Professional Documents
Culture Documents
ITIL 4 Foundation-Session4-Lobna Alkomy
ITIL 4 Foundation-Session4-Lobna Alkomy
LOBNA AL-KOMY
ITIL® PRACTICES
7 Key Other
Examinable Examinable
Practices Practices
GENERAL MANAGEMENT PRACTICES (14)
1. Architecture management
2. Continual improvement (Key)
3. Information security management
4. Knowledge management
5. Measurement and reporting
6. Organizational change management
7. Portfolio management
8. Project management
9. Relationship management
10. Risk management
11. Service financial management
12. Strategy management
13. Supplier management
14. Workforce and talent management
SERVICES MANAGEMENT PRACTICES (17)
1. Availability management
2. Business analysis
3. Capacity and performance management
4. Change control (Key)
5. Incident management (Key)
6. IT asset management
7. Monitoring and event management
8. Problem management (Key)
9. Release management
10. Service catalogue management
11. Service configuration management
12. Service continuity management
13. Service design
14. Service desk (Key)
15. Service level management (Key)
16. Service request management (Key)
17. Service validation and testing
TECHNICAL MANAGEMENT PRACTICES (3)
1. Deployment management
General
Practices • Continual Improvement
1- CONTINUAL IMPROVEMENT
Organization attributes
Internal origin
but continual improvement is everyone’s responsibility.
•
Engage customers, suppliers, partners, and other stakeholders as appropriate.
Environment attributes
External origin
• Choose the most appropriate ones for your organization, Methods and techniques include:
• LEAN methods focus on waste reduction
• Agile methods focus on iterative improvement
• DevOps methods focus on working holistically and successful implementation
O
Opportunities
T
Threats
• Balanced Scorecard
• SWOT (Strengths, Weaknesses, Opportunities, Threats) Analysis
CONTINUAL IMPROVEMENT REGISTER
Continual Improvement Register (CIR)
A structured database or document used to track and manage improvement opportunities.
SLA Requirements:
Customer Engagement and Feedback
• Engagement is needed.
• Listening is important.
• Customer engagement questions:
• What does your work involve?
• How does technology help you?
Metric: A measurement or calculation that is • What are your key business times, areas, people, and activities?
monitored or reported for management and improvement. • What differentiates a good day from a bad day for you?
• Operational metrics
• Which of these activities is most important to you?
• Low-level indicators of various operational activities:
• What are your goals, objectives, and measurements for this year?
• System availability
• Incident response and fix times • What is the best measure of your success?
• Change and request processing times • How do you base your opinion and evaluation of a service or IT/technology?
• System response times • How can we help you more?
• Business metrics • Customer feedback methods:
• Any business activity that is deemed useful or valuable by the customer: Surveys Business Other
metrics methods
• Successful completion of a business activity
3- CHANGE CONTROL
• Purpose Change: The addition, modification, or removal of anything that could have a
• Maximize the number of successful IT changes. direct or indirect effect on services.
• Assess risks properly
• Authorize changes to proceed • Changes could affect a service directly or indirectly.
• Manage a change schedule
• Scope defined by each organization but generally includes changes to:
• Balance the need to make beneficial changes • IT infrastructure
from the adverse effect of changes.
• Applications
• Documentation
• Change Authority:
• Processes
• Correct for each kind of change
• Decentralized in high velocity organizations • Supplier relationships
• Anything else that might impact a product or service
Deliver additional value Vs. The need to protect customers and users
CHANGE TYPES
Change Schedule
Normal changes Use standard process to schedule, assess, and authorize change. • Provides information about changes as needed for:
• Change models determine the roles for assessment and authorization.
• Incident Management
• Initiation of a normal change is triggered by the creation of a change request.
• Organizations that have an automated pipeline for continuous integration and continuous deployment (CI/CD) • Problem Management
often automate most steps of the change control process. • Continual Improvement
Emergency changes Must be implemented as soon as possible. • Supports risk assessment to gather input from
• Not typically included in a change schedule. many stakeholders.
• Assessment and authorization is expedited.
• Raises awareness and facilitates readiness.
• May be acceptable to defer some documentation and reduce testing.
• May also be a separate change authority.
3- INCIDENT MANAGEMENT
• Policies and workflows should be included for the documenting and redirecting of
any requests that are submitted as service requests, but which should actually be
managed as incidents or changes.
SERVICE DESK Service desk: The point of communication between the service provider
and all of its users.
• Capture demand for incident resolution and service requests. The entry point/single point of contact for the IT or service organization.
• Focus is to provide support for “people and business.” • Report issues, queries, and requests
• Not simply technical issues • Have them acknowledged, classified, owned, and actioned
• Get matters arranged, explained, and coordinated • Many different models
Channel Description
Phone calls • Specialized technology, such as IVR, conference calls, voice recognition, etc.
Service portals and mobile applications • Supported by service and request catalogues and knowledge bases
Chat • Live chats
• Chatbots
Email • Logging and updating contact with users
• Follow-up surveys and confirmations
Walk-in service desks • Staffed by service personnel
• Provide personal support
Text and social media messaging • Provides a way to contact stakeholders
• Can be used to notify users in case of major incidents
• Provides a way for users to request support
Public and corporate discussion forums • Enables users to contact the service provider
• Provides peer-to-peer support
TRAINING AND COMPETENCIES SUPPORTING TOOLS
• Service desk personnel need to diagnose incidents in terms of • Intelligent telephony systems, incorporating computer-
business priority and to take appropriate action to get them telephony integration, interactive voice response, and
resolved using available skills, knowledge, people, and processes. automatic call distribution.
• Workflow systems for routing and escalation.
• Must also possess broad technical and business area • Workforce management and resource planning systems
skills: • Knowledge base
• Excellent customer service skills • Call recording and quality control
• Empathy • Remote access tools
• Effective communication skills • Dashboard and monitoring tools
• Emotional intelligence • Configuration management systems
• Incident analysis skills to diagnose and prioritize incidents to • Virtual service desks—often require more sophisticated
resolve them access, routing, and escalation tools
• Understanding of business priority
SERVICE DESK ESCALATION PROCESS Service Desk Heat Map and Value Chain
6- PROBLEM MANAGEMENT
Technical Management
General Practices Service Management Practices
Practices
Purpose
• To establish the links between the organization and its stakeholders (Strategic and
Tactical).
• Activities include identifying, analyzing, monitoring, and facilitating the continual
improvement of relationships with stakeholders.
• The Relationship Management practice should:
• Understand the needs and drivers of stakeholders.
• Obtain a high level of stakeholder satisfaction.
• Establish and maintain a constructive relationship.
• Effectively establish and articulate priorities for new or changed products and
services.
• Satisfactorily handle any stakeholders’ complaints and escalations.
• Appropriately mediate conflicting stakeholder requirements.
• Ultimate goal is to facilitate and maintain positive relationships with stakeholders (Value
creation).
STRATEGIC BRM ROLE
Purpose:
• To protect the information needed by the organization to conduct its business.
• Understand and manage risks to confidentiality, integrity and availability
of information, authentication, and non-repudiation.
Procedures that supports information security management: • Driven from the most senior level in the
organization.
Purpose
• To ensure that the organization’s suppliers and their
performance are managed appropriately. • Insourcing: Business practice is performed in house.
• Create closer, more collaborative relationships. • Outsourcing: Outsourcing uses the developed workforce of an outside organization.
• Realize new value.
• Reduce risk of failure. • Single-Source/Partnership: to outsource a single partner who will be responsible for the
entire process.
• This includes information on how CIs are configured and the relationships between them.
• Collects and manages information about a wide variety of CIs, typically including:
• Hardware
• Software
• Networks
• Buildings
• People
• Suppliers
• Documentation Simplified Service Model for a Typical IT Service
• Services are also treated as CIs
11- IT ASSET MANAGEMENT
IT asset: Any financially valuable component that can contribute to delivery of an IT product or service.
Purpose:
• To plan and manage the full lifecycle of all IT assets, to help the organization:
• Maximize value
• Control costs
• Manage risks
• Support decision-making about purchase, reuse, and retirement of assets
• Meet regulatory and contractual requirements
Activities include:
• Define, populate, and maintain the asset register.
• Control the asset lifecycle in collaboration with other practices.
• Provide current and historical data, reports, and support to other practices.
• Audit assets, related media, and conformity.
12- MONITORING AND EVENT MANAGEMENT
Event: Any change of state that has significance for the management of
Purpose an IT service or other configuration item (CI).
• To systematically observe services and service components, and record
and report selected changes of state identified as events.
• Events are typically recognized through notifications created by a service,
CI, or monitoring tool.
• Identify and prioritize events, including infrastructure, services, business
processes, and information security events.
• Establishes the appropriate response.
Activities
• What should be monitored, and establishing the monitoring strategy
• Implementing and maintaining monitoring
• Establishing and maintaining thresholds and policies for event handling
• Implementing processes and automations
13- RELEASE MANAGEMENT
Purpose
The purpose
The purpose of service catalogue management practice is to provide a single source of consistent
information on all services and service offerings, and to ensure that it is available to the relevant audience.
• Provide all the stakeholders with relevant views on services and service
offerings.