You can monitor file or database requests to non-CICS resources. Many applications use files or databases that are not under the control of CICS. The MEI can be used to monitor non-CICS file requests.
Follow these steps:
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |