How to switch from SAP Enterprise Threat Detection to the Cybersecurity Extension for SAP, Part 6

The Cybersecurity Extension for SAP provides an alternative to SAP Enterprise Threat Detection (ETD) for SAP vulnerability management, threat detection, and custom code security. The Cybersecurity Extension for SAP is developed by Layer Seven Security. Layer7 is an SAP partner and competitor of SAP ETD. This guide will help you plan for the transition from SAP ETD to the Cybersecurity Extension for SAP. Once you have transitioned from SAP ETD, you can remove the SAP ETD consoles and sensors from your SAP landscape, as well as the SAP ETD users and addons in your SAP systems. 

Unlike SAP ETD, the Cybersecurity Extension for SAP is an addon for SAP Solution Manager. Solution Manager is a monitoring and diagnostics platform widely used by SAP customers for application lifecycle management. Over 12,000 SAP customers worldwide are actively using Solution Manager to manage their SAP systems. Usage rights for Solution Manager are included in SAP support.

The Cybersecurity Extension for SAP requires the standard setup of Solution Manager. This guide will help you review your Solution Manager setup and prepare your platform to ensure a smooth transition from SAP ETD to the Cybersecurity Extension for SAP.

Check Managed System Configuration

The Cybersecurity Extension for SAP requires the completion of Managed System Configuration for each target system. Execute transaction SOLMAN_SETUP or navigate to work center SAP Solution Manager Configuration – Configuration (All Scenarios). Click on Managed System Configuration in Cross Scenario Configuration. Highlight a relevant system in the Technical Systems tab and select Configure System – Full Configuration. Confirm the status of all steps in Managed System Configuration is green (completed). Follow the guided procedures for Managed System Configuration to perform steps that are red or yellow (incomplete).

The following Automatic and Manual Activities are not required in Finalize Configuration:

Setup Single Sign-On
Activate E2E Trace Upload Service
Introscope Host Adaptor
Apply Settings for EWA Monitoring
Byte Code Adaptor Installation (Java Systems)
Enable Remote R/3 Connection

The status of the steps Maintain Users, Finalize Configuration and Check Configuration can be yellow.

Repeat the steps for each target system.

Next: Check System Monitoring >>>

Leave a Reply

Your email address will not be published. Required fields are marked *