Preventing access is not practical.  The standard approach here
would be to use the IEAVTSZR method documented on that ZAD web
page to collect ZAD events and then to use the resulting report
to identify which programs need to be fixed.

Jonathan Scott, HLASM
IBM Hursley, UK

Reply via email to