Posted By
Linnea Sullivan
Tue April 18, 2023 01:20 PM
Found In
Egroup:
IBM Security Z Security
\
view thread
Rob, we been trying out everyone's suggestions, but so far we think your suggestion fits the best. But we did notice something and did not know if it was intentional or an oversight. If we compare the base to the target, we see the target contains USERIDs that do not exist on the base. We think the IDs ...
|