>What if the ISPF user sets their primary and secondary LOG pages both to zero, >no log?
IT is sometimes just the task of finding the correct wrench to drive in the proper nail. Using the ISPF log as a security tool is such a task. RACF can authenticate. SMF can journal. - Too busy driving to stop for gas! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html