff and 2a10:50c0::bad2:ff 2.dnscrypt.family.ns1.adguard.com (IPv6: [2a10:50c0::bad1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use AdGuard Non-filtering Well Known 94.140.14.140 and 94.140.14.141 https://unfiltered.adguard-dns.com/dns-query tls://unfiltered.adguard-dns.com quic://unfiltered.adguard-dns.com 2.dnscrypt.unfiltered.ns1.adguard.com (IP: 94.140.14.140:5443) 2a10:50c0::1:ff and 2a10:50c0::2:ff 2.dnscrypt.unfiltered.ns1.adguard.com (IPv6: [2a10:50c0::1:ff]:5443) https://adguard-dns.io/welcome.html AdGuard DNS is an alternative solution for ad blocking, privacy protection, and parental control. It provides the necessary number of protection features against online ads, trackers, and phishing, no matter what platform and device you use 0ms DNS Relevant https://0ms.dev/dns-query https://0ms.dev/ DNS is a global DNS resolution service provided by 0ms Group as an alternative to your current DNS provider. It uses OISD Big as the basic filter to give everyone a more secure environment. It is designed with various optimizations, such as HTTP/3, caching, and more. It leverages machine learning to protect users from potential security threats while also optimizing itself over time 360 Secure DNS Relevant 101.226.4.6 and 218.30.118.6 https://doh.360.cn/dns-query tls://dot.360.cn 123.125.81.6 and 140.207.198.6 CN Ali DNS Relevant 223.5.5.5 and 223.6.6.6 https://dns.alidns.com/dns-query tls://dns.alidns.com quic://dns.alidns.com:853 2400:3200::1 and 2400:3200:baba::1 https://alidns.com/ Ali DNS is a free recursive DNS service that committed to providing fast, stable and secure DNS resolution for the majority of Internet users. It includes AliGuard facility to protect users from various attacks and threats BebasDNS by BebasID Security Relevant https://antivirus.bebasid.com/dns-query tls://antivirus.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Family Relevant https://internetsehat.bebasid.com/dns-query tls://internetsehat.bebasid.com:853 2.dnscrypt-cert.internetsehat.bebasid.com (IP: 103.87.68.196:8443) https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Family With Ad Filtering Relevant https://internetsehat.bebasid.com/adblock tls://family-adblock.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID OISD Filter Relevant https://dns.bebasid.com/dns-oisd tls://oisd.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Hagezi Multi Normal Filter Relevant https://dns.bebasid.com/dns-hagezi tls://hagezi.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Unfiltered Relevant https://dns.bebasid.com/unfiltered tls://unfiltered.dns.bebasid.com:853 https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection BebasDNS by BebasID Default Relevant https://dns.bebasid.com/dns-query tls://dns.bebasid.com:853 2.dnscrypt-cert.dns.bebasid.com (IP: 103.87.68.194:8443) https://github.com/bebasid/bebasdns BebasDNS is a free and neutral public resolver based in Indonesia which supports OpenNIC domain. Created by Komunitas Internet Netral Indonesia (KINI) to serve Indonesian user with free and neutral internet connection CFIEC Public DNS Relevant https://dns.cfiec.net/dns-query tls://dns.cfiec.net 240C::6666 and 240C::6644 IPv6-based anycast DNS service with strong security capabilities and protection from spyware, malicious websites. It supports DNS64 to provide domain name resolution only for IPv6 users CleanBrowsing Adult Filter Relevant 185.228.168.10 and 185.228.169.11 https://doh.cleanbrowsing.org/doh/adult-filter/ tls://adult-filter-dns.cleanbrowsing.org cleanbrowsing.org (IP: 185.228.168.10:8443) 2a0d:2a00:1::1 and 2a0d:2a00:2::1 cleanbrowsing.org (IPv6: [2a0d:2a00:1::1]:8443) https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content CleanBrowsing Family Filter Relevant 185.228.168.168 and 185.228.169.168 https://doh.cleanbrowsing.org/doh/family-filter/ tls://family-filter-dns.cleanbrowsing.org cleanbrowsing.org (IP: 185.228.168.168:8443) 2a0d:2a00:1:: and 2a0d:2a00:2:: cleanbrowsing.org (IPv6: [2a0d:2a00:1::]:8443) https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content CleanBrowsing Security Filter Relevant 185.228.168.9 and 185.228.169.9 https://doh.cleanbrowsing.org/doh/security-filter/ tls://security-filter-dns.cleanbrowsing.org 2a0d:2a00:1::2 and 2a0d:2a00:2::2 https://cleanbrowsing.org/ CleanBrowsing is a DNS service which provides customizable filtering. This service offers a safe way to browse the web without inappropriate content Comodo Secure DNS Relevant 8.26.56.26 and 8.20.247.20 2.dnscrypt-cert.shield-2.dnsbycomodo.com (IP: 8.20.247.2) https://comodo.com/secure-dns/ Comodo Secure DNS is a domain name resolution service that resolves your DNS requests through worldwide network of DNS servers. Removes excessive ads and protects from phishing and spyware ControlD Block malware Relevant 76.76.2.1 https://freedns.controld.com/p1 tls://p1.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Block malware + ads Relevant 76.76.2.2 https://freedns.controld.com/p2 tls://p2.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Block malware + ads + social Relevant 76.76.2.3 https://freedns.controld.com/p3 tls://p3.freedns.controld.com https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services ControlD Non-filtering Relevant 76.76.2.0 and 76.76.10.0 https://freedns.controld.com/p0 p0.freedns.controld.com 2606:1a40:: and 2606:1a40:1:: https://controld.com/free-dns ControlD is a customizable DNS service with proxy capabilities. This means it not only blocks things (ads, porn, etc.), but can also unblock websites and services DNS Privacy Run by the Stubby developers Relevant tls://getdnsapi.net (IP: 185.49.141.37 and IPv6: 2a04:b900:0:100::37) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy Run by the Stubby developers | Provider: Surfnet Relevant tls://dnsovertls.sinodun.com (IP: 145.100.185.15 and IPv6: 2001:610:1:40ba:145:100:185:15) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy Run by the Stubby developers | Provider: Surfnet Relevant tls://dnsovertls1.sinodun.com (IP: 145.100.185.16 and IPv6: 2001:610:1:40ba:145:100:185:16) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. DNS servers run by the Stubby developers DNS Privacy No-logging policy | Provider: UncensoredDNS Relevant tls://unicast.censurfridns.dk (IP: 89.233.43.71 and IPv6: 2a01:3a0:53:53::0) DK https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: UncensoredDNS Relevant tls://anycast.censurfridns.dk (IP: 91.239.100.100 and IPv6: 2001:67c:28a4::) DK https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: dkg Relevant tls://dns.cmrg.net (IP: 199.58.81.218 and IPv6: 2001:470:1c:76d::53) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.larsdebruin.net (IP: 51.15.70.167) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns-tls.bitwiseshift.net (IP: 81.187.221.24 and IPv6: 2001:8b0:24:24::24) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://ns1.dnsprivacy.at (IP: 94.130.110.185 and IPv6: 2a01:4f8:c0c:3c03::2) AT https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://ns2.dnsprivacy.at (IP: 94.130.110.178 and IPv6: 2a01:4f8:c0c:3bfc::2) AT https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.bitgeek.in (IP: 139.59.51.46) IN https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dns.neutopia.org (IP: 89.234.186.112 and IPv6: 2a00:5884:8209::2) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy | Provider: Go6Lab Relevant tls://privacydns.go6lab.si (IPv6: 2001:67c:27e4::35) SI https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy No-logging policy Relevant tls://dot.securedns.eu (IP: 146.185.167.43 and IPv6: 2a03:b0c0:0:1010::e9a:3001) EU https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. Other DNS servers with no-logging policy DNS Privacy Minimal logging/restrictions | Provider: NIC Chile Relevant tls://dnsotls.lab.nic.cl (IP: 200.1.123.46 and IPv6: 2001:1398:1:0:200:1:123:46) CL https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. These servers use some logging, self-signed certs or no support for strict mode DNS Privacy Minimal logging/restrictions | Provider: OARC Relevant tls://tls-dns-u.odvr.dns-oarc.net (IP: 184.105.193.78 and IPv6: 2620:ff:c000:0:1::64:25) https://dnsprivacy.org/ A collaborative open project to promote, implement, and deploy DNS Privacy. These servers use some logging, self-signed certs or no support for strict mode DNS.SB Relevant 185.222.222.222 and 45.11.45.11 https://doh.dns.sb/dns-query tls://dot.sb 2a09:: and 2a11:: SB https://dns.sb/ DNS.SB provides free DNS service without logging and with DNSSEC enabled DNSPod Public DNS+ Relevant 119.29.29.29 and 119.28.28.28 https://doh.pub/dns-query tls://dot.pub https://www.dnspod.com/ DNSPod Public DNS+ is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service DNSPod Public DNS+ Relevant https://dns.pub/dns-query https://www.dnspod.com/ DNSPod Public DNS+ is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service DNSWatchGO Relevant 54.174.40.213 and 52.3.100.184 https://www.watchguard.com/wgrd-products/dnswatchgo DNSWatchGO is a DNS service by WatchGuard that prevents people from interacting with malicious content DeCloudUs DNS Relevant https://dns.decloudus.com/dns-query tls://dns.decloudus.com 2.dnscrypt-cert.DeCloudUs-test (IP: 78.47.212.211:9443) 2.dnscrypt-cert.DeCloudUs-test (IPv6: [2a01:4f8:13a:250b::30]:9443) https://decloudus.com/ DeCloudUs DNS is a DNS service that lets you block anything you wish while by default protecting you and your family from ads, trackers, malware, phishing, malicious sites, and much more Dyn DNS Relevant 216.146.35.35 and 216.146.36.36 https://help.dyn.com/internet-guide-setup/ Dyn DNS is a free alternative DNS service by Dyn Freenom World Relevant 80.80.80.80 and 80.80.81.81 https://freenom.world/en/index.html Freenom World is a free anonymous DNS resolver by Freenom World Hurricane Electric Public Recursor Relevant 74.82.42.42 https://ordns.he.net/dns-query tls://ordns.he.net 2001:470:20::2 https://dns.he.net/ Hurricane Electric Public Recursor is a free alternative DNS service by Hurricane Electric with anycast Mullvad Ad blocking Relevant https://adblock.dns.mullvad.net/dns-query tls://adblock.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Non-filtering Relevant https://dns.mullvad.net/dns-query tls://dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware blocking Relevant https://base.dns.mullvad.net/dns-query tls://base.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + social media blocking Relevant https://extended.dns.mullvad.net/dns-query tls://extended.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + adult + gambling blocking Relevant https://family.dns.mullvad.net/dns-query tls://family.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Mullvad Ad + malware + adult + gambling + social media blocking Relevant https://all.dns.mullvad.net/dns-query tls://all.dns.mullvad.net https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/ Mullvad provides publicly accessible DNS with QNAME minimization, endpoints located in Germany, Singapore, Sweden, United Kingdom and United States (Dallas & New York) Nawala Childprotection DNS Relevant 180.131.144.144 and 180.131.145.145 2.dnscrypt-cert.nawala.id (IP: 180.131.144.144) http://nawala.id/ Nawala Childprotection DNS is an anycast Internet filtering system that protects children from inappropriate websites and abusive contents Neustar Recursive DNS Reliability & Performance 2 Relevant 156.154.70.5 and 156.154.71.5 2610:a1:1018::5 and 2610:a1:1019::5 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide reliable and fast DNS lookups without blocking any specific categories and also prevent redirecting NXDomain (non-existent domain) responses to landing pages Neustar Recursive DNS Threat Protection Relevant 156.154.70.2 and 156.154.71.2 2610:a1:1018::2 and 2610:a1:1019::2 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide protection against malicious domains and also include "Reliability & Performance" features Neustar Recursive DNS Family Secure Relevant 156.154.70.3 and 156.154.71.3 2610:a1:1018::3 and 2610:a1:1019::3 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide adult content blocking and also include "Reliability & Performance" + "Threat Protection" features Neustar Recursive DNS Business Secure Relevant 156.154.70.4 and 156.154.71.4 2610:a1:1018::4 and 2610:a1:1019::4 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide blocking unwanted and time-wasting content and also include "Reliability & Performance" + "Threat Protection" + "Family Secure" features Neustar Recursive DNS Reliability & Performance 1 Relevant 156.154.70.1 and 156.154.71.1 2610:a1:1018::1 and 2610:a1:1019::1 https://www.security.neustar/digital-performance/dns-services/recursive-dns Neustar Recursive DNS is a free cloud-based recursive DNS service that delivers fast and reliable access to sites and online applications with built-in security and threat intelligence. These servers provide reliable and fast DNS lookups without blocking any specific categories NextDNS Anycast Relevant https://anycast.dns.nextdns.io tls://anycast.dns.nextdns.io https://nextdns.io/ NextDNS provides publicly accessible non-filtering resolvers without logging in addition to its freemium configurable filtering resolvers with optional logging NextDNS Ultra-low latency Relevant https://dns.nextdns.io tls://dns.nextdns.io https://nextdns.io/ NextDNS provides publicly accessible non-filtering resolvers without logging in addition to its freemium configurable filtering resolvers with optional logging OpenBLD.net DNS Strict Filtering (RIC) Relevant https://ric.openbld.net/dns-query tls://ric.openbld.net https://openbld.net/ OpenBLD.net DNS — Anycast/GeoDNS DNS-over-HTTPS, DNS-over-TLS resolvers with blocking: advertising, tracking, adware, malware, malicious activities and phishing companies, blocks ~1M domains. Has 24h/48h logs for DDoS/Flood attack mitigation. More strictly filtering policies with blocking — ads, marketing, tracking, clickbait, coinhive, malicious, and phishing domains OpenBLD.net DNS Adaptive Filtering (ADA) Relevant https://ada.openbld.net/dns-query tls://ada.openbld.net https://openbld.net/ OpenBLD.net DNS — Anycast/GeoDNS DNS-over-HTTPS, DNS-over-TLS resolvers with blocking: advertising, tracking, adware, malware, malicious activities and phishing companies, blocks ~1M domains. Has 24h/48h logs for DDoS/Flood attack mitigation. Recommended for most users, very flexible filtering with blocking most ads networks, ad-tracking, malware and phishing domains RethinkDNS Non-filtering Relevant https://basic.rethinkdns.com/ tls://max.rethinkdns.com https://www.rethinkdns.com/configure Safe DNS Relevant 195.46.39.39 and 195.46.39.40 https://www.safedns.com/ Safe Surfer Relevant 104.155.237.225 and 104.197.28.121 2.dnscrypt-cert.safesurfer.co.nz (IP: 104.197.28.121) NZ https://www.safesurfer.co.nz/ Verisign Public DNS Relevant 64.6.64.6 and 64.6.65.6 2620:74:1b::1:1 and 2620:74:1c::2:2 https://www.verisign.com/security-services/public-dns/ Wikimedia DNS Relevant https://wikimedia-dns.org/dns-query tls://wikimedia-dns.org (IP: 185.71.138.138 and IPv6: 2001:67c:930::1) https://meta.wikimedia.org/wiki/Wikimedia_DNS dns0.eu Relevant 193.110.81.0 and 185.253.5.0 https://zero.dns0.eu/ tls://zero.dns0.eu quic://zero.dns0.eu EU https://www.dns0.eu/ dns0.eu is a free, sovereign and GDPR-compliant recursive DNS resolver with a strong focus on security to protect the citizens and organizations of the European Union 114DNS Family Regional 114.114.114.110 and 114.114.115.110 https://www.114dns.com/ 114DNS Normal Regional 114.114.114.114 and 114.114.115.115 https://www.114dns.com/ 114DNS Safe Regional 114.114.114.119 and 114.114.115.119 https://www.114dns.com/ Applied Privacy DNS Regional https://doh.applied-privacy.net/query tls://dot1.applied-privacy.net https://applied-privacy.net/ ByteDance Public DNS Regional 180.184.1.1 and 180.184.2.2 CIRA Canadian Shield DNS Protected Regional 149.112.121.20 and 149.112.122.20 https://protected.canadianshield.cira.ca/dns-query tls://protected.canadianshield.cira.ca (IP: 149.112.121.20 and IPv6: 2620:10A:80BB::20) 2620:10A:80BB::20 and 2620:10A:80BC::20 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CIRA Canadian Shield DNS Family Regional 149.112.121.30 and 149.112.122.30 https://family.canadianshield.cira.ca/dns-query tls://family.canadianshield.cira.ca (IP: 149.112.121.30 and IPv6: 2620:10A:80BB::30) 2620:10A:80BB::30 and 2620:10A:80BC::30 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CIRA Canadian Shield DNS Private Regional 149.112.121.10 and 149.112.122.10 https://private.canadianshield.cira.ca/dns-query tls://private.canadianshield.cira.ca (IP: 149.112.121.10 and IPv6: 2620:10A:80BB::10) 2620:10A:80BB::10 and 2620:10A:80BC::10 CA https://www.cira.ca/cybersecurity-services/canadianshield/how-works CZ.NIC ODVR Regional 193.17.47.1 and 185.43.135.1 https://odvr.nic.cz/doh tls://odvr.nic.cz 2001:148f:ffff::1 and 2001:148f:fffe::1 CZ https://www.nic.cz/odvr/ Comss.one DNS Regional https://dns.controld.com/comss tls://comss.dns.controld.com quic://comss.dns.controld.com RU https://www.comss.ru/page.php?id=7315 DNS for Family Regional 94.130.180.225 and 78.47.64.161 https://dns-doh.dnsforfamily.com/dns-query tls://dns-dot.dnsforfamily.com quic://dnsforfamily.com (IP: 94.130.180.225) dnsforfamily.com (IP: 94.130.180.225) 2a01:4f8:1c0c:40db::1 and 2a01:4f8:1c17:4df8::1 dnsforfamily.com (IPv6: [2a01:4f8:1c0c:40db::1]) https://dnsforfamily.com/ Digitale Gesellschaft DNS Regional https://dns.digitale-gesellschaft.ch/dns-query (IP: 185.95.218.42 and IPv6: 2a05:fc84::42) tls://dns.digitale-gesellschaft.ch (IP: 185.95.218.43 and IPv6: 2a05:fc84::43) CH https://www.digitale-gesellschaft.ch/dns/ Fondation Restena DNS Regional https://kaitain.restena.lu/dns-query (IP: 158.64.1.29 and IPv6: 2001:a18:1::29) tls://kaitain.restena.lu (IP: 158.64.1.29 and IPv6: 2001:a18:1::29) LU https://www.restena.lu/en/service/public-dns-resolver IIJ.JP DNS Regional https://public.dns.iij.jp/dns-query tls://public.dns.iij.jp JP https://public.dns.iij.jp/ JupitrDNS Regional 35.215.30.118 and 35.215.48.207 https://dns.jupitrdns.com/dns-query tls://dns.jupitrdns.com quic://dns.jupitrdns.com https://jupitrdns.com/ LibreDNS Regional 88.198.92.222 https://doh.libredns.gr/dns-query tls://dot.libredns.gr (IP: 116.202.176.26) GR https://libredns.gr/ LibreDNS Ads Regional https://doh.libredns.gr/ads GR https://libredns.gr/ OneDNS Pure Edition Regional 117.50.10.10 and 52.80.52.52 https://www.onedns.net/ OneDNS Block Edition Regional 117.50.11.11 and 52.80.66.66 https://www.onedns.net/ OpenNIC DNS Regional 217.160.70.42 2001:8d8:1801:86e7::1 https://www.opennic.org/ Quad101 Regional 101.101.101.101 and 101.102.103.104 https://dns.twnic.tw/dns-query tls://101.101.101.101 2001:de4::101 and 2001:de4::102 TW https://101.101.101.101/ SWITCH DNS Regional dns.switch.ch IP: 130.59.31.248 https://dns.switch.ch/dns-query tls://dns.switch.ch (IP: 130.59.31.248 and IPv6: 2001:620:0:ff::2) dns.switch.ch IPv6: 2001:620:0:ff::2 CH https://www.switch.ch/security/info/public-dns/ SkyDNS RU Regional 193.58.251.251 RU https://www.skydns.ru/en/ Yandex DNS Basic Regional 77.88.8.8 and 77.88.8.1 https://common.dot.dns.yandex.net/dns-query tls://common.dot.dns.yandex.net 2a02:6b8::feed:0ff and 2a02:6b8:0:1::feed:0ff RU https://dns.yandex.com/ Yandex DNS Safe Regional 77.88.8.88 and 77.88.8.2 https://safe.dot.dns.yandex.net/dns-query tls://safe.dot.dns.yandex.net 2a02:6b8::feed:bad and 2a02:6b8:0:1::feed:bad RU https://dns.yandex.com/ Yandex DNS Family Regional 77.88.8.3 and 77.88.8.7 https://family.dot.dns.yandex.net/dns-query tls://family.dot.dns.yandex.net 2a02:6b8::feed:a11 and 2a02:6b8:0:1::feed:a11 RU https://dns.yandex.com/ AhaDNS Small (Risky) 5.2.75.75 https://doh.nl.ahadns.net/dns-query tls://dot.nl.ahadns.net 2a04:52c0:101:75::75 NL https://ahadns.com/ AhaDNS Small (Risky) 45.67.219.208 https://doh.la.ahadns.net/dns-query tls://dot.la.ahadns.net 2a04:bdc7:100:70::70 US https://ahadns.com/ Arapurayil Small (Risky) Host: https://dns.arapurayil.com/dns-query 2.dnscrypt-cert.dns.arapurayil.com (IP: 3.7.156.128) https://dns.arapurayil.com/ BlackMagicc DNS Small (Risky) 103.178.234.160 https://robin.techomespace.com/dns-query tls://robin.techomespace.com:853 2405:19c0:2:ea2e::1 https://bento.me/blackmagicc Captnemo DNS Small (Risky) 2.dnscrypt-cert.captnemo.in (IP: 139.59.48.222:4434) IN https://captnemo.in/dnscrypt/ DNS Forge Small (Risky) 176.9.93.198 and 176.9.1.117 https://dnsforge.de/dns-query tls://dnsforge.de 2a01:4f8:151:34aa::198 and 2a01:4f8:141:316d::117 DE https://dnsforge.de/ DNSWarden Small (Risky) https://dns.dnswarden.com/uncensored tls://uncensored.dns.dnswarden.com https://dnswarden.com/customfilter.html Dandelion Sprout's Official DNS Server Small (Risky) https://dandelionsprout.asuscomm.com:2501/dns-query tls://dandelionsprout.asuscomm.com:853 quic://dandelionsprout.asuscomm.com:48582 https://github.com/DandelionSprout/adfilt/tree/master/Dandelion%20Sprout's%20Official%20DNS%20Server FFMUC DNS Small (Risky) https://doh.ffmuc.net/dns-query tls://dot.ffmuc.net 2.dnscrypt-cert.ffmuc.net (IP: 5.1.66.255:8443) 2.dnscrypt-cert.ffmuc.net (IPv6: [2001:678:e68:f000::]:8443) https://ffmuc.net/ Lelux DNS Small (Risky) https://resolver-eu.lelux.fi/dns-query tls://resolver-eu.lelux.fi FI https://lelux.fi/resolver/ OSZX DNS OSZX DNS Small (Risky) 51.38.83.141 https://dns.oszx.co/dns-query tls://dns.oszx.co 2.dnscrypt-cert.oszx.co (IP: 51.38.83.141:5353) 2001:41d0:801:2000::d64 2.dnscrypt-cert.oszx.co (IPv6: [2001:41d0:801:2000::d64]:5353) UK https://dns.oszx.co/ OSZX DNS PumpleX Small (Risky) 51.38.82.198 https://dns.pumplex.com/dns-query tls://dns.pumplex.com 2.dnscrypt-cert.pumplex.com (IP: 51.38.82.198:5353) 2001:41d0:801:2000::1b28 2.dnscrypt-cert.pumplex.com (IPv6: [2001:41d0:801:2000::1b28]:5353) UK https://dns.oszx.co/ Privacy-First DNS Japan Server Small (Risky) 172.104.93.80 https://jp.tiar.app/dns-query tls://jp.tiar.app 2.dnscrypt-cert.jp.tiar.app (IP: 172.104.93.80) 2400:8902::f03c:91ff:feda:c514 Provider: 2.dnscrypt-cert.jp.tiar.app IP: [2400:8902::f03c:91ff:feda:c514] JP https://tiarap.org/ Privacy-First DNS Singapore Server Small (Risky) 174.138.21.128 https://doh.tiar.app/dns-query tls://dot.tiar.app quic://doh.tiar.app 2.dnscrypt-cert.dns.tiar.app (IP: 174.138.21.128) 2400:6180:0:d0::5f6e:4001 2.dnscrypt-cert.dns.tiar.app (IPv6: [2400:6180:0:d0::5f6e:4001]) SG https://tiarap.org/ Privacy-First DNS Cached via third-party Small (Risky) https://jp.tiarap.org/dns-query JP https://tiarap.org/ Privacy-First DNS Cached via third-party Small (Risky) https://doh.tiarap.org/dns-query SG https://tiarap.org/ Seby DNS Small (Risky) 45.76.113.31 tls://dot.seby.io 2.dnscrypt-cert.dns.seby.io (IP: 45.76.113.31) RS https://dns.seby.io/ fvz DNS Small (Risky) 2.dnscrypt-cert.dnsrec.meo.ws (IP: 185.121.177.177:5353) http://meo.ws/ fvz DNS Small (Risky) 2.dnscrypt-cert.dnsrec.meo.ws (IP: 169.239.202.202:5353) http://meo.ws/ ibksturm DNS Small (Risky) https://ibksturm.synology.me/dns-query (IP: 213.196.191.96) tls://ibksturm.synology.me (IP: 213.196.191.96) quic://ibksturm.synology.me (IP: 213.196.191.96) 2.dnscrypt-cert.ibksturm (IP: 213.196.191.96:8443) https://ibksturm.synology.me/ rDNS | Reverse DNS What is reverse DNS? A reverse DNS lookup is a DNS query for the domain name associated with a given IP address. This accomplishes the opposite of the more commonly used forward DNS lookup, in which the DNS system is queried to return an IP address. Standards from the Internet Engineering Task Force (IETF) suggest that every domain should be capable of reverse DNS lookup, but as reverse lookups are not critical to the normal function of the Internet, they are not a hard requirement. As such, reverse DNS lookups are not universally adopted. How does reverse DNS work? Reverse DNS lookups query DNS servers for a PTR (pointer) record; if the server does not have a PTR record, it cannot resolve a reverse lookup. PTR records store IP addresses with their segments reversed, and they append ".in-addr.arpa" to that. For example if a domain has an IP address of 192.0.2.1, the PTR record will store the domain's information under 1.2.0.192.in-addr.arpa. In IPv6, the latest version of the Internet Protocol, PTR records are stored within the ".ip6.arpa" domain instead of ".in-addr.arpa." What are reverse DNS lookups used for? Reverse lookups are commonly used by email servers. Email servers check and see if an email message came from a valid server before bringing it onto their network. Many email servers will reject messages from any server that does not support reverse lookups or from a server that is highly unlikely to be legitimate. Spammers often use IP addresses from hijacked machines, which means there will be no PTR record. Or, they may use dynamically assigned IP addresses that lead to server domains with highly generic names. Logging software also employs reverse lookups in order to provide users with human-readable domains in their log data, as opposed to a bunch of numeric IP addresses. mDNS | Multicast DNS What is multicast DNS? mDNS is meant to deal with having names for machines on local networks without needing to register them on DNS servers. This is especially useful when there are no DNS servers you can control – think of a home with a couple of devices who need to interact locally without going to the internet. Examples: Chromecast and network printers are some good examples. In the context of WebRTC, mDNS has been introduced to protect against the JavaScript application accessing the local IP addresses that are exchanged during ICE negotiation. This is achieved by the browser replacing its local IP addresses with random mDNS ones that it registers on the local network. ICE | Interactive Connectivity Establishment It is a standard method of NAT traversal used in WebRTC. It is defined in IETF RFC 5245. ICE deals with the process of connecting media through NATs by conducting connectivity checks. ICE collects all available candidates (local IP addresses, reflexive addresses – STUN ones and relayed addresses – TURN ones). All the collected addresses are then sent to the remote peer via SDP. Once the WebRTC Client has all the collected ICE addresses of itself and its peer, it starts initiating connectivity checks. These checks essentially try sending media over the various addresses until success. The downside of using ICE is the time it takes, which can be 10s of seconds. To run faster, a new mechanism was added in WebRTC called Trickle ICE. Ping | How to Ping a Specific Port? The Ping (Packet Internet or Inter-Network Groper) is a network tool for checking whether a remote system is up and running. In other words, the command determines if a certain IP address or a host are accessible. Ping uses a network layer protocol called Internet Control Message Protocol (ICMP) and is available on all operating systems. On the other hand, port numbers belong to transport layer protocols, such as TCP and UDP. Port numbers help identify where an Internet or other network message is forwarded when it arrives. Why Can't I Ping a Specific Port? Network devices use ICMP to send error messages and information on whether communication with an IP address is successful or not. ICMP differs from transport protocols as ICMP is not used to exchange data between systems. Ping uses ICMP packets, and ICMP does not use port numbers which means a port can’t be pinged . How Can I Ping a Specific Port? (Workaround) However, we can use ping with a similar intention to check if a port is open or not. Some network tools and utilities can simulate an attempt to establish a connection to a specific port and wait to see if the target host responds. If there is a response, the target port is open. If not, the target port is closed, or the host is unable to accept a connection because there is no service configured to listen for connections on that port. Tools to Ping a Port Telnet (Windows / Linux) On Windows, open the CMD Prompt (searching for "CMD") or Powershell (searching for "Powershell) On Linux, you can use the command directly at the prompt Command: telnet Example: telnet 10.0.0.100 8006 (Port 8006 is used by Proxmox) If the port is open, telnet establishes a connection. Otherwise, it states a failure NC | Netcat (Linux) Command: nc -vz Example: nc -vz 10.0.0.100 8006 (Port 8006 is used by Proxmox) The output informs the user if the connection to the specified port is successful or not. If it is successful, the port is open NMAP | Network Mapper (Linux) Command: nmap -p Example: nmap -p 8006 10.0.0.100 (Port 8006 is used by Proxmox) The output informs the user about the port’s state and service type, latency, and the time elapsed until the completion of the task To ping more than one port. Command: nmap -p Powershell (Windows) Open Powershell (searching for "Powershell) Command: Test-NetConnection -p Example: Test-NetConnection 10.0.0.100 -p 8006 (Port 8006 is used by Proxmox) If the port is open and the connection passes, the TCP test is successful. Otherwise, a warning message appears saying the TCP connection failed Installing the Tools Telnet (Windows / Linux) Ubuntu | Command: sudo apt install telnet CentOS/Fedora | Command: yum -y install telnet Windows | Check Here NC | Netcat (Linux) Debian, Ubuntu, and Mint Check if Netcat is installed| Command: netcat -h Fedora, Red Hat Enterprise Linux, and CentOS Check if Netcat is installed| Command: ncat -h If not installed | Command: sudo apt install netcat NMAP | Network Mapper (Linux) Check if NMAP is installed| Command: nmap -version If not installed Ubuntu or Debian | Command: sudo apt install nmap CentOS or RHEL | Command: sudo yum install nmap Telnet | Teletype Network Telnet is a network protocol that allows users to connect to and communicate with remote computers using a transmission control protocol/Internet protocol (TCP/IP) network. It provides a command-line interface that acts like a virtual terminal, allowing users to access a remote system as if they were physically there. It was developed in 1969 and has been an essential tool for connecting computers and devices remotely. Despite being an old protocol, it still plays a critical role in modern-day remote access solutions. Security Issue : Telnet is a popular choice for remote access because it's reliable and secure, and it's also easy to use and configure. However, it does have some security concerns because it lacks encryption and transmits data in clear text. This means that anyone with access to the network could potentially intercept and read the data, including passwords and sensitive data. Alternatives like SSH offer more secure remote management options. Common uses Remote management : Users can access and manage network nodes, such as servers, routers, and switches, from a distance Initial device setup : Users can set up network hardware Testing services : Users can test services Debugging email problems : Users can send emails directly from the server to detect errors Configuring servers : Users can quickly and easily implement changes to the directory structure, file access rights, or passwords Accessing legacy systems : Some legacy computer systems still rely on Telnet for remote access. It helps connect to these systems, run applications, process data, and manage resources. Troubleshooting network connectivity : It can be used to test connectivity to a network device or server. By establishing a Telnet connection to the device or server, you can check whether it’s reachable, identify any errors or connectivity issues, and diagnose network problems. How to use it to troubleshooting network connectivity You can check if a specific port is open simply: Open the PowerShell Typing the command: telnet Example: telnet 10.0.0.100 8006 (Port 8006 is used by Proxmox) If the port is open, telnet establishes a connection. Otherwise, it states a failure Installing Telnet Ubuntu Command: yum -y install telnet CentOS/Fedora Command: sudo apt install telnet Windows Open “Control Panel“ Open “Programs“ Select the “Turn Windows features on or off ” option Check the “Telnet Client” box Click “OK“. A box will appear that says “Windows features” and “Searching for required files“. When complete, the Telnet client should be installed in Windows NMAP | Network Mapper NMAP (Network Mapper) is a free and open source utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine: What hosts are available on the network What services (application name and version) those hosts are offering What operating systems (and OS versions) they are running What type of packet filters/firewalls are in use and other characteristics It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. Installing NMAP on Linux Check if NMAP is installed| Command: nmap -version If not installed Ubuntu or Debian | Command: sudo apt install nmap CentOS or RHEL | Command: sudo yum install nmap Running NMAP Run TCP Scan | Command: nmap -sT Run Script to find Vulnerabilities | Command: nmap --script vuln Wireshark | Open-Source Network Packet Analyzer Wireshark, Originally named Ethereal but renamed in May 2006, is a free and open-source network packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. A network packet analyzer presents captured packet data in as much detail as possible. You could think of a network packet analyzer as a measuring device for examining what’s happening inside a network cable, just like an electrician uses a voltmeter for examining what’s happening inside an electric cable (but at a higher level, of course). Intended Purposes Network administrators use it to troubleshoot network problems Network security engineers use it to examine security problems QA engineers use it to verify network applications Developers use it to debug protocol implementations People use it to learn network protocol internals What is not provided Wireshark isn’t an intrusion detection system Wireshark will not manipulate things on the network, it will only “measure” things from it Features Available for UNIX and Windows Capture live packet data from a network interface Open files containing packet data captured with tcpdump/WinDump, Wireshark, and many other packet capture programs Import packets from text files containing hex dumps of packet data Display packets with very detailed protocol information Save packet data captured Export some or all packets in a number of capture file formats Filter packets on many criteria Search for packets on many criteria Colorize packet display based on filters Create various statistics Capabilities Live capture from many different network media Wireshark can capture traffic from many different network media types, including Ethernet, Wireless LAN, Bluetooth, USB, and more The specific media types supported may be limited by several factors, including your hardware and operating system Import files from many other capture programs Wireshark can open packet captures from a large number of capture programs Export files for many other capture programs Wireshark can save captured packets in many formats, including those used by other capture programs Many protocol dissectors There are protocol dissectors (or decoders, as they are known in other products) for a great many protocols Ubuntu | Installing Wireshark Using the APT (Advanced Package Tool) Method) The software repository of Ubuntu includes Wireshark by default, which enables you to install the package using the APT. It is the easiest and most straightforward method. It ensures you have the latest version of Wireshark when the Ubuntu system is updated. Execute the following command in the Ubuntu terminal. Install the Wireshark | Command: sudo apt install wireshark You will be asked if a "non-superuser can capture packets". This means that a user other than the "root" user can run Wireshark. If you have another user, select "Yes " Add your user to the wireshark group | Command: sudo usermod -aG wireshark Example: sudo usermod -aG wireshark john01 If you use the "root" user, select "No " and you won't need to perform anything else OPTIONAL | If you want to change your "non-superuser packet capture" option later, use the Command: sudo dpkg-reconfigure wireshark-common Verify if the Wireshark was installed checking its version | Command: wireshark --version Launch the Wireshark | Command: sudo wireshark To uninstall Wireshark | Command: sudo apt-get remove --purge wireshark Using the PPA (Personal Package Archive) Method If the Ubuntu version of your computer is older, you can use the PPA maintained by the Wireshark developers. Add the official Wireshark PPA to your list of repositories |Command: sudo add-apt-repository ppa:wireshark-dev/stable -y Update the package list | Command: sudo apt update Install the Wireshark | Command: sudo apt install wireshark You will be asked if a "non-superuser can capture packets". This means that a user other than the "root" user can run Wireshark. If you have another user, select "Yes " Add your user to the wireshark group | Command: sudo usermod -aG wireshark Example: sudo usermod -aG wireshark john01 If you use the "root" user, select "No " and you won't need to perform anything else OPTIONAL | If you want to change your "non-superuser packet capture" option later, use the Command: sudo dpkg-reconfigure wireshark-common Verify if the Wireshark was installed checking its version | Command: wireshark --version Launch the Wireshark | Command: sudo wireshark To uninstall Wireshark | Command: sudo apt-get-repository –remove ppa:wireshark-dev/stable -y Network Protocols Network protocols are the sets of standards that allow two or more machines connected to the internet to communicate with each other. It works as a universal language, which can be interpreted by computers from any manufacturer, using any operating system. They are responsible for taking data transmitted over the network and dividing it into small pieces, which are called packets. Each packet carries source and destination addressing information. Protocols are also responsible for systematizing the establishment, control, traffic and closure phases. Key elements that define network protocols: Syntax: Represents the format of the data and the order in which it is presented Semantics: Refers to the meaning of each syntactic set that gives meaning to the message sent Timing: Defines an acceptable packet transmission speed Types of Network Protocols For communication between computers to be carried out correctly, both computers must be configured according to the same parameters and comply with the same communication standards. The network is divided into layers, each with a specific function. The different types of network protocols vary according to the type of service used and the corresponding layer. The main layers and their main protocol types: Application Layer: WWW, HTTP, SMTP, Telnet, FTP, SSH, NNTP, RDP, IRC, SNMP, POP3, IMAP, SIP, DNS, PING Transport Layer: TCP, UDP, RTP, DCCP, SCTP Network Layer: IPv4, IPv6, IPsec, ICMP Physical Link Layer: Ethernet, Modem, PPP, FDDi Transmission Control Protocol (TCP) TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. Internet Protocol (IP) IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks. User Datagram Protocol (UDP) UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications. Post office Protocol (POP) POP3 is designed for receiving incoming E-mails. Simple mail transport Protocol (SMTP) SMTP is designed to send and distribute outgoing E-Mail. File Transfer Protocol (FTP) FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc. Hyper Text Transfer Protocol (HTTP) HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly. Hyper Text Transfer Protocol Secure (HTTPS) HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets. SSL - Secure Sockets Layer It is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today. A website that implements SSL/TLS has "HTTPS" in its URL instead of "HTTP." TLS - Transport Layer Security It is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website. TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). In this article we will focus on the role of TLS in web application security. TLS was proposed by the Internet Engineering Task Force (IETF), an international standards organization, and the first version of the protocol was published in 1999. The most recent version is TLS 1.3, which was published in 2018. Telnet Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer. Gopher Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle. Protocols used by SAP Common Programming Interface for Communication (CPI-C) SAP uses Common Programming Interface for Communication (CPIC) protocol to transfer data between systems. CPIC is an SAP specific protocol. Open Data Protocol (OData) The Open Data Protocol (OData) is a standardized protocol for exposing and accessing information from various sources. OData is based on core protocols, including HTTP, AtomPub (Atom Publishing Protocol), XML, and JSON (Java Script Object Notation). MQTT - Message Queuing Telemetry Transport MQTT is a message protocol for machine-to-machine communication (M2M) and IoT. You can use the MQTT source system to set up a connection to an MQTT broker (MQTT server). It is most commonly run over TCP/IP stack, but there are MQTT implementations that use other protocols. The supported communication protocol between SAP S/4HANA and SAP Cloud Platform Enterprise Messaging will be MQTT (over Websocket). With the feature of Enterprise Event Enablement of S/4HANA, you can pass the S/4HANA event to the external systems via the middleware called SAP Cloud Platform Enterprise Messaging. HTTP vs MQTT: HTTP is typically a transient interface in which each request is a short-lived session. MQTT sessions are long-lived. Another important difference is that HTTP operates on a command-response basis. A command gets sent to the server and a response returns. TCP vs UDP | Protocol Comparison Whether your data is transferred quickly and in full depends on which network protocols you use, UDP or TCP. They both do the same job but in different ways. One is more reliable and the other one is faster. TCP (transmission control protocol) is connection-based, so it establishes a connection between the receiver and sender and maintains it while transferring data. It guarantees that the data arrives completely intact. UDP (User Datagram Protocol) is connectionless, so it doesn’t establish a prior connection between two parties. It has the potential to lose data along the way, but in return you’ll have much higher speeds. Reliability TCP: High UDP: Lower Speed TCP: Lower UDP: High Transfer Method TCP: Packets are delivered in a sequence UDP: Packets are delivered in a stream Error Detection and Correction TCP: Yes UDP: No Congestion Control TCP: Yes UDP: No Acknowledgement TCP: Yes UDP: Only the Checksum (Checksum is the final two bytes of the UDP header, a field that's used by the sender and receiver to check for data corruption) Warning : UDP is not recommended for transmitting large files. SSL vs TLS | Protocol Comparison Protocol Evolution : SSL 1.0 > SSL 2.0 > SSL 3.0 > TLS 1.0 > TLS 1.1 > TLS 1.2 > TLS 1.3 SSL (Secure Sockets Layer) Secure Sockets Layer (SSL) is a protocol that encrypts and secures data transmitted over the internet. SSL protects data from being intercepted by hackers and prevents them from stealing personal or financial information. SSL works by: Encryption: SSL encrypts data sent between a browser and a website or between two servers Authentication: SSL authenticates web servers. SSL initiates an authentication process between two devices called a handshake Integrity: SSL digitally signs data to verify that it hasn't been tampered with SSL was introduced by Netscape in 1995 and was the first widely used protocol for securing online transactions. Although it has been replaced by a more updated protocol called Transport Layer Security (TLS), SSL is still commonly used today. TLS (Transport Layer Security) Transport Layer Security (TLS) is a security protocol that encrypts data sent between computers over the internet. It's used to protect data from hackers and ensure that all parties involved in a transaction are who they claim to be. TLS has three main functions: Encryption: Hides sensitive data during transfer Authentication: Verifies the identities of the client and server Integrity: Verifies that data hasn't been tampered with or forged TLS is the most widely used security protocol today. It's primarily used to encrypt communication between web browsers and servers, but it can also secure email and other protocols. TLS handshakes are a multi-step process that involves the client authenticating the server and the client and server exchanging a shared secret. TLS replaced SSL in 2015 after SSL was compromised by vulnerabilities. Most people still use the term SSL because it's more widely known. Protocol Comparison Stands For SSL: Secure Sockets Layer TLS: Transport Layer Security Version History SSL: Replaced with TLS. SSL moved through versions 1.0, 2.0, and 3.0 TLS: Upgraded version of SSL. TLS has moved through versions 1.0, 1.1, 1.2, and 1.3 Algorithm SSL: Supports older algorithms with known security vulnerabilities TLS: Utilizes advanced encryption algorithms (Fortezza algorithm is not supported) Activity SSL: It is now considered deprecated due to significant vulnerabilities TLS: Currently the versions 1.2 and 1.3 are actively used due to its robust security Alert Messages SSL has only two types of alert messages. Alert messages are unencrypted TLS alert messages are encrypted and more diverse Message Authentication SSL: Uses Message Authentication Code (MAC) protocols TLS: Deploys Hashed Message Authentication Code (HMAC) protocols Cipher Suites SSL: Supports older algorithms with known security vulnerabilities TLS: Uses advanced encryption algorithms Handshake SSL: Handshake is complex and slow TLS: Handshake is simplified (it has fewer steps), faster, and more secure Connection SSL: Establishes connection using a port TLS: Establishes connection using protocol Public Cloud Services Comparison Cloud services are application and infrastructure resources that exist on the Internet. Third-party providers contract with subscribers for these services, allowing customers to leverage powerful computing resources without having to purchase or maintain hardware and software. Services Microsoft Azure Amazon AWS Google Cloud Analytics Azure Stream Analytics Amazon Kinesis Cloud Dataflow App Hosting Azure Cloud Services Amazon Elastic Beanstalk Google App Engine Automation Azure Automation AWS Opsworks Compute Engine Management Block Storage Azure Managed Storage Amazon Elastic Block Storage Persistent Disk Cloud Agnostic Container Azure AKS Amazon EKS GKE Cloud Specific Container Azure Container Service EC2 Container Service Container Engine Compliance Azure Trust Center AWS Cloud HSM Google Cloud Plataform Security Computing Virtual Machine Elastic Compute Cloud (EC2) Compute Engine Content Delivery Network (CDN) Azure CDN Amazon CloudFront Cloud CDN DNS Services Azure Traffic Manager AWS Route 53 Cloud DNS Identity & Access Management Azure Active Directory AWS Identity and Access Management Cloud Identity Access Management Key Management Services Azure Key Vault AWS KMS Google Cloud KMS Load Balancing Load Balancing for Azure Elastic Load Balancing Cloud Load Balancing Log Monitoring Azure Operational Insights Amazon CloudTrail Cloud Logging NoSQL Database Options Azure DocumentDB AWS DynamoDB Cloud Datastore Notifications Azure Notification Hub Amazon Simple Notification Service - Object Storage Azure Blob Storage Amazon Storage (S3) Cloud Storage Performance Monitoring Azure Application Insights Amazon CloudWatch Stackdriver Monitoring Private Connectivity Azure Express Route AWS Direct Connect Cloud Interconnect Relational Database Azure Relational Database Amazon RDS Cloud SQL Scaling Options Azure Autoscale Auto Scaling Auto Scaler Serverless Computing Azure Functions AWS Lambda Google Cloud Functions Virtual Network Azure Virtual Network Amazon VPC Cloud Virtual Network References: Palo Alto Networks (www.paloaltonetworks.com ); Wikipedia (www.wikipedia.org); Google (www.google.com ); Oracle (www.oracle.com ); Raspberry PI (www.raspberrypi.org ); Microsoft (www.microsoft.com ); CloudFlare (www.cloudflare.com ); NordVPN (nordvpn.com )

background.avif
© 2025 SAP NFe. All Rights Reserved.
bottom of page