Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Toad for SAP Solutions 4.2 - Installation Guide

Determine the Best Method to Locate Objects

Toad offers a number of features to assist you in locating objects. The following table provides guidelines based on typical use cases:

If you know the....

Use this...

Column name, but do not know the table name

Use Object Search

String of DDL for an object

Dependency for an object

Uses and Used By tabs in the Database Explorer, and then drill-down to the object from there

Criteria for excluding objects

Filter feature in the Object Explorer

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating