Previous Topic: Program Comparison

Next Topic: Program Freezer

Program History Search

The Program History Search display (5.4) detects the execution of programs based on records that the system management facility (SMF) collects. You must have read access to SMF files to use this function. If log streams are active, IXG2CON needs read authority to the log streams.

Because SMF exits and options can affect this display, see the Usage Guide for more information.

Auditor___________________________ Location___________________ Page____of____

Approved__________________________ CPU________________________ Date__________

Step

Description

W/P Ref

Finding

Remarks

1

Note the execution of powerful utilities such as AMASPZAP, IEHATLAS, and IEHINITT. Verify that the purpose and use of these utilities was authorized.

 

 

 

2

Detect execution of backup programs such as FDR, FDRDSF, IEHDASDR, ICKDSF, and ADRDSSU. This indicates that the data center follows their backup and recovery procedures.

 

 

 

3

Search for starts and stops of JES2 (HASJES20), JES3 (IATINTK), IMS (DFSMVRC0), and CICS (DFHSIP) to verify that the system availability reports are accurate.

 

 

 

4

Select a sample of programs that ended with nonzero return codes and determine if they ended in error.

Review operator shift logs to ensure that any unusual endings were reported. Look for evidence that the data center investigates problems that are reported.

 

 

 

5

Gather information about abends that you can search for on a program and a job basis using the Job History Search display (4.4).