SlideShare a Scribd company logo
SI710 IT Management
Professor: Eng. Ronald Mejía
ITIL 4 - Practices
A practice is a set of organizational resources designed to get a job done or
accomplish a goal. These resources are grouped into the four dimensions of
service management.
2
Service Desk
The purpose is to capture the demand for resolution of incidents and
service requests.
It is the only point of contact for all Users to provide the services.
How the Service Desk works
1st level
Service Desk
Team Resident
Technicians
servers
Database
Communications
Operations
Software
maintenance
2nd / 3rd Level
Support Teams
HW and SW
providers
call center
Service Portal
Email
Corporate
Headquarters
chatbot
Service Desk
• This practice is managed and deployed by
multiple physical teams working in shifts,
virtually connected people, automated
technology, and bot. The functions are the
same regardless of the model adopted.
• A key point to understand is that no matter how
efficient the service desk and its people are,
there will always be issues that need to be
escalated and supported by other teams.
• Support teams need to work closely with the
service desk to provide a solution that
includes users and customers
Activities (PROCESS)
1. Reception and registration
2. Prioritize and Classify
3. Diagnosis and solution by the first level
4. Escalate to responsible group
5. Order Tracking
6. Inform the user of the status of their order.
7. Inform the solution and confirm user’s
satisfaction.
8. Close the order
9. Service survey
(PEOPLE)
1. Soft skills: effective communication,
empathy, willingness to serve, negotiation
with users, etc.
2. Technical knowledge: at an intermediate
level, technologies used in the company,
analytical capability, etc.
3. Permanent training.
4. Roles: manager, supervisors, analysts,
etc.
5. Support teams: to escalate request not
resolved at 1st level.
Service Desk (Capture User demand) - Resources (4P’s)
Technology (PRODUCT)
1. chatbot
2. Customer service system
3. Telephone systems
4. PC, mobile, phones, etc..
5. Knowledge base / Known errors
6. Remote access sw / Diagnostic tools
7. Service catalogue
SUPPLIER/PROVIDERS
1. Providers of technology used in the
company
2. Service level agreements SLA's.
3. formal contract
4. Budget
7
Service Desk
• Prepare reports of the requests received and quality of care.
• Provide information to IT Management to improve service management.
• Give information that helps user training programs.
• Support to identify problems.
• Metrics:
 Call abandonment rate
 Percentage of calls resolved by the first level of care.
 Average incident solution time
 Average cost of care per incident
 Percentage of services within the agreed SLA
 average call time
Service Desk - dashboard
9
ACTIVITY #02: Building a Service Desk (45 min.)
• Work in groups, follow instructions provided in the activity document.
Upload your document in Blackboard.
Incident Management
• Incident: Unplanned interruption or reduction in quality of Service.
• The purpose of incident management practices is to minimize the negative
impact of incidents in order to restore normal service operation as quickly as
possible.
Examples:
• uPlanner is very slow.
• Blackboard Collaborate is down.
• Internet access is not available.
• My PC is inoperative.
• Etc.
Incident Management
• Purpose of Incident Management:
o Restore the affected service, as soon as possible and according to the
priority for the business and the respective agreed service levels.
o Minimize the impact of an incident on the business.
o Keep the user informed about the status of an incident: estimated solution
times, escalations, etc.
o Ensure compliance with service levels: quality, times, availability.
o Identify service improvements proactively.
o Collect service management information.
Incident Management
Life cycle of an incident:
1. Detection and Registration
o User notification can be done in several ways.
o The proper recording of incident information can greatly help the efficiency of the
incident solution process: data to speed up the solution, attention process, data for
service statistics, etc.
2. Classification and Initial Support
o The service desk determines the priority based on the impact and urgency of the
incident. The incident is handled according to the corresponding SLA.
o Categorization: hardware, software, networking, etc.
o Consult knowledge base: known problems, details of setup item (CI), change history,
etc.
o If possible, direct a temporary or permanent solution.
o Notify Problem Management of new problems.
o If it is a service request, route it according to the appropriate procedure.
Incident Management
Life cycle of an incident:
3. Research and Diagnosis
o If necessary, other support groups initiate the analysis of the incident to find a
permanent solution or a workaround. Includes involved providers.
o Unclosed incidents are escalated to the following support levels.
o Resolved incidents go to service desk for your closure.
4. Resolution and Recovery.
o The temporary or definitive solution is provided.
o If necessary, recovery actions are executed by the service desk or by other support
levels.
o If necessary, a request for change (RFC) is sent.
5. Incident Closure
o Once the corrective measures have been applied and the service restored, the group
that has applied the solution informs the Service Desk.
o The Service Desk confirms user compliance and closes the incident.
Throughout its life cycle, an incident is owned by a person in charge of the Service Desk
(ServiceManager), which monitors the solution process, supports coordination with other
support groups, escalation and keeps the user informed about the service process.
14
• Incident Prioritization:
o It is evaluated together with the user and determined based on the impact
and urgency of the incident.
o Impact: effect of the incident on business activities.
o Urgency: Speed ​
​
with which the incident needs to be resolved.
o Consider:
o Cost of no solution
o Risk or damage to the user
o legal implications
o Customer Interrupt
o Depending on the priority, the dedication of the support groups required
for the solution, money and time spent are determined. Lower priority
incidents may need to be delayed or dropped.
Incident Management
15
Incident Management
• Incident Escalation:
o Horizontal: for specialized knowledge support
o Vertical: at any time, so that the respective authority helps as required
(serious problems or when the SLA will not be met)
Activities (PROCESS)
1. Reception and registration
2. Prioritize and Classify
3. Diagnosis and solution by the first level
4. If not resolved, escalate to responsible
Support team.
5. Order Tracking
6. Provide temporary or definitive solution to
restore service
7. Inform the user of the status of their order.
8. Inform the solution and confirm user’s
satisfaction.
9. Close the incident
10.Service survey
(PEOPLE)
1. Soft skills: effective communication,
empathy, willingness to serve, negotiation
with users, etc.
2. Technical knowledge: technologies and
information systems used in the company,
analytical capability, etc.
3. Permanent training.
4. Roles: BD’s OS’s, support teams,
Networks, Security, Applications, etc.
Incident Management (Restore the Service) - Resources (4P’s)
Technology (PRODUCT)
1. Request attention system
2. Specialized SW for diagnosis and
management of technologies:BDs,
Networks, Security,etc
3. Knowledge DB.
4. monitoring software
SUPPLIER/PROVIDERS
1. Contracts with Providers of technology
used in the company
2. Service level agreements SLA's.
3. formal contract
4. Budget
17
• Example Fields of an incident record:
o Unique identifier.
o Classification
o Incidence date.
o User who reports
o Contact details.
o Symptoms
o Impact, urgency and priority.
o Configuration items afectados.
o Assigned support staff
o Related known issue or bug.
o Date of resolution
o Details of user interactions: queries and responses.
o Response dates.
Incident Management
pc
printer
pc
printer
pc
Printer
Service Desk / Incident Management
(Restore Service)
1. Receive and register
2. Classify and prioritize
3. Support
Solving Incidents and Problems
APPLY A TEMPORARY SOLUTION THAT
RESTORES SERVICE BUT DOES NOT IDENTIFY
OR FIX THE CAUSES OF THE INCIDENT 
WORKAROUND
HIDDEN CAUSE THAT CAUSES ONE OR
MORE INCIDENTS-- PROBLEM
PROBLEM MANAGEMENT: To identify
and solve unknown causes of one o more
incidents.
Alternatives to restore Service:
A. Send technician to repair equipment.
(50 min, high impact)
B. Replace by backup unit. (25 min,
medium impact)
C. Share neighbor printer. (10 min, low
impact)
X
Problem Management
• Problem: A cause or potential cause of one or more incidents.
• Known error: A problem that has been analyzed but is not resolved.
• workaround: Solution that reduces or eliminates the impact of an incident or
problem because a definitive solution is not yet feasible.
• The purpose of problem management is to reduce the probability and impact of
incidents, through the identification of actual or potential causes of incidents, and
managing workarounds and known errors.
Incident
Management
Incident Management
Restore service as soon as possible
Problem Management
Identify and correct causes
Change management
Implement changes to eliminate
problems and known errors
proactive
Reactive
Change
Management
RFC
Change
Implementation
permanent
solution
Problem
Control
Error Control
Proactive
problem
management
Problem Management
Problem Management
1. ID: major incidents that have been closed,
incident trend analysis, potential problem
reports, incidents closed with a workaround.
2. Classification: collect data to classify and
prioritize the problem. (symptoms, causes,
related incidents, CI’s, workaround, SLA’s that
apply, impact and affected users, estimated
solution time, urgency.
3. Assign resources: categorize and prioritize
the problem to allocate the required
resources. It allows to have these with the
greatest positive impact on the business.
4. Research and diagnosis: to detect the root
cause of the incident. To review workaround
used, changes to the affected CI, etc.
5. Set known error: once the root cause is
identified, the known error is logged and
escalated to error control.
Problem Manager monitors the process.
Problem Control
Problem Management
Logs and manages known errors until the
change that resolves the root cause is
implemented:
1. Identification and registration: known
error status is assigned when the root
cause of the problem is detected.
2. Error evaluation: determination of the
solution of the error with specialist staff.
The evaluation process, the symptoms
and the solution found must be log to be
consulted in future problems and
investigations.
3. Registration of the solution: registration
of solution is completed, a RFC is
prepared for the change control process
and this is loged in the Problems DB. The
following activities to implement the
solution are in charge of Change Control.
4. Error Closure: After implementation of
change and verification that error is gone,
error, problem, and related incident are
closed.
Error Control
Problem Management
It is responsible for identifying and solving problems before these originate incidents:
• Trend analysis: review of incidents and problems that have occurred can provide
information to improve the service (occurrences after a change, repeated incidents
with a given CI, user training, etc.).
• Preventive support actions: trend analysis can identify CI’s for which it is required to
direct resources from support staff to make improvements.
• Inform the organization:problem management allows you to inform the organization
about the health of IT services and make decisions about it. (ex. SLA’s)
By redirecting the IT organization's effort from handling large numbers of incidents to
incident prevention, you will improve service quality and more efficient use of IT
Proactive Problem
Management
Situation: Socrates hangs himself every end
of the month.
Service Desk + Incident Management
1. Receive and record incident (SDESK)
2. Classify and prioritize (SDESK)
3. initial support
4. Escalate to the database Support team..
5. Diagnosis
6. Apply workaround (restart DB Server)
7. They close the incident after validating compliance
Example: a Bank Customer Service application crash every end of month
Problem Management
8. Register a Problem
9. Identify root cause of the incident(problem control): Tests,debugging, review
logs,dump, resource monitoring, etc. It is identified that in moments of high
transactionality, the database's RAM memory is saturated due to a bug in the Socrates
code. (Known error)
10.Identify the best solution to the known error(Error control): a)fix Socrates code (1
week, $0, medium risk); b)Upgrade DB server HW (30 days, 10K, low risk); c) Upgrade
the DB version (15 days, 0 dollars, low risk)---Enter an RFC (Request forChange)-
change control
11.Execute the change that fix the known error, close the problem.
Service Request Management
• Service Request: request from a user or an authorized representative of the users to initiate a
service action that has been agreed as a normal part of the provision of the Service
• The purpose of service request management is to support the agreed quality of a service by handling
all predefined and user-initiated service requests in an effective and user-friendly manner.
Service Request Management
• Each service request may include one or more of the following:
o Request for provision of service, for example: providing a report or replacing a
cartridge in a printer.
o Request for information: how to create a document or what are the hours of
some offices.
o Request to provide a resource or service, example: provide a phone, laptop or
some virtual server for a development team.
o Request for access to a resource or service: provide access to a route or folder.
o Feedback: complaint about a new interface or acknowledgment to a support
team.
• Unlike an incident, which is unplanned in nature, a request for services can
often be planned into your care:
o Requirements to meet
o Responsible staff
o Standard attention times
o Escalation levels
27
Service Request Management
• Service requests should be grouped into predefined categories with a
standard service procedure:
• Available through a catalog of requests: installation of additional SW, movement of equipment,
change of passwords, etc
• Pre-established costs.
• Required Authorization Levels
• Purchasing procedure / implementation
• Considerations:
• The types of requests available, costs, approval levels and attention times must be formalized.
• They must be accessible as part of the catalog of IT services
• Standardized procedure for attention.
• Single point for your request, usually through the Service Desk
28
Cisco
3640
Optical Mux
16X2
Main office
vpn-ip
Bank A
Cisco
2620
30Ch voice
4 LBW
2Mbps
512Kbps
SWITCH
CATALYST
4006
C
Apeseg
Inter-LAN
64Kbps
64Kbps
PBX
company x
RS232
DigiRed
128Kbps
CAR GOLD: 512
Kbps
SILVER CAR: 1554
Kbps
TACNA
Branch 1
LAN
1ch voice
Cisco
1750
1 BRI
CAR GOLD: 16 Kbps
SILVER CAR: 48
Kbps
64Kbps
TRUJILLO Lead Agency
Cisco
3640
SWITCH
ATM
30Ch
voice
1
BRI
mux
Optical
4x2
PBX
converter
2Mbps
CAR GOLD: 512
Kbps
SILVER CAR: 1024
Kbps
128Kbps
converter
INTERNET
firewall
PIX
525
Cisco
1750
LAN
2ch voice
1 BRI
CAR GOLD: 32 Kbps
CAR SILVER: 96
Kbps
128Kbps
Cisco
1750
LAN
2ch voice
1 BRI
CAR GOLD: 32 Kbps
CAR SILVER: 96
Kbps
128Kbps
yesBranch 2
LAN
1ch voice
Cisco
1750
1 BRI
CAR GOLD: 16 Kbps
SILVER CAR: 48
Kbps
64Kbps
Branch 5
2ch voice
Cisco
1750
1 BRI
Branch 3
LAN
1ch voice
Cisco
1750
1 BRI
CAR GOLD: 16 Kbps
SILVER CAR: 48
Kbps
64Kbps
LAN
128Kbps
CAR GOLD: 32 Kbps
CAR SILVER: 96
Kbps
Branch 4
LAN
1ch voice
Cisco
1750
1 BRI
CAR GOLD: 16 Kbps
SILVER CAR: 48
Kbps
64Kbps
Event monitoring and management
Event monitoring and management
• Event: Any change of state that is important for the management of a service or another
configuration item. Events are typically identified through notifications created by an IT service, CI,
or monitoring tool.
• The purpose of event monitoring and management is to systematically observe service components
and record and report state changes identified by events.
• This practice must identify and prioritize infrastructure events, services, business processes and
information security.
• It also establishes an appropriate response to them, including those that may cause an incident.
Event monitoring and management
• The events are classified:
o Informative: events that do not require action at the time they are identified
but analyzing the data collected from them at a later date, allows take actions to
improve the service
o Warning: They allow action to be taken before a negative impact on the business
is experienced.
o Exception: Indicates that a violation of an established standard has been
identified. This event requires action even though the business impact has not
yet materialized.
• Event Management is applied to a series of aspects:
• state of the Configuration items: on/off, active/inactive, etc.
• Environmental conditions: temperature, fire, smoke.
• Use of SW licenses
• Security (intrusion detection)
• Activity level: response times, transactions/sec, etc.
• It is implemented through monitoring tasks and automated control tools.
Event monitoring and management
• Activities:
o To identify: services, systems, CI's, etc. should be monitored and how.
o Implement and maintain: monitoring procedures.
o Establish and maintain: thresholds and other criteria whose changes must be
treated as events and their respective classification.
• Establish and maintain: policies to apply to each type of detected event, related
to ensure an adequate response.
• Automate: thresholds, criteria and monitoring policies
• Event Management considers:
• Clearly defined and communicated roles and responsibilities are critical. .
• Automation is key to the effectiveness of this practice.
• Providers involved must be included.
• It is implemented through monitoring tasks and automated control tools, own or third
parties.
32
ACTIVITY #03: Diagnose and Improve IT Services (45 min.)
• Work in groups, follow instructions in the activity document. Enter the
document you have worked on in the respective Blackboard activity.
33
Thanks for your
attention

More Related Content

PDF
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
PPT
ITIL v3 overview from Kent State University
PPT
6 itil v3 service operation v1.8
PPT
Deal With Production Issues - The ITIL Way
PPTX
ITIL # Lecture 8
PPTX
PDF
Overview to itil
PPT
Service operations
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL v3 overview from Kent State University
6 itil v3 service operation v1.8
Deal With Production Issues - The ITIL Way
ITIL # Lecture 8
Overview to itil
Service operations

Similar to ITIL 4 - Practices | Slides UNIVERSIDAD PERUANA DEA CICENCIAS APLICADAS (20)

PPTX
Ict service desk team meeting
PPT
Incident Management
PPTX
ITIL Service Operation
PPTX
Introduction To ITIL Slide Share
PDF
ITIL Implementation – Value addition to the IT industry
PDF
ITIL Incident Management Workflow - Process Guide
PDF
Service Operation Processes
PDF
Incident Management - Obtaining Our #1 Objective
PPTX
[Webinar] 3 Ways to Manage & Reduce Incidents
PPT
ITIL V3 by Jisu Dasgupta
PPT
Iti Lprocessmgmt
PDF
Incident Management Powerpoint Presentation Slides
PPT
ITIL Practical Guide - Service Operation
PPT
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
PPTX
Itism.v20160321.2eng public
PPTX
pm_training_-_process_tool_v1.4.pptx
PPTX
ITIL(v3): A Beginers Guide
PPTX
Respond to and troubleshoot production incidents like an sa
PPTX
ITSM Training on priority of taasks.pptx
PDF
Incident Management Magnifying Glass Priority Matrix Process Resolution Assig...
Ict service desk team meeting
Incident Management
ITIL Service Operation
Introduction To ITIL Slide Share
ITIL Implementation – Value addition to the IT industry
ITIL Incident Management Workflow - Process Guide
Service Operation Processes
Incident Management - Obtaining Our #1 Objective
[Webinar] 3 Ways to Manage & Reduce Incidents
ITIL V3 by Jisu Dasgupta
Iti Lprocessmgmt
Incident Management Powerpoint Presentation Slides
ITIL Practical Guide - Service Operation
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itism.v20160321.2eng public
pm_training_-_process_tool_v1.4.pptx
ITIL(v3): A Beginers Guide
Respond to and troubleshoot production incidents like an sa
ITSM Training on priority of taasks.pptx
Incident Management Magnifying Glass Priority Matrix Process Resolution Assig...
Ad

Recently uploaded (20)

PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Occupational Health and Safety Management System
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Artificial Intelligence
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
UNIT 4 Total Quality Management .pptx
Visual Aids for Exploratory Data Analysis.pdf
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Occupational Health and Safety Management System
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Soil Improvement Techniques Note - Rabbi
Artificial Intelligence
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Abrasive, erosive and cavitation wear.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Fundamentals of safety and accident prevention -final (1).pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Ad

ITIL 4 - Practices | Slides UNIVERSIDAD PERUANA DEA CICENCIAS APLICADAS

  • 1. SI710 IT Management Professor: Eng. Ronald Mejía
  • 2. ITIL 4 - Practices A practice is a set of organizational resources designed to get a job done or accomplish a goal. These resources are grouped into the four dimensions of service management. 2
  • 3. Service Desk The purpose is to capture the demand for resolution of incidents and service requests. It is the only point of contact for all Users to provide the services.
  • 4. How the Service Desk works 1st level Service Desk Team Resident Technicians servers Database Communications Operations Software maintenance 2nd / 3rd Level Support Teams HW and SW providers call center Service Portal Email Corporate Headquarters chatbot
  • 5. Service Desk • This practice is managed and deployed by multiple physical teams working in shifts, virtually connected people, automated technology, and bot. The functions are the same regardless of the model adopted. • A key point to understand is that no matter how efficient the service desk and its people are, there will always be issues that need to be escalated and supported by other teams. • Support teams need to work closely with the service desk to provide a solution that includes users and customers
  • 6. Activities (PROCESS) 1. Reception and registration 2. Prioritize and Classify 3. Diagnosis and solution by the first level 4. Escalate to responsible group 5. Order Tracking 6. Inform the user of the status of their order. 7. Inform the solution and confirm user’s satisfaction. 8. Close the order 9. Service survey (PEOPLE) 1. Soft skills: effective communication, empathy, willingness to serve, negotiation with users, etc. 2. Technical knowledge: at an intermediate level, technologies used in the company, analytical capability, etc. 3. Permanent training. 4. Roles: manager, supervisors, analysts, etc. 5. Support teams: to escalate request not resolved at 1st level. Service Desk (Capture User demand) - Resources (4P’s) Technology (PRODUCT) 1. chatbot 2. Customer service system 3. Telephone systems 4. PC, mobile, phones, etc.. 5. Knowledge base / Known errors 6. Remote access sw / Diagnostic tools 7. Service catalogue SUPPLIER/PROVIDERS 1. Providers of technology used in the company 2. Service level agreements SLA's. 3. formal contract 4. Budget
  • 7. 7 Service Desk • Prepare reports of the requests received and quality of care. • Provide information to IT Management to improve service management. • Give information that helps user training programs. • Support to identify problems. • Metrics:  Call abandonment rate  Percentage of calls resolved by the first level of care.  Average incident solution time  Average cost of care per incident  Percentage of services within the agreed SLA  average call time
  • 8. Service Desk - dashboard
  • 9. 9 ACTIVITY #02: Building a Service Desk (45 min.) • Work in groups, follow instructions provided in the activity document. Upload your document in Blackboard.
  • 10. Incident Management • Incident: Unplanned interruption or reduction in quality of Service. • The purpose of incident management practices is to minimize the negative impact of incidents in order to restore normal service operation as quickly as possible. Examples: • uPlanner is very slow. • Blackboard Collaborate is down. • Internet access is not available. • My PC is inoperative. • Etc.
  • 11. Incident Management • Purpose of Incident Management: o Restore the affected service, as soon as possible and according to the priority for the business and the respective agreed service levels. o Minimize the impact of an incident on the business. o Keep the user informed about the status of an incident: estimated solution times, escalations, etc. o Ensure compliance with service levels: quality, times, availability. o Identify service improvements proactively. o Collect service management information.
  • 12. Incident Management Life cycle of an incident: 1. Detection and Registration o User notification can be done in several ways. o The proper recording of incident information can greatly help the efficiency of the incident solution process: data to speed up the solution, attention process, data for service statistics, etc. 2. Classification and Initial Support o The service desk determines the priority based on the impact and urgency of the incident. The incident is handled according to the corresponding SLA. o Categorization: hardware, software, networking, etc. o Consult knowledge base: known problems, details of setup item (CI), change history, etc. o If possible, direct a temporary or permanent solution. o Notify Problem Management of new problems. o If it is a service request, route it according to the appropriate procedure.
  • 13. Incident Management Life cycle of an incident: 3. Research and Diagnosis o If necessary, other support groups initiate the analysis of the incident to find a permanent solution or a workaround. Includes involved providers. o Unclosed incidents are escalated to the following support levels. o Resolved incidents go to service desk for your closure. 4. Resolution and Recovery. o The temporary or definitive solution is provided. o If necessary, recovery actions are executed by the service desk or by other support levels. o If necessary, a request for change (RFC) is sent. 5. Incident Closure o Once the corrective measures have been applied and the service restored, the group that has applied the solution informs the Service Desk. o The Service Desk confirms user compliance and closes the incident. Throughout its life cycle, an incident is owned by a person in charge of the Service Desk (ServiceManager), which monitors the solution process, supports coordination with other support groups, escalation and keeps the user informed about the service process.
  • 14. 14 • Incident Prioritization: o It is evaluated together with the user and determined based on the impact and urgency of the incident. o Impact: effect of the incident on business activities. o Urgency: Speed ​ ​ with which the incident needs to be resolved. o Consider: o Cost of no solution o Risk or damage to the user o legal implications o Customer Interrupt o Depending on the priority, the dedication of the support groups required for the solution, money and time spent are determined. Lower priority incidents may need to be delayed or dropped. Incident Management
  • 15. 15 Incident Management • Incident Escalation: o Horizontal: for specialized knowledge support o Vertical: at any time, so that the respective authority helps as required (serious problems or when the SLA will not be met)
  • 16. Activities (PROCESS) 1. Reception and registration 2. Prioritize and Classify 3. Diagnosis and solution by the first level 4. If not resolved, escalate to responsible Support team. 5. Order Tracking 6. Provide temporary or definitive solution to restore service 7. Inform the user of the status of their order. 8. Inform the solution and confirm user’s satisfaction. 9. Close the incident 10.Service survey (PEOPLE) 1. Soft skills: effective communication, empathy, willingness to serve, negotiation with users, etc. 2. Technical knowledge: technologies and information systems used in the company, analytical capability, etc. 3. Permanent training. 4. Roles: BD’s OS’s, support teams, Networks, Security, Applications, etc. Incident Management (Restore the Service) - Resources (4P’s) Technology (PRODUCT) 1. Request attention system 2. Specialized SW for diagnosis and management of technologies:BDs, Networks, Security,etc 3. Knowledge DB. 4. monitoring software SUPPLIER/PROVIDERS 1. Contracts with Providers of technology used in the company 2. Service level agreements SLA's. 3. formal contract 4. Budget
  • 17. 17 • Example Fields of an incident record: o Unique identifier. o Classification o Incidence date. o User who reports o Contact details. o Symptoms o Impact, urgency and priority. o Configuration items afectados. o Assigned support staff o Related known issue or bug. o Date of resolution o Details of user interactions: queries and responses. o Response dates. Incident Management
  • 18. pc printer pc printer pc Printer Service Desk / Incident Management (Restore Service) 1. Receive and register 2. Classify and prioritize 3. Support Solving Incidents and Problems APPLY A TEMPORARY SOLUTION THAT RESTORES SERVICE BUT DOES NOT IDENTIFY OR FIX THE CAUSES OF THE INCIDENT  WORKAROUND HIDDEN CAUSE THAT CAUSES ONE OR MORE INCIDENTS-- PROBLEM PROBLEM MANAGEMENT: To identify and solve unknown causes of one o more incidents. Alternatives to restore Service: A. Send technician to repair equipment. (50 min, high impact) B. Replace by backup unit. (25 min, medium impact) C. Share neighbor printer. (10 min, low impact) X
  • 19. Problem Management • Problem: A cause or potential cause of one or more incidents. • Known error: A problem that has been analyzed but is not resolved. • workaround: Solution that reduces or eliminates the impact of an incident or problem because a definitive solution is not yet feasible. • The purpose of problem management is to reduce the probability and impact of incidents, through the identification of actual or potential causes of incidents, and managing workarounds and known errors.
  • 20. Incident Management Incident Management Restore service as soon as possible Problem Management Identify and correct causes Change management Implement changes to eliminate problems and known errors proactive Reactive Change Management RFC Change Implementation permanent solution Problem Control Error Control Proactive problem management Problem Management
  • 21. Problem Management 1. ID: major incidents that have been closed, incident trend analysis, potential problem reports, incidents closed with a workaround. 2. Classification: collect data to classify and prioritize the problem. (symptoms, causes, related incidents, CI’s, workaround, SLA’s that apply, impact and affected users, estimated solution time, urgency. 3. Assign resources: categorize and prioritize the problem to allocate the required resources. It allows to have these with the greatest positive impact on the business. 4. Research and diagnosis: to detect the root cause of the incident. To review workaround used, changes to the affected CI, etc. 5. Set known error: once the root cause is identified, the known error is logged and escalated to error control. Problem Manager monitors the process. Problem Control
  • 22. Problem Management Logs and manages known errors until the change that resolves the root cause is implemented: 1. Identification and registration: known error status is assigned when the root cause of the problem is detected. 2. Error evaluation: determination of the solution of the error with specialist staff. The evaluation process, the symptoms and the solution found must be log to be consulted in future problems and investigations. 3. Registration of the solution: registration of solution is completed, a RFC is prepared for the change control process and this is loged in the Problems DB. The following activities to implement the solution are in charge of Change Control. 4. Error Closure: After implementation of change and verification that error is gone, error, problem, and related incident are closed. Error Control
  • 23. Problem Management It is responsible for identifying and solving problems before these originate incidents: • Trend analysis: review of incidents and problems that have occurred can provide information to improve the service (occurrences after a change, repeated incidents with a given CI, user training, etc.). • Preventive support actions: trend analysis can identify CI’s for which it is required to direct resources from support staff to make improvements. • Inform the organization:problem management allows you to inform the organization about the health of IT services and make decisions about it. (ex. SLA’s) By redirecting the IT organization's effort from handling large numbers of incidents to incident prevention, you will improve service quality and more efficient use of IT Proactive Problem Management
  • 24. Situation: Socrates hangs himself every end of the month. Service Desk + Incident Management 1. Receive and record incident (SDESK) 2. Classify and prioritize (SDESK) 3. initial support 4. Escalate to the database Support team.. 5. Diagnosis 6. Apply workaround (restart DB Server) 7. They close the incident after validating compliance Example: a Bank Customer Service application crash every end of month Problem Management 8. Register a Problem 9. Identify root cause of the incident(problem control): Tests,debugging, review logs,dump, resource monitoring, etc. It is identified that in moments of high transactionality, the database's RAM memory is saturated due to a bug in the Socrates code. (Known error) 10.Identify the best solution to the known error(Error control): a)fix Socrates code (1 week, $0, medium risk); b)Upgrade DB server HW (30 days, 10K, low risk); c) Upgrade the DB version (15 days, 0 dollars, low risk)---Enter an RFC (Request forChange)- change control 11.Execute the change that fix the known error, close the problem.
  • 25. Service Request Management • Service Request: request from a user or an authorized representative of the users to initiate a service action that has been agreed as a normal part of the provision of the Service • The purpose of service request management is to support the agreed quality of a service by handling all predefined and user-initiated service requests in an effective and user-friendly manner.
  • 26. Service Request Management • Each service request may include one or more of the following: o Request for provision of service, for example: providing a report or replacing a cartridge in a printer. o Request for information: how to create a document or what are the hours of some offices. o Request to provide a resource or service, example: provide a phone, laptop or some virtual server for a development team. o Request for access to a resource or service: provide access to a route or folder. o Feedback: complaint about a new interface or acknowledgment to a support team. • Unlike an incident, which is unplanned in nature, a request for services can often be planned into your care: o Requirements to meet o Responsible staff o Standard attention times o Escalation levels
  • 27. 27 Service Request Management • Service requests should be grouped into predefined categories with a standard service procedure: • Available through a catalog of requests: installation of additional SW, movement of equipment, change of passwords, etc • Pre-established costs. • Required Authorization Levels • Purchasing procedure / implementation • Considerations: • The types of requests available, costs, approval levels and attention times must be formalized. • They must be accessible as part of the catalog of IT services • Standardized procedure for attention. • Single point for your request, usually through the Service Desk
  • 28. 28 Cisco 3640 Optical Mux 16X2 Main office vpn-ip Bank A Cisco 2620 30Ch voice 4 LBW 2Mbps 512Kbps SWITCH CATALYST 4006 C Apeseg Inter-LAN 64Kbps 64Kbps PBX company x RS232 DigiRed 128Kbps CAR GOLD: 512 Kbps SILVER CAR: 1554 Kbps TACNA Branch 1 LAN 1ch voice Cisco 1750 1 BRI CAR GOLD: 16 Kbps SILVER CAR: 48 Kbps 64Kbps TRUJILLO Lead Agency Cisco 3640 SWITCH ATM 30Ch voice 1 BRI mux Optical 4x2 PBX converter 2Mbps CAR GOLD: 512 Kbps SILVER CAR: 1024 Kbps 128Kbps converter INTERNET firewall PIX 525 Cisco 1750 LAN 2ch voice 1 BRI CAR GOLD: 32 Kbps CAR SILVER: 96 Kbps 128Kbps Cisco 1750 LAN 2ch voice 1 BRI CAR GOLD: 32 Kbps CAR SILVER: 96 Kbps 128Kbps yesBranch 2 LAN 1ch voice Cisco 1750 1 BRI CAR GOLD: 16 Kbps SILVER CAR: 48 Kbps 64Kbps Branch 5 2ch voice Cisco 1750 1 BRI Branch 3 LAN 1ch voice Cisco 1750 1 BRI CAR GOLD: 16 Kbps SILVER CAR: 48 Kbps 64Kbps LAN 128Kbps CAR GOLD: 32 Kbps CAR SILVER: 96 Kbps Branch 4 LAN 1ch voice Cisco 1750 1 BRI CAR GOLD: 16 Kbps SILVER CAR: 48 Kbps 64Kbps Event monitoring and management
  • 29. Event monitoring and management • Event: Any change of state that is important for the management of a service or another configuration item. Events are typically identified through notifications created by an IT service, CI, or monitoring tool. • The purpose of event monitoring and management is to systematically observe service components and record and report state changes identified by events. • This practice must identify and prioritize infrastructure events, services, business processes and information security. • It also establishes an appropriate response to them, including those that may cause an incident.
  • 30. Event monitoring and management • The events are classified: o Informative: events that do not require action at the time they are identified but analyzing the data collected from them at a later date, allows take actions to improve the service o Warning: They allow action to be taken before a negative impact on the business is experienced. o Exception: Indicates that a violation of an established standard has been identified. This event requires action even though the business impact has not yet materialized. • Event Management is applied to a series of aspects: • state of the Configuration items: on/off, active/inactive, etc. • Environmental conditions: temperature, fire, smoke. • Use of SW licenses • Security (intrusion detection) • Activity level: response times, transactions/sec, etc. • It is implemented through monitoring tasks and automated control tools.
  • 31. Event monitoring and management • Activities: o To identify: services, systems, CI's, etc. should be monitored and how. o Implement and maintain: monitoring procedures. o Establish and maintain: thresholds and other criteria whose changes must be treated as events and their respective classification. • Establish and maintain: policies to apply to each type of detected event, related to ensure an adequate response. • Automate: thresholds, criteria and monitoring policies • Event Management considers: • Clearly defined and communicated roles and responsibilities are critical. . • Automation is key to the effectiveness of this practice. • Providers involved must be included. • It is implemented through monitoring tasks and automated control tools, own or third parties.
  • 32. 32 ACTIVITY #03: Diagnose and Improve IT Services (45 min.) • Work in groups, follow instructions in the activity document. Enter the document you have worked on in the respective Blackboard activity.