How To Use Sap Analysis Of Security