You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[SAP Documentation: Starting External Commands and ProgramsLocate this document in the navigation structure](https://help.sap.com/doc/saphelp_nw73ehp1/7.31.19/en-US/4b/2b2bed365474fee10000000a421937/frameset.htm)
36
36
37
-
The SAP BASIS Team and the Security team should co-develop the solution. The SAP BASIS team doesn't have access to the Microsoft Defender portal, and the Security team won't know the specifics of the SAP Batch Jobs and External Commands.
37
+
The SAP BASIS Team and the Security team should codevelop the solution. The SAP BASIS team doesn't have access to the Microsoft Defender portal, and the Security team doesn't know the specifics of the SAP Batch Jobs and External Commands.
38
38
39
39
## Recommended implementation sequence
40
40
@@ -45,7 +45,7 @@ The SAP BASIS Team and the Security team should co-develop the solution. The SAP
45
45
-[Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP](https://aka.ms/mde4sap-linux)
46
46
-[Microsoft Defender for Endpoint on Windows Server with SAP](https://aka.ms/mde4sap-windows)
47
47
48
-
3. The Security team identifies all the SAP servers and runs a query for "InitiatingProcessName" == "sapxpg", noting which servers are starting SAPXPG.
48
+
3. The Security team identifies all the SAP servers and runs a query for `"InitiatingProcessName" == "sapxpg"`, noting which servers are starting SAPXPG.
49
49
50
50
- It is recommended to limit the number of servers running SAPXPG to a minimum and to disallow SAPXPG on most SAP servers.
51
51
- The SAP BASIS team and Security team should limit access to the authorization objects and transaction codes for SAPXPG.
0 commit comments