Besides the ID_STAR selection, you might also look at the GLOBAL, UACC and WARNING checkboxes. Together, these help you find unspecific access paths.
You will also want to play with the Output/run options, in particular the "Summary by member class and profile" will draw your attention to the profiles, whereas the default "Summary by user id" identifies the ... well... users first.
At the end of the detail display (keep hitting S in front of the summary lines) you will see how zSecure determined the access path by comparing access list entries of the profile with connect group entries of the user that accessed the resource:
Current RACF database effect
RACF return code current DB 0
Authority used in current DB ID_STAR
Grp permit used in current DB
RACF Profile type current DB GENERIC
RACF class and profile in DB DATASET CATALOG.DEV
Installation data
Creation/definition date 13 Jun 2018
You might also be interested in options AM.9.4 + 5. These generate a group (if you want), CONNECT and PERMIT commands to grant access to the users that currently gain access through UACC and ID(*). You want to use selection on CLASS, RESOURCE mask and INTENT to use different group names.