Just to refine what Elardus has recommended. You can turn on audit in RACF and see who's hitting them. Check PROCLIBs and SYSPROCs/SYSEXEC for occurrences. With ISRDDN check to see if they're LINKLST'd or APFLST'd. In ISPF browse have the option to sort on columns. Something like 'SORT LNKED D|A' just to see if they've been actively modified. In a message dated 5/18/2016 2:03:24 A.M. Central Daylight Time, [email protected] writes:
You can buy expensive audit software which can scan your volsers for unlicensed software. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
