The Program History Search display (5.4) helps you track the use of programs. Unauthorized use of powerful utilities such as AMASPZAP, IEHATLAS, ICKDSF, and IEHINITT, indicates the need to track programs. Authorized use of these programs should be tightly controlled.
You should also verify the data center backup and recovery procedures by performing history searches on the programs that do the backups, such as CA Disk, CA ASM2, and ADRDSSU. If the programs cannot be located with the use of the Program History Search display, review the procedures.
| Copyright © 2009 CA. All rights reserved. | Tell Technical Publications how we can improve this information |