Professional Documents
Culture Documents
Unit 6 Service Operation
Unit 6 Service Operation
Unit 6 Service Operation
- Sumit K. Jha
www.process-consultant.blogspot.com
Contents
1. Overview
2. Key Concepts
3. IT Service Operations Mgmt.
4. Event Management
5. Incident Management
6. Request Fulfillment
7. Problem Management
8. Access Management
9. Service Desk
10. Technical Management
11. Application Management
12. IT Operations Management
13. Q & A
Impact
• A measure of business criticality
• Can be measured in terms of no. of users or systems affected
Urgency
• Required speed of resolution
Is based on
Impact
Urgency
Additional consideration
Complexity and scope
Availability of resources
Involve Service Operation (SO) staff in Service Design and Transition; and in
Service Strategy if and when appropriate
Involvement of SO staff will enable continuity between business
requirements, technology requirements and operation
Involvement of SO staff will enable consistency and that meeting of business
and operational requirements
Involvement of SO staff in SD should also be a performance measurement
criteria
Determined by:
Isolating vital signs on components critical for executing VBFs
Seeking attention if the signs are outside the normal range
Event
• A change of state that has significance for management of a CI or IT service
• Alert or notification generated by any IT Service, Configuration Item, or
monitoring tool
Event Management
• The Process responsible for managing Events throughout their lifecycles
• Provided by good monitoring and control systems
Purpose
Determine status of the infrastructure
Detect deviations from normal or expected operation
Provide the entry point for the execution of many Service Operation
processes
Goal
Monitor all events that occur anywhere in the IT infrastructure
Detect and escalate exception conditions
Determine the appropriate control action
Objective
To manage events throughout its lifecycle
Event Occurrence:
Events occur continuously
All events are not detected or registered
Proper understanding of events to be detected is required
Event Notification: Information about CIs are communicated by:-
Polling: Management tool collects required data by interrogating a CI
Notification is generated by a CI when pre-defined conditions are met. This
capability has to be designed and built into the CI.
Event Detection: Generated event notification is either:-Event Filtering
Event Filtering: Used to take either of the following decision
Communication to management tool
Ignoring the event: Event is recorded in a log file on the device, but no further action
is taken
Trigger: Mechanism that initiates a response in case correlation activity detects an event
Response Selection: Selection of an appropriate response out of the available options
Review Action: Reviewing significant events/exceptions to ensure appropriate resolution
Close Event:
Some events remain open till related actions are implemented
Most events are not Opened or Closed
Purpose
Reduction of downtime
Alignment of IT operational activities with business priorities
Identification of service improvement opportunities
Identification of training needs
Goal
Restoration of normal service operations as quickly as possible
Minimizing the adverse impact of incidents on business operations
Provisioning of highest possible level of service quality and availability
Functional Escalation
Transferring of incident from one level to another higher level of support
group
Primarily happens because of lack of skills/expertise/knowledge
Can happen when agreed time of resolution has elapsed
Hierarchical Escalation
Transferring of incident from one level to another level in the hierarchy
Means of requesting intervention by a senior (management)
Can take place at any time mostly because of unsatisfactory resolution
Responsibilities includes
Management of support staff
Managing major incidents
Reporting
Developing, managing/maintaining and undertaking steps to improve:
Incident management process & procedures and its efficiency & effectiveness
Incident management systems
Examples:
Password reset
Request for a document
Shifting of a PC
Purpose
Provisioning of:
Standard services
Requested information
Goal
To provide the means for requisition and provisioning of standard services
Source and deliver required components like license, media, etc.
To provide information related to:
Availability of services
Procedure for requesting for a service
To provide general information
Menu Selection
Self help, shopping basket portal
Financial Approval
Is it in the budget and in line with monetary expectations?
Other Approvals
Other organizations or management approval might be necessary
Fulfillment
Did you get what you ordered?
Closure
Purpose
Ensuring higher availability of IT services
Enabling higher productivity of business and IT staff
Getting better workaround/fixes
Effort and cost reduction for resolving repeat incidents
Goal
Minimise adverse impact of incidents and problems on business
Prevent recurrence of incidents
Determine root cause of incidents and provide resolution for the same
Objective
Prevent problems and resulting incidents from occurring
Eliminate recurring incidents
Minimise impact of incidents that can not be prevented
Sumit K. Jha www.process-consultant.blogspot.com
Problem, Error & Known Error
Problem
A cause of one or more incidents
for which the root cause is not
known
Error
Should allow
Fast and accurate data retrieval
Uniqueness of data (no duplicate record)
Responsibilities includes:
Liaison with:
All problem resolution groups to ensure swift resolution of problems
Suppliers, contractors, etc., to ensure that third parties fulfill their
contractual obligations for resolving problems and providing problem-
related information and data
Owner and protector of the Known Error Database
Gatekeeper for the inclusion of all Known Errors and management of search
algorithms
Formally closing all Problem records
Arranging, running, documenting, and all follow-up activities relating to Major
Problem Reviews
Purpose
Execute the policies and actions defined in:
Security Management
Availability Management
Goal
Provide right for users to enable them to use a service or group of services
Objective
Grant access and rights to users for using a service
Provide access only to allowed areas; access restriction
Manage CIA of organization’s data and IP
Identity
Unique information about a users status within an organization
Rights
The privileges and rights that a user has to access services and information
such as document read/write privileges
Services
Typically certain “role” within a company has access and rights to a certain
portfolio of services and tools
Directory Services
Specific tool that manages access and rights for users
Requesting Access
Typically initiated from HR (new employee) RFC or a Service Request
Verification
Verify the user identity and rights to use a particular service
Providing Rights
Grant user access to their assigned services, according to company policies
Monitoring Identity Status
Job changes, death, resignations, can change a users status
Logging and Tracking Access
Track and report any unauthorized attempts at accessing restricted services
or information
Removing or Restricting Rights
Revoke rights due to job change, deaths, terminations, etc.
Business Goals
IT SERVICE
IT
Infrastructure
Call Centre
Professionally handles large call volumes
Telesales
Help Desk
Manages, coordinates, and resolves incidents as quickly as possible
Ensures that no request is lost, forgotten, or ignored
Service Desk
Extends the range of services available with a Help Desk
Allows business processes to be integrated into the Service Management
infrastructure
Provides an interface for other ITIL activities
Centralized
Local Virtual
Advantages
Aids communication where ever
language, cultural, or political
differences exist
Visible presence
Serves several time zones
Provides support to specialized
groups of users
Disadvantages
Can be inefficient
Can be expensive to staff
Sumit K. Jha www.process-consultant.blogspot.com
Centralized Service Desk
Advantages
Reduces number of Service Desks
Can be more efficient
Can be more cost effective
Can lead to higher skill levels
Disadvantages
More difficult to support different
time zones
No (or limited) local presence
Language, cultural, and political
issues are more likely
Advantages
Work-from-home option
Outsourcing
Off-shoring
Follow-the-sun coverage
Disadvantages
More difficult to ensure consistency and
uniformity
Language, cultural, and political issues
can be difficult to address
Key Advantage
Relatively lower cost
Challenges:
Need to maintain common processes,
tools, shared database
Shift handover
Language, cultural, and political issues can
be difficult to address
Well controlled escalation process
Sumit K. Jha www.process-consultant.blogspot.com
Sources Of Tickets
Recorded
Fugitive
Operational
Telephone Fax Voice Mail E-Mail Browser Events
SERVICE
DESK
Super User
Liaison with IT in general and the Service Desk in particular
Can filter requests and issues raised by the user community
May be involved in:
Staff training for users in their area
Providing support for minor incidents or simple request fulfillment
New releases and roll-outs
Is not a replacement for the Service Desk
Defines:
Roles of support groups
Required tools
Required processes
Required procedures
Sumit K. Jha www.process-consultant.blogspot.com
Roles
Mainframe team
Server team (Unix Server, Wintel Server)
Storage team
Network Support team
Desktop team
Database team
Middleware team or department
Directory Services team
Requirements
Design
Build
Deploy
Operate
Optimize
Sub-Functions
IT Operations Control
Facilities Management
IT Operations Manager
Shift Leads
IT Operations Architects
IT Operators
Q1. For which of the following activities is the Service Desk NOT responsible?
a) Impact analysis
b) Root cause identification
c) Categorization and prioritization
d) Escalation
Q2. Which of the following situations could be a valid reasons for the Service Desk to invoke escalation
procedures?
a) An incident exceeds the downtime stipulated within a SLA
b) The business impact of an incident changes due to unforeseen circumstances
c) The number of users impacted by an incident is greater than first thought
d) A senior manager in the Customer’s organization complains about the lack of progress being made
on a particular incident
Q4. The Service Desk has handled 2317 calls this month. What would these calls include?
a) Modifications to Service Level Agreements (SLAs)
b) Notices regarding modified Configuration Items (CIs)
c) Requests to the IT organization for user support
Q7. A user complains to the Service Desk that an error continually occurs when using a specific
application. This causes the connection with the network to be broken. Which ITIL process is
responsible for tracing the cause?
a. Availability Management
b. Incident Management
c. Problem Management
d. Release Management
Q8. List three major categories of centralized user contact for Service Support.
Q12. Which of the following BEST describes the purpose of Event Management?
a) The ability to detect events, make sense of them and determine the appropriate control action
b) The ability to implement monitoring tools
c) The ability to monitor and control the activities of technical staff
d) The ability to report on the successful delivery of services by checking the uptime of infrastructure
devices
Q13. Which of the following BEST describes a Local Service Desk structure?
a) A Service Desk that also provides onsite technical support to its users
b) A Service Desk where analysts only speak one language
c) A Service Desk that is situated in the same location as the users it serves
d) A Service Desk that could be in any physical location but uses telecommunications and IT systems
to make it appear that they are in the same location
Q1. b
Q2. All four
Q3. None
Q4. c
Q5. a
Q6. c
Q7. c
Q8. Call Center, Help Desk, and Service Desk
Q9. Local, Centralized, and Virtual
Q10. a
Q11. c
Q12. a
Q13. c