To ensure that all your data is protected and cannot be accessed by anyone else, several mechanisms are available in the system. They are integrated into the Implementation Guide (IMG). In transaction SPRO open the SAP Reference IMG and navigate to the following activities:
.
For more information, see Application Log Viewer
Clean Up Cache and Persistency, Create Cleanup Jobs and Manage Cleanup Jobs.
with the activitiesFor more information, see Periodical Tasks.
.
For more information, see .Metadata Cache
.
Trace and Log Files