TCE streamlines the TSO/ISPF experience for z/OS System Programmers, guiding them through tasks to meet best practices. It balances productivity and security needs, compensating for weaknesses in Legacy Security Manager processes. By addressing issues like JCL alterations and access control, ICE/TCE enhances z/OS configuration control and accountability, ensuring system integrity.
TCE encourages best practices
Supporting and maintaining z/OS is intricate, but there are clear best practices. However, human error is common, and adherence to these practices can slip. Does your team always take backups, test changes, review histories, document changes, and notify relevant parties? Neglecting these steps can jeopardize z/OS integrity or availability. TCE automates tasks, aiding both experienced and new system programmers, reducing errors and system impact.
Journal Access
The ICE Journal Captures Controlled Events; these options bring them to you.
Control Boundaries
Control Boundary Intercept Points, Admin, Audit and Global Functions
z/OS Inspections
z/OS Inspections, Sysplex/ICEBATA/IPLCheck Inspections and IBM HealthChecks