Preventing access is not practical. The standard approach here would be to use the IEAVTSZR method documented on that ZAD web page to collect ZAD events and then to use the resulting report to identify which programs need to be fixed.
Jonathan Scott, HLASM IBM Hursley, UK
