• Looking at what has been done in queries, stored procedures etc is a good start, the fact that nothing is documented is someone looking to protect themselves! Another port of call may be indexes as these may give a clue as to what should be happening and also query plans.

    ...