SlideShare a Scribd company logo
1 of 88
Page 1
Se rvice
De sig n
Se rvice
ITIL
Service
Strategy
SERVICE
OPERATION
Service
Design
Continual Service
Improvement
Service
Transition
ITIL V3 Core Framework - Service Operation
Service Operation
Day to day delivery and control
process activities for required
stable IT services.
Page 2
Service Operation
 SO will manage a service through its production life of day-to-day
management.
Main Target Audience:
– Service owners, operational staff, vendors and service providers.
Main Influencers:
–Customers, end users, business and IT Management
Page 3
Scope of Service Operation
 Execution & Ongoing Activities
– Provided Services
 Internal & External
– Service Management Processes
 Service Operation & Other Lifecycle Processes
– Technology
 Managing Technology
– People
 Consumers of Services
 Providers of Services
Page 4
SO – Value to the Business
 Actual delivery of services
 Relationship with and satisfaction of customers is improved
 Provision of what is required by the business is provided and planned
for
 From customer viewpoint, it is where actual value is seen.
Page 5
The Principles of SO
Balancing in Service Operation
It is necessary to achieve a balance between :
– Internal vs. External view
– Stability vs. Responsiveness
– Quality vs. Cost
– Reactive vs. Proactive
Page 6
Service Operation Balances
Page 7
Achieving Balance in SO
 Internal View
– Used by IT to Manage the Delivery of Services
– Functional Technological Segmentation
– Functional Focus in Maximizing Its Technology
 External View
– Services as Experienced by Users & Customers
– Little or No Appreciation of “Technological Elegance”
– Concerned with Quality of Service.
Page 8
Balancing Stability vs. Responsiveness
 Stable & Available
– Technology
– Compliance
– Technology’s Gatekeeper
– As Long as it works with the Existing Technology
– Drives towards a “Steady State”
 Business Needs Change
– Demand Outpaces the Thought Process
– New projects Siphon Resources From Existing Services
– Technology “Grab Bag”
– Disproportionate Consumption of Resources
– Take Care of the Future – Don’t Worry About Today
Page 9
Balancing QoS vs. CoS
 Good, Fast or Cheap
– Pick Any Two
 Cheap is Never the Least Expensive
 Over-Delivering Doesn’t Ensure Quality
 Balance is Optimization
– Bring Quality in Line With Value of the Service
Note: “Value” NOT “Cost”
– Quality Costs Less Early in the Lifecycle…..and More Later in the Lifecycle
Page 10
Balancing Reactive vs. Proactive
 Reactive Organization – Waits for Stuff to happen
– Firefighting is a Way of Life
– Heroes Are Revered
 Proactive Organization – Constantly Looking for Improvement
– Fire Prevention is a way of Life
– Heroes Are Acknowledged
 Investigations Launched into What Went Wrong
Page 11
The Process of Service Operation
 Incident Management
– Coordination of IT resources needed to restore an IT service
 Event Management
– Monitoring events throughout the IT Infrastructure
 Request Fulfillment
– Managing customer & user requests that are not the result of an incident.
 Problem Management
– Finding the root cause of events & incidents
 Access Management
– Granting authorized users the right to use a service.
Page 12
The Process of Service Operation
Page 13
Incident Management
Goal
– To restore normal service operation as quickly as possible with minimum disruption to the
business, thus ensuring that the best achievable levels of availability and service are
maintained
Scope
– Incident management includes any Event which disrupts, or which could disrupt a service.
 Eg. Hardware failure, Software error, Network faults, Performance issues, etc
– Incident reported ( or logged) by technical staff, tools, user(s), etc
Benefits
– Minimize the disruption and downtime for our users
– Maintain a record during the entire Incident life-cycle. (This allows any member of the service
team to obtain or provide an up-to-date progress report)
– Incidents are dealt with quickly, before they become severe.
– Building knowledgebase of known issues to allow quicker resolution of frequent Incidents
Page 14
Incident Management – Key Concepts
 Incident : An unplanned interruption to an IT Service or a reduction in the
quality of an IT service
 Impact : A measure of the effect of an Incident, problem or Change on
Business Processes.
 Response Time : A measure of the time taken to complete an Operation
 Resolution Time : The time that elapses between acknowledged receipt of
an incident and incident resolution.
 Priority : A category used to identify the relative importance of an incident,
problem or change.
 Hierarchical Escalation: Informing or involving more senior levels of
management to assist in an escalation
 Functional Escalation: Transferring an incident, problem or change to a
technical team with a higher level of expertise to assist in an escalation.
Page 15
Incident Lifecycle
The progression of an incident through a standard process flow.
The key stages in the flow are:
Incident Detecting and Recording
Initial Classifcation and Support
Investigation and Diagnosis
Resolution and Recovery
Closure
Page 16
Incident Logging
 Sources of Incidents
– Users
– Operations
– Network management
– Systems Management Tools
 Record Incident Information
 Alert Other IT Domains
– Operations
– Network Management
Page 17
Incident Categorization
 Gather additional Information
– Key Data Elements
 Classification Using
– Standard Coding Scheme
 Match to Knowledge Base
– Previous Incidents
– Problems
– Know Errors
 Assign Initial Priority
 Escalate if Necessary
Page 18
Incident Categorization - Example
Page 19
Incident Priority
 What Does It Do to the business?
– Business Impact
 How Quickly Does it Have to Be Fixed?
– Business Urgency
 Priority Assignment
– Function of Impact & Urgency
Priority = Urgency x Impact
Impact = Effort upon the Business
Urgency = Extent to which the resolution can bear delay.
Page 20
Impact
 Impact is defined as the number of people affected by a service
outage.
 Low Impact: One customer affected, where no executive or
executive staff are involved.
 Medium Impact: Several customers are affected, or an executive or
executive staff are involved.
 High Impact: Whole organization, complete department or building
affected, or revenue/financial systems affected
Page 21
Urgency
 Urgency is defined as the affect of the event on a customer’s ability
to work.
 Low Urgency: Ability not impaired, the customer is requesting extra
or additional functions or services (a service request).
 Medium Urgency: Abilities are partially impaired, and customers
cannot use certain functions or services.
 High Urgency: Abilities are completely impaired and customers
cannot work.
Page 22
Priority
Priority is based on Impact and Urgency. The priority determines how
quickly the issue needs to be addressed.
 Low Priority: Work to be completed in 4 business days.
 Medium Priority: Work to be completed in 2 business days.
 High Priority: Work to be completed in 4 hours.
 Urgent Priority: Work to be completed in 2 hours.
Page 23
Incident Priority
Priority = Urgency x Impact
Urgency = Extent to which the resolution can bear delay
Impact = Effort upon the Business
How quickly does it have to be fixed?
– Business Urgency
 What does it do to the business?
– Business Impact
Page 24
Incident Class
Incident Class Description
Priority 1 (P1 Critical) Key production system/s failed or unavailable causing severe disruption to
primary business operations.
Priority 2 (P2 High) A critical system/s failed or unavailable causing disruption and impact to critical
business operations. No reasonable workaround available in terms of risk,
effort and customer impact.
Priority 3 (P3 Medium) Some production system/s and or functions are degraded causing medium
impact. A reasonable workaround is available but a permanent solution is
required.
Priority 4 (P4 Low) Some system functionality has failed or is unavailable with minimal
inconvenience to users. Business disruption is minimal and a workaround is
available. A permanent solution is required.
Page 25
Response & Resolution times for Incidents
Response Time Resolution Time
Incident Priority
During regular
support hours
During on call
support hours
During regular
support hours*
During on call
support hours*
Priority 1 15 min. ½ hour 4 hours 4 hours
Priority 2 1 hour 4 hours 6 hours 8 hours
Priority 3 4 hours N/A 3 w/days N/A
Priority 4 1 w/day N/A As agreed N/A
Page 26
Incident Priority - Example
Page 27
Incident Diagnosis
 Coordinate Activities
– Investigation
– Diagnosis
 Escalation
– Functional
– Hierarchical
 Coordinate Development of a Workaround
 Iterative Process
– Keep User Informed
Page 28
Incident Escalation
2nd
Line
Support
Team
3rd Line
Support
Team
Service Desk
Manager
Service
Desk
Support
Team
3rd
Line
Manager
2nd
Line
Manager
IT Service
Manager
Functional (competence)
Hierarchical(authority)
 Functional
– First Level to Second Level to
third level, Etc.
– Increased Requirements for
Technical Expertise
– Often Based on Elapsed Time to
avoid a Service Level Breach
 Hierarchical
– When Resolution is Not Likely in
Time to Avoid a Service Level
Breach
– Inform in Advance so Timely
Action can be taken
– Allows Time for Corrective Action
Page 29
Escalation Process for Incident Management
Escalation level Name and Designation
Level 1 Service IT
Level 2 Chennai Messaging Team
Level 3 Manager
Level 4 Group Manager
Below chart shows the timelines for escalation for incidents after the defined
resolution time has expired.
Severity Level 1 Escalation Level 2 Escalation Level 3 Escalation Level 4
Escalation
Priority 1 (Critical) 0 Hour** 1/2 Hour 1 Hour 2 hours
Priority 2 (High) 1 Hour 4 Hours 8 Hours 2 w/days
Priority 3 (Medium) 1 w/day 2 w/days 5 w/days N/A
Priority 4 (Low) 3 w/days 5 w/days N/A N/A
Page 30
Incident Resolution & Recovery
 Matches to Knowledge Base
– Problems
– Known Errors
 Clean Up / Restore Service
– Restore Files
– Boot Server
 Update Incident Record
 Raise RFC?
Page 31
Incident Closure Activity
 Incident Review
– Review the Incident against Known Errors problem, solutions, planned changes or
knowledge base
 Final Classification
– Standard Coding Scheme
– Enables Quality Analysis
 Restricted Authority
– Reduced Temptation to “Edit History”
Page 32
Incident Lifecycle
Page 33
Incident Management – CSFs & KPIs
Critical Success Factors :
– Maintaining IT Service Quality
– Maintaining Customer Satisfaction
– Resolving Incidents within established Service Times
Key Performance Indicators:
Maintaining IT Service Quality
– Number of Severity 1 incidents (total and by category)
– Number of Severity 2 incidents (total and by category)
– Number of other incidents (total and by category)
– Number of incidents incorrectly escalated
– Number of incidents bypassing Service Desk
– Number of incidents not closed/resolved with workarounds
– Number of incidents reopened
Page 34
Incident Management – CSFs & KPIs
 Maintaining Customer Satisfaction
– Number of User/Customer surveys sent
– Number of User/Customer surveys responded to
– Average User/Customer survey score (total and by question
category)
– Average queue time waiting for Incident response
 Resolving Incidents Within Established Service Times
– Number of incidents logged
– Number of incidents resolved by Service Desk
– Number of incidents escalated by Service Desk
– Average time to restore service from point of first call
– Average time to restore Severity 1 incidents
– Average time to restore Severity 2 incidents
Page 35
Incident Management Reports
Incident Management reports may include:
– Size of current Incident backlog
– Number and percentage of Major Incidents
– Percentage of Incidents handled within agreed resolution time.
– Number and percentage of Incidents incorrectly assigned
– Number and percentage of Incidents incorrectly categorized.
Page 36
Incident Management - Roles
 Incident Manager
– Manages Work of Incident Support Staff
 First Line Support
– Normally the Service Desk
 Second Line Support
– Generally Higher Technical Skills
 Third Line Support
– Internal Technical Support
– Third-party Support
Page 37
Incident Management - Challenges
 Incident must be detected as early as possible
 Convince all staff that all Incidents must be logged
 Availability of information about Problems and Known Errors, workarounds.
 Integration into the Configuration Management System
 Integration into the Service Level management process
Page 38
Event Management
Purpose:
– Provides the basis for Operational Monitoring & Control
Goal :
– Monitor all events to enable the achievement of normal operation.
Objectives :
– Detect, analyze & direct appropriate control actions.
Page 39
Importance of Event Management
 The ability to monitor and decipher the continuous flow of information about
the status of service components is key.
 Formal Event Management detects fluctuations in component and service
performance, which can be tuned dynamically to suit each condition.
 Provides the ability to detect events, make sense of them
 Can be used as a basis for automating many Operations Mgt activities, e.g.
Executing scripts on remote devices, submitting jobs for processing
 Provides an entry point for execution of many Service Operation processes &
activities
 Provides:- monitoring of SLA’s; basis for Service Assurance & Reporting, and
Service Improvement
Page 40
Event Management – Key Concepts
 Event - Any detectable occurrence in the IT infrastructure.
 Monitoring - Monitoring refers to the activity of observing a
situation to detect changes that happen over time
 Reporting - Reporting refers to the analysis , production
and distribution of the output of the monitoring activity
 Alert - A threshold has been exceeded
 Event correlation - To understand events they are
analyzed against other events and their configuration items
 Event filtering - Filtering decides if the event is
informational, warning or exception
– Event Information - no action required ( An IT user may
be logging on to a system)
– Warning - A threshold is soon to be reached or
unauthorized IT event has occurred (An IT user is using
unauthorized software)
– Exception - Typically a configuration item acting
abnormally or a new configuration item has been
implemented (An IT user is logged onto a system where
memory seems to be filling up too quickly)
Page 41
Event Management – Desirable Tool Features
 Multi-environmental, open interface to allow monitoring across heterogeneous services
& entire IT infrastructure
 Easy to deploy, with minimum setup costs
 ‘Standard Agents’ to monitor most common components/systems
 Open interfaces to accept any standard e.g. SNMP event input
 Centralised routing of all events to a single location programmable to allow different
location(s) at various times.
 Support for design/test phases
 Programmable assessment and handling of alerts depending on symptoms & impact
 Ability to allow an operator to acknowledge an alert, or if no response then
automatically escalate
 Good reporting functionality to allow feedback into design & transition phases as well as
meaningful management info & and business user dashboard
Page 42
Event Management Roles
 The Role of the Service desk
– Initial Support, Escalation, Communications
 Role of Technical and Application Management
– Define, Manage Events
– Deal with Incidents and Problems related to Event
 IT Operations Management
– Event Monitoring, provide initial response
Page 43
Request Fulfillment
Purpose :
– Manage non-incident related customer or user requests
Goal :
– Facilitate the timely and accurate fulfillment of request for service
Objective :
– Deliver requested pre-approved standard services.
Page 44
Request Fulfillment Roles
 Service Desk Staff
– Service Desk and Incident Management staff provides initial response and handles the request
 Staff in other appropriate functions
– Responsible for ensuring eventual fulfillment of the request.
 External Suppliers, as appropriate
– As per the request from the organizations, fulfill the Service Request.
Page 45
Problem Management
Goal
– To minimize the adverse effect on the business of incidents and problems caused by errors in the infrastructure,
and to proactively prevent the occurrence of incidents, problems and errors
Scope
– Identify and resolve IT problems that affect IT services
 To minimize the impact of problems and incidents
– Pro-active problem management
 To reduce the overall number of IT incidents
– Maintain information about problems and the appropriate workarounds and resolutions
– To ensure that the right level and number of resources are resolving specific problems
– Maintaining relationships with third party suppliers
Benefits
– Identifies and escalates a problem to the highest priority.
– Ensures involvement by appropriate staff involved in providing any aspect of the service affected.
– Ensures that all possible causes are explored.
– Provides needed communication and follow up to ensure resolution.
– Learning from experience – the process provides historical data to identify trends, the means of preventing
failures and of reducing the impact of failures
Page 46
Problem Management – Key Concepts
 Problem :
– “The unknown root cause of one or more Incidents”
 Workaround :
– “ A temporary way of overcoming technical difficulties (i.e., Incidents or problems”)
 Known Error
– “ Problem that has a documented Root Cause and a workaround”
 Known Error Database (KEDB)
– “Database containing all Known Error Records”
Page 47
Problem Management
ProblemsIncidents
}
}
}
Known Errors Request for Change
}
}
}
• How well does IT respond to
incidents?
• How much does it cost?
• Are all incidents logged and
tracked?
• How is customer satisfaction?
• What % of incidents are
studied for root causes?
• How many FTE?
• How quickly is it done?
• How much does it cost?
• How good are we?
• How much does it cost to id
a root cause? How many
FTE?
• What % of problems have
identified root causes
• How many incidents were caused by
changes?
• How many changes of each type?
• How much do they cost?
• How many root causes were
eliminated and what % of incidents
does that represent?
Page 48
Difference between Incident and Problem Management
 Incident Management
– Restores agreed levels of service
– Uses workarounds
 Incidents and Service Requests are formally managed through a staged process to conclusion.
This process is referred to as the "Incident Management Lifecycle".
 The objective of the Incident Management Lifecycle is to restore the service as quickly as possible
to meet Service Level Agreements.
 The process is primarily aimed at the user level.
 Problem Management
– Diagnoses the root cause of incidents
– Identifies a permanent solution
– May take longer than Incident Management
 Problem Management deals with resolving the underlying cause of one or more Incidents. The
focus of Problem Management is to resolve the root cause of errors and to find permanent
solutions.
 Although every effort will be made to resolve the problem as quickly as possible this process is
focused on the resolution of the problem rather than the speed of the resolution.
 This process deals at the enterprise level.
Page 49
Problem Management
Page 50
Problem Management Activities
The main activities involved in Problem Management are:
 Problem Control
– Its responsible for logging and classifying problems to determine their causes and turn them
into known errors.
 Error Control
– records known errors and proposes solutions to them by means of RFCs which are
sent to Change Management. It also conducts Post-Implementation Review of
these changes in close collaboration with Change Management.
 Proactive Problem Management
– Analysis of trends from incident records provides view on potential problems before they occur
Page 51
Problem Control
 The main objective of Problem Control is to turn problems into Known
Errors so that Error Control can propose the relevant solutions.
 Problem Control basically consists of three phases:
1. Identification and Logging
2. Classification and Allocation of Resources.
3. Analysis and Diagnosis: Known error
Page 52
Problem Control
1. Identification and Logging
– One of the main tasks of Problem Management is to identify problems. The main sources of
information used are:
 The incident database
 Analysis of IT infrastructure
 Service Level Degradation
2. Classification and Allocation of Resources.
– Problems are classified according to their general characteristics, such as whether they are
hardware or software problems, the functional areas affected and details of the various
configuration items (CIs) involved.
3. Analysis and Diagnosis: Known error
– The main objectives of the process of analysis are:
 Determining the causes of the problem.
 Providing work-arounds for Incident Management to minimise the impact of the problem until the
necessary changes are made so as to resolve the problem definitively.
Page 53
Error Control
 Once Problem Control has determined the causes of a problem, Error
Control is responsible for logging it as a known error.
– Error identification and recording
 faulty CI is detected, and known error status is assigned.
– Error assessment
 initial assessment of means required to solve the problem and raising of an RFC.
– Recording error resolution
 solution for each known error should be in the PM system, made available for incident
matching
– Error closure
 After successful implementation of the change, the error is closed together with all
associated Incident records.
– Monitoring problem and error resolution progress
 Change management is responsible for implementing RFCs, but error control is responsible
for monitoring progress in resolving known errors.
Page 54
Proactive problem management
 Problem Management may be:
 Reactive: Analysing incidents that have occurred in order to discover their causes
and propose solutions to them.
 Proactive: Monitoring the quality of the IT infrastructure and analysing its
configuration in order to prevent incidents even before they happen.
 Proactive problem management activities are concerned with identifying and
resolving problems and known errors before Incidents occur
 Trend analysis
 identify “fragile” components and their reason. Requires availability of sufficient historical data.
– Targeting support action
 towards problem areas requiring most support time, or causing most impact to the business (volume of
incidents, number of users impacted, cost to the business).
– Providing information to organization
 Providing insight in effort and resources spent by organization in diagnosing and resolving problems and
known errors to management. Also information on workarounds, permanent fixes, and status information
should be given to Service Desk.
Page 55
Problem Management - Reporting
 Items that can be reported to IT management
– Time spent on research and diagnosis
– Brief description of actions taken
– Planning unresolved problems with regard to use of people, use of tools, and costs
– Problems categorized into: status, service, impact, category, user group
– Turnaround time of closed problems
– Elapsed time and expected resolution period for unresolved problems
– Temporary corrective actions
 Items that are important for Service Level Management
– Number of problems categorized into: user group, category, impact, service
– Turnaround time of closed problems
– Expected solution period for unresolved problems
 Items that are important for Service Desk
– Status of problems
– Information on bypasses
Page 56
Service Desk – IM – PM (PC) (EC) - CM
User
Incident
DB
Problem
DB
Known Error
DB
Business Case
to FIX
Raise
RFC
ERROR CONTROL
PROBLEMCONTROL
Known Error
One or More Incidents with
Unknown Underlying cause
Root Cause Known and Temp or Perm Fix found
STOP
NO
YES
Change Management
Incident
PM
PM
PM
SD/IM
IM
Page 57
Problem Management CSFs & KPIs
Critical Success Factors
 Avoiding Repeated Incidents
 Minimizing Impact Of Problems
Key Performance Indicators
 Avoiding Repeated Incidents
– Number of repeat incidents
– Number of existing Problems
– Number of existing Known Errors
Minimizing Impact of Problems
– Average time for diagnosis of Problems
– Average time for resolution of Known Errors
– Number of open Problems
– Number of open Known Errors
– Number of repeat Problems
– Number of Major Incident/Problem reviews
Page 58
Access Management
Goal :
– To grant authorized users the right to use a service, while preventing access to non-
authorized users.
Scope:
– Execute the policies & actions defined by Security & Availability.
Benefits
Page 59
Access Management – Basic Concepts
 Access
– Refers to the level and extent of a Service’s functionality or data that a user is entitled to use.
 Identity
– Information about a user that distinguishes them as an Individual, and which verifies their status within the
organization. By definition, the Identity of a user is unique to that user.
 Rights ( or Privileges)
– Refers to the actual settings whereby a user is provided access to a Service or group of Services. Typical rights,
or levels of access include read, write, execute, change, delete.
 Service or Service Groups
– Ability to grant each user (or group of users) access to the whole set of Services tat they are entitled to use at
the same time.
 Directory Services
– A specific type of tool that is used to manage access and rights.
Page 60
Access Management Activities
 Requesting Access
– Request for access could be a Request for Change (RFC) into the Change Management
System (Service Transition) or a Service Request from the Request Fulfillment System (Service
Operation).
– The Security policies will define which areas and departments may request access, and the
Access Management process will design the mechanisms to carry out that request.
 Verification
– The verification activity verifies a request for access to ensure that the user requesting the
access is who he/she says he/she is, and that the user has a legitimate requirement for the
service.
– Depending on the levels of risk to the organization, the Security policies may define different
levels of verifications to access different services.
 Providing Rights
– Once it has verified a user, Access Management provides the appropriate rights to him/her.
– The Security policy defines the rights that should be available to an individual, and Access
Management grants rights based on this information.
Page 61
Access Management Activities (Cont)
 Monitoring Identity Status
– One of the problems with many manual Access Management systems in use today is that there
is no easy way to monitor when a user changes roles or Identity Status.
– Typical events that trigger a change in Identity Status are job changes, promotions or
demotions, transfers, resignation or death, retirement, disciplinary action, dismissals.
 Logging and Tracking Access
– All Technical and Application Management monitoring activities should include reviews of
Access rights and utilization to ensure that the rights are being properly used.
– The review should direct all exceptions to Incident Management for investigation
 Removing or Restricting Rights
– Users do not stay in the same jobs or roles forever, and neither should their access rights.
– This is another place to set up standard procedures and policies to more easily identify events
requiring the removal or restriction of rights.
Page 62
Access Management Roles
 Information Security Managers
– Define and Maintain Policies for this process
 Service Desk Staff
– Handle the Requests
 Staff in other functions (e.g., Technical and Application management)
– Execution of the requests
Page 63
Functions of Service Operations
 Service Desk
 Technical Management
 Application Management
 IT Operations Management
Page 64
Service Desk
 Goal
– To act as the Single Point of Contact (SPOC) between the User and IT Service
Management
– To handle Incidents and request and provide an interface for other activities such
as
 Change Management
 Problem Management
 Configuration Management
 Release Management
 Service Level Management
 IT Service Continuity Management
 Benefits
– Improved User service, perception and satisfaction
– Increased User accessibility via the single point of contact
– Improved quality and faster response to User requests
– More effective and efficient use of support resources
– Better management information to make decision on support
Page 65
Service Desk - Objectives
 Logging ALL Incidents & Request
 First Line
– Investigation & Diagnosis
 Incident & Request Resolution
 Functional and Hierarchal Escalation
 Customer Communication
– Incident Progress
– Pending Changes ( Forward Schedule of Changes)
– Agreed Outages ( Projected Service Availability)
 Satisfaction Surveys
Page 66
Service Desk
 Call Center
– To handle large volumes of telephone based transactions like telesales or order
processing
 Help Desk
– To manage and resolve incidents quickly and effectively, and to make sure all
requests are followed up
 Service Desk
– To extend beyond the range of services offered by the HD to allow business
processes to be integrated into Service Management infrastructure
– In addition to handling incidents, to provide an interface for managing changes,
SLM, maintenance issues, software licensing, IT Service Continuity Management,
Financial, Availability and Configuration Management
 All three organizations share these characteristics:
– They aim to achieve customer satisfaction
– They use technology, people and processes to provide a service to the business
Page 67
Service Desk - Objectives
 Logging ALL Incidents & Request
 First Line
– Investigation & Diagnosis
 Incident & Request Resolution
 Functional and Hierarchal Escalation
 Customer Communication
– Incident Progress
– Pending Changes ( Forward Schedule of Changes)
– Agreed Outages ( Projected Service Availability)
 Satisfaction Surveys
Page 68
Setting up a Service Desk
 Understand the business needs and requirements
 Define clear objectives
 Obtain support, budget and resources
 Advertise and sell benefits / communicate quick wins
 Involve and educate users / train support staff
Page 69
Service Desk – Organizational Structures
 Local Service Desk
– Co-located with User Community
 Centralized Service Desk
– Consolidation of Fewer or Single Service Desk
 Virtual Service Desk
– Support Staff Geographically Dispersed
 Follow the Sun
– Two or More Geographically Dispersed Service Desks
 Specialized Service Desk Groups
– Direct Access to Technical Functional Specialist
Page 70
Local Service Desks
 Designed to support local business needs
 Support is usually in the same location as the business it is supporting
 Practical for smaller organizations
Page 71
Service Desk - Local
Page 72
Central Service Desk
 Designed to support multiple locations
 Service Desk is in a central location while the business is distributed
 Ideal for larger organization/economies of scale:
– Reduces operational costs
– Improves resource usage
 Could provide secondary support to local desks
Page 73
Centralized Service Desk
Page 74
Virtual Service Desk
 Location of Service Desk analysts is invisible to the customers
 Common processes and procedures should exist – single
incident log
 Common agreed language for data entry
 Single point of contact per customer
 On-site presence may still be needed for some functions
 “Workload partitioning” needed
Page 75
Service Desk - Virtual
Page 76
“Follow the Sun” Option
 Not a type of Service Desk but an option usually applied to two
or more Central Service Desks for global operations
 Where Service Desk support switches between two or more
desks to provide 24 hr global cover.
 Telephony switching needed
 Multilingual staff usually required
 Local conditions and cultural issues need to be considered
 Clear escalation channels needed
Page 77
A Self-Service Strategy
 Gives some control to Customers, optionally:
– Log new incidents, change requests
– Self-help
– Order good or services
 Can reduce work load on Service Desk
 Particularly useful “out of hours” and for non-critical activities
 Dependant on a strong knowledge base
Page 78
Outsourcing the Service Desk
 Potential Benefits
– Financial savings
– Economies of scale
– Access to large skill pool
– Improved staff and service cover
– Competitive marketplace
 Care Needed
– Viewing the Service Desk as an overload is damaging
– SD is the “window of service and professionalism”
– Intellectual capital should be protected
– Seek “vendor partnerships” and long-term relationships
Page 79
Service Desk - Staffing
 Staffing Levels
– Based on Business Requirements
– Customer Service Expectations
 Skill Levels
– Interpersonal
– Business Awareness
– Communication
– Technical Awareness
 Training
– New Service Introduction
– Business Awareness
 Retention
– Learning Organization
– Team Building
 Support Users
– User Liaison to Filter Requests
Page 80
Service Desk - Metrics
 First Line Resolution
 Average Time to Resolve
 Average Time to Escalate
 Cost Per Incident/Request
 Customer Updates Completed on Time
 Incident/Request Volumes
– Hour of Day
– Day of week
– Week of Month
Page 81
Technical Management
Technical management is involved in all aspects of the Service Lifecycle.
Its activities include :
– Acquire and maintain require technical expertise
– Skills documentation
– Initial and on-going skills training
– Design and delivery of user training
– Standard definition
– Service Design
– Project Staffing
– Testing
– Service Transition (change, release & deployment)
– Continual Service Improvement
– Service Operation
– Diagnosis and recovery from technical failures.
Page 82
Technical Management
 Role:
– Custodian of Technical Knowledge
– Support Resources to the ITSM Lifecycle
 Objectives
– Participate in Planning, Implementation & Maintaining a Stable Technical
Infrastructure.
Page 83
Application Management
 Application management has the overall responsibility for managing
applications throughout their lifecycle.
 It may involve a number of different application development groups.
 Its objective is to design of cost-effective applications that meet the
needs of the business customer in support of their business process.
 Delivery of the required features and functionality needed to provide
the utility and warranty required.
 Maintenance of software applications is very important to the overall
quality of the services provided.
Page 84
Application Management
 Role :
– Custodian of Application Management
– Support Resources to the ITSM Lifecycle
 Objective
– Well Designed, Resilient & Cost Effective Applications
– Deliver Required Functionality
– Demonstrate Technical Expertise in Maintenance
Page 85
IT Operations Management
 Operations Management includes the functional groups involved in
day-to-day operational activities
 Operation Control oversees and monitors the operational activities in
the IT infrastructure
 Facilities Management manages the physical IT environment
 Its objective is to ensure IT service is achieved and maintained
 It is responsible for the optimization of support costs
Page 86
IT Operations Management
 Role:
– IT Operations Control
 Maintain stability of day-to-day processes and activities
– Facilities Management
 Management of Physical IT environment, usually data centers or computer rooms.
 Objectives
– Achieves & Maintain Stability
– Improve Service & Reduce Costs
– Demonstrate Responsiveness to Operational Failures
Page 87
IT Operations Management
IT Operation Management
IT Operation Control
 Console Management
 Job Scheduling
 Backup and Restore
 Print Na Output
 Maintenance activities
Facilities Management
 Data Centre
 Computer Rooms
 Recovery Sites
 Power and air conditioning
 Fire and security systems
Page 88
Questions
 Questions

More Related Content

What's hot

IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsIT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsEvergreen Systems
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 
ITSM Project
ITSM ProjectITSM Project
ITSM ProjectOleksandr
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarITSM Academy, Inc.
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignEvergreen Systems
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOIT Service and Support
 
IT4IT / DevOps Tooling Landscape 2022
IT4IT / DevOps Tooling Landscape 2022 IT4IT / DevOps Tooling Landscape 2022
IT4IT / DevOps Tooling Landscape 2022 Rob Akershoek
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Rob Akershoek
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Alan McSweeney
 
IT Service Catalog Taxonomy Essentials
IT Service Catalog Taxonomy EssentialsIT Service Catalog Taxonomy Essentials
IT Service Catalog Taxonomy EssentialsEvergreen Systems
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management Alkesh Mishra
 
How to build an integrated and actionable IT Service Catalog
How to build an integrated and actionable IT Service CatalogHow to build an integrated and actionable IT Service Catalog
How to build an integrated and actionable IT Service Catalogmboyle
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
 
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...Evergreen Systems
 
ITIL v3 vs v4
ITIL v3 vs v4ITIL v3 vs v4
ITIL v3 vs v4BITIL.COM
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doCliffordEgbomeade
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Jean Gehring
 
Service Catalog & Request Fulfillment, the cornerstone of IT Service Management
Service Catalog & Request Fulfillment, the cornerstone of IT Service ManagementService Catalog & Request Fulfillment, the cornerstone of IT Service Management
Service Catalog & Request Fulfillment, the cornerstone of IT Service ManagementBMC Software
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1Mohamed Zakarya Abdelgawad
 

What's hot (20)

IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsIT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
ITSM Project
ITSM ProjectITSM Project
ITSM Project
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service Design
 
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCOOctober 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
October 2008 - Transforming from Help Desk to Service Desk, Lowering TCO
 
IT4IT / DevOps Tooling Landscape 2022
IT4IT / DevOps Tooling Landscape 2022 IT4IT / DevOps Tooling Landscape 2022
IT4IT / DevOps Tooling Landscape 2022
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
ITIL Basic concepts
ITIL   Basic conceptsITIL   Basic concepts
ITIL Basic concepts
 
IT Service Catalog Taxonomy Essentials
IT Service Catalog Taxonomy EssentialsIT Service Catalog Taxonomy Essentials
IT Service Catalog Taxonomy Essentials
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management
 
How to build an integrated and actionable IT Service Catalog
How to build an integrated and actionable IT Service CatalogHow to build an integrated and actionable IT Service Catalog
How to build an integrated and actionable IT Service Catalog
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...
 
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...
Service Catalog, Service Portfolio, Service Taxonomy - Big 3 of Customer Cent...
 
ITIL v3 vs v4
ITIL v3 vs v4ITIL v3 vs v4
ITIL v3 vs v4
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2
 
Service Catalog & Request Fulfillment, the cornerstone of IT Service Management
Service Catalog & Request Fulfillment, the cornerstone of IT Service ManagementService Catalog & Request Fulfillment, the cornerstone of IT Service Management
Service Catalog & Request Fulfillment, the cornerstone of IT Service Management
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1
 

Viewers also liked

ITIL Intermediate Exam Tricks and Tips | Syzygal
ITIL Intermediate Exam Tricks and Tips | SyzygalITIL Intermediate Exam Tricks and Tips | Syzygal
ITIL Intermediate Exam Tricks and Tips | SyzygalSyzygal
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service OperationMarvin Sirait
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
Service Operation
Service OperationService Operation
Service OperationPeleg
 
Cobit from Mars ITIL from Venus - alignment
Cobit from Mars ITIL from Venus - alignmentCobit from Mars ITIL from Venus - alignment
Cobit from Mars ITIL from Venus - alignmentKathryn Howard
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
Chapter 21 Operations and Service Management
Chapter 21 Operations and Service ManagementChapter 21 Operations and Service Management
Chapter 21 Operations and Service ManagementRayman Soe
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL PresentationRon Drew
 
Stefanini Tech Team - Help Desk to Service Desk
Stefanini Tech Team - Help Desk to Service DeskStefanini Tech Team - Help Desk to Service Desk
Stefanini Tech Team - Help Desk to Service DeskIT Service and Support
 
Introduction To ITIL Slide Share
Introduction To ITIL Slide ShareIntroduction To ITIL Slide Share
Introduction To ITIL Slide Sharedwslaterjr
 
Service operation ppt
Service operation pptService operation ppt
Service operation pptBhaskar Das
 
Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611John Paulson
 
Should you establish a Service Management Office (SMO) - ITSM Academy Webinar
Should you establish a Service Management Office (SMO) - ITSM Academy WebinarShould you establish a Service Management Office (SMO) - ITSM Academy Webinar
Should you establish a Service Management Office (SMO) - ITSM Academy WebinarITSM Academy, Inc.
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionAxios Systems
 

Viewers also liked (20)

ITIL Intermediate Exam Tricks and Tips | Syzygal
ITIL Intermediate Exam Tricks and Tips | SyzygalITIL Intermediate Exam Tricks and Tips | Syzygal
ITIL Intermediate Exam Tricks and Tips | Syzygal
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service Operation
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
ITIL
ITILITIL
ITIL
 
IT Help Desk Survey
IT Help Desk SurveyIT Help Desk Survey
IT Help Desk Survey
 
Service Operation
Service OperationService Operation
Service Operation
 
Issue Tracking
Issue TrackingIssue Tracking
Issue Tracking
 
Cobit from Mars ITIL from Venus - alignment
Cobit from Mars ITIL from Venus - alignmentCobit from Mars ITIL from Venus - alignment
Cobit from Mars ITIL from Venus - alignment
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
Chapter 21 Operations and Service Management
Chapter 21 Operations and Service ManagementChapter 21 Operations and Service Management
Chapter 21 Operations and Service Management
 
Bug Tracking System
Bug Tracking SystemBug Tracking System
Bug Tracking System
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL Presentation
 
Stefanini Tech Team - Help Desk to Service Desk
Stefanini Tech Team - Help Desk to Service DeskStefanini Tech Team - Help Desk to Service Desk
Stefanini Tech Team - Help Desk to Service Desk
 
Introduction To ITIL Slide Share
Introduction To ITIL Slide ShareIntroduction To ITIL Slide Share
Introduction To ITIL Slide Share
 
Service operation ppt
Service operation pptService operation ppt
Service operation ppt
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611Erp Implementation Methodology Wkshp 2.0 120611
Erp Implementation Methodology Wkshp 2.0 120611
 
Should you establish a Service Management Office (SMO) - ITSM Academy Webinar
Should you establish a Service Management Office (SMO) - ITSM Academy WebinarShould you establish a Service Management Office (SMO) - ITSM Academy Webinar
Should you establish a Service Management Office (SMO) - ITSM Academy Webinar
 
IT Service's Improvement Plan
IT Service's Improvement PlanIT Service's Improvement Plan
IT Service's Improvement Plan
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service Transition
 

Similar to ITIL Service Operation Processes

Most Recent updatedResume Vaibhav
Most Recent updatedResume VaibhavMost Recent updatedResume Vaibhav
Most Recent updatedResume VaibhavVaibhav Sawant
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
Yashish AT&T Profile
Yashish AT&T ProfileYashish AT&T Profile
Yashish AT&T ProfileYashish Madas
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfManishKumar526001
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
Help desk assessment report.x10
Help desk assessment report.x10Help desk assessment report.x10
Help desk assessment report.x10rajanam
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Jorge Sebastiao
 
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...ITIL Indonesia
 
5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentationAnna Sadokhina
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 

Similar to ITIL Service Operation Processes (20)

BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Most Recent updatedResume Vaibhav
Most Recent updatedResume VaibhavMost Recent updatedResume Vaibhav
Most Recent updatedResume Vaibhav
 
Itsm
ItsmItsm
Itsm
 
Sachin_Kumar
Sachin_KumarSachin_Kumar
Sachin_Kumar
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
6 service operation
6 service operation6 service operation
6 service operation
 
6 service operation
6 service operation6 service operation
6 service operation
 
Yashish AT&T Profile
Yashish AT&T ProfileYashish AT&T Profile
Yashish AT&T Profile
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
 
Resume
ResumeResume
Resume
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
Dit yvol5iss7
Dit yvol5iss7Dit yvol5iss7
Dit yvol5iss7
 
Help desk assessment report.x10
Help desk assessment report.x10Help desk assessment report.x10
Help desk assessment report.x10
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
 
5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 

More from Karthik Arumugham

Whtppr 0812-financial-mgmt-thirdsky
Whtppr 0812-financial-mgmt-thirdskyWhtppr 0812-financial-mgmt-thirdsky
Whtppr 0812-financial-mgmt-thirdskyKarthik Arumugham
 
Tcp cost-price-modeling-for-sustainable-services-v2 2-1
Tcp cost-price-modeling-for-sustainable-services-v2 2-1Tcp cost-price-modeling-for-sustainable-services-v2 2-1
Tcp cost-price-modeling-for-sustainable-services-v2 2-1Karthik Arumugham
 
Screening the-future-uc3-cost-model
Screening the-future-uc3-cost-modelScreening the-future-uc3-cost-model
Screening the-future-uc3-cost-modelKarthik Arumugham
 
Pasig cost-modeling-for-sustainable-services
Pasig cost-modeling-for-sustainable-servicesPasig cost-modeling-for-sustainable-services
Pasig cost-modeling-for-sustainable-servicesKarthik Arumugham
 
H8961 itasaservice-financial-transparency-wsa-wp
H8961 itasaservice-financial-transparency-wsa-wpH8961 itasaservice-financial-transparency-wsa-wp
H8961 itasaservice-financial-transparency-wsa-wpKarthik Arumugham
 
Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Karthik Arumugham
 
Fs tech-journal-cost-management
Fs tech-journal-cost-managementFs tech-journal-cost-management
Fs tech-journal-cost-managementKarthik Arumugham
 
Costing it-services sdlee-mfraser_2011-12-07
Costing it-services sdlee-mfraser_2011-12-07Costing it-services sdlee-mfraser_2011-12-07
Costing it-services sdlee-mfraser_2011-12-07Karthik Arumugham
 
Cni 2012-abrams-cost-model-handout
Cni 2012-abrams-cost-model-handoutCni 2012-abrams-cost-model-handout
Cni 2012-abrams-cost-model-handoutKarthik Arumugham
 
Cost and-pricing-of-shared-it-services.pdf -
Cost and-pricing-of-shared-it-services.pdf -Cost and-pricing-of-shared-it-services.pdf -
Cost and-pricing-of-shared-it-services.pdf -Karthik Arumugham
 
What exactly am i paying for bmc
What exactly am i paying for   bmcWhat exactly am i paying for   bmc
What exactly am i paying for bmcKarthik Arumugham
 
Bmc it business management suite
Bmc it business management suiteBmc it business management suite
Bmc it business management suiteKarthik Arumugham
 
Bsm for it business management
Bsm for it business managementBsm for it business management
Bsm for it business managementKarthik Arumugham
 
Cost transparency-foundation-datasheet
Cost transparency-foundation-datasheetCost transparency-foundation-datasheet
Cost transparency-foundation-datasheetKarthik Arumugham
 

More from Karthik Arumugham (20)

Wp cost transparency
Wp cost transparencyWp cost transparency
Wp cost transparency
 
Whtppr 0812-financial-mgmt-thirdsky
Whtppr 0812-financial-mgmt-thirdskyWhtppr 0812-financial-mgmt-thirdsky
Whtppr 0812-financial-mgmt-thirdsky
 
Tcp cost-price-modeling-for-sustainable-services-v2 2-1
Tcp cost-price-modeling-for-sustainable-services-v2 2-1Tcp cost-price-modeling-for-sustainable-services-v2 2-1
Tcp cost-price-modeling-for-sustainable-services-v2 2-1
 
Where to build cost model
Where to build cost modelWhere to build cost model
Where to build cost model
 
Screening the-future-uc3-cost-model
Screening the-future-uc3-cost-modelScreening the-future-uc3-cost-model
Screening the-future-uc3-cost-model
 
Pasig cost-modeling-for-sustainable-services
Pasig cost-modeling-for-sustainable-servicesPasig cost-modeling-for-sustainable-services
Pasig cost-modeling-for-sustainable-services
 
H8961 itasaservice-financial-transparency-wsa-wp
H8961 itasaservice-financial-transparency-wsa-wpH8961 itasaservice-financial-transparency-wsa-wp
H8961 itasaservice-financial-transparency-wsa-wp
 
Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012
 
Fs tech-journal-cost-management
Fs tech-journal-cost-managementFs tech-journal-cost-management
Fs tech-journal-cost-management
 
Costing it-services sdlee-mfraser_2011-12-07
Costing it-services sdlee-mfraser_2011-12-07Costing it-services sdlee-mfraser_2011-12-07
Costing it-services sdlee-mfraser_2011-12-07
 
Cni 2012-abrams-cost-model-handout
Cni 2012-abrams-cost-model-handoutCni 2012-abrams-cost-model-handout
Cni 2012-abrams-cost-model-handout
 
Cost and-pricing-of-shared-it-services.pdf -
Cost and-pricing-of-shared-it-services.pdf -Cost and-pricing-of-shared-it-services.pdf -
Cost and-pricing-of-shared-it-services.pdf -
 
What exactly am i paying for bmc
What exactly am i paying for   bmcWhat exactly am i paying for   bmc
What exactly am i paying for bmc
 
Service cost management
Service cost managementService cost management
Service cost management
 
Financial transparency
Financial transparencyFinancial transparency
Financial transparency
 
Business service catalog
Business service catalogBusiness service catalog
Business service catalog
 
Bmc it business management suite
Bmc it business management suiteBmc it business management suite
Bmc it business management suite
 
Bsm for it business management
Bsm for it business managementBsm for it business management
Bsm for it business management
 
Source data-guide
Source data-guideSource data-guide
Source data-guide
 
Cost transparency-foundation-datasheet
Cost transparency-foundation-datasheetCost transparency-foundation-datasheet
Cost transparency-foundation-datasheet
 

Recently uploaded

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 

Recently uploaded (20)

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 

ITIL Service Operation Processes

  • 1. Page 1 Se rvice De sig n Se rvice ITIL Service Strategy SERVICE OPERATION Service Design Continual Service Improvement Service Transition ITIL V3 Core Framework - Service Operation Service Operation Day to day delivery and control process activities for required stable IT services.
  • 2. Page 2 Service Operation  SO will manage a service through its production life of day-to-day management. Main Target Audience: – Service owners, operational staff, vendors and service providers. Main Influencers: –Customers, end users, business and IT Management
  • 3. Page 3 Scope of Service Operation  Execution & Ongoing Activities – Provided Services  Internal & External – Service Management Processes  Service Operation & Other Lifecycle Processes – Technology  Managing Technology – People  Consumers of Services  Providers of Services
  • 4. Page 4 SO – Value to the Business  Actual delivery of services  Relationship with and satisfaction of customers is improved  Provision of what is required by the business is provided and planned for  From customer viewpoint, it is where actual value is seen.
  • 5. Page 5 The Principles of SO Balancing in Service Operation It is necessary to achieve a balance between : – Internal vs. External view – Stability vs. Responsiveness – Quality vs. Cost – Reactive vs. Proactive
  • 7. Page 7 Achieving Balance in SO  Internal View – Used by IT to Manage the Delivery of Services – Functional Technological Segmentation – Functional Focus in Maximizing Its Technology  External View – Services as Experienced by Users & Customers – Little or No Appreciation of “Technological Elegance” – Concerned with Quality of Service.
  • 8. Page 8 Balancing Stability vs. Responsiveness  Stable & Available – Technology – Compliance – Technology’s Gatekeeper – As Long as it works with the Existing Technology – Drives towards a “Steady State”  Business Needs Change – Demand Outpaces the Thought Process – New projects Siphon Resources From Existing Services – Technology “Grab Bag” – Disproportionate Consumption of Resources – Take Care of the Future – Don’t Worry About Today
  • 9. Page 9 Balancing QoS vs. CoS  Good, Fast or Cheap – Pick Any Two  Cheap is Never the Least Expensive  Over-Delivering Doesn’t Ensure Quality  Balance is Optimization – Bring Quality in Line With Value of the Service Note: “Value” NOT “Cost” – Quality Costs Less Early in the Lifecycle…..and More Later in the Lifecycle
  • 10. Page 10 Balancing Reactive vs. Proactive  Reactive Organization – Waits for Stuff to happen – Firefighting is a Way of Life – Heroes Are Revered  Proactive Organization – Constantly Looking for Improvement – Fire Prevention is a way of Life – Heroes Are Acknowledged  Investigations Launched into What Went Wrong
  • 11. Page 11 The Process of Service Operation  Incident Management – Coordination of IT resources needed to restore an IT service  Event Management – Monitoring events throughout the IT Infrastructure  Request Fulfillment – Managing customer & user requests that are not the result of an incident.  Problem Management – Finding the root cause of events & incidents  Access Management – Granting authorized users the right to use a service.
  • 12. Page 12 The Process of Service Operation
  • 13. Page 13 Incident Management Goal – To restore normal service operation as quickly as possible with minimum disruption to the business, thus ensuring that the best achievable levels of availability and service are maintained Scope – Incident management includes any Event which disrupts, or which could disrupt a service.  Eg. Hardware failure, Software error, Network faults, Performance issues, etc – Incident reported ( or logged) by technical staff, tools, user(s), etc Benefits – Minimize the disruption and downtime for our users – Maintain a record during the entire Incident life-cycle. (This allows any member of the service team to obtain or provide an up-to-date progress report) – Incidents are dealt with quickly, before they become severe. – Building knowledgebase of known issues to allow quicker resolution of frequent Incidents
  • 14. Page 14 Incident Management – Key Concepts  Incident : An unplanned interruption to an IT Service or a reduction in the quality of an IT service  Impact : A measure of the effect of an Incident, problem or Change on Business Processes.  Response Time : A measure of the time taken to complete an Operation  Resolution Time : The time that elapses between acknowledged receipt of an incident and incident resolution.  Priority : A category used to identify the relative importance of an incident, problem or change.  Hierarchical Escalation: Informing or involving more senior levels of management to assist in an escalation  Functional Escalation: Transferring an incident, problem or change to a technical team with a higher level of expertise to assist in an escalation.
  • 15. Page 15 Incident Lifecycle The progression of an incident through a standard process flow. The key stages in the flow are: Incident Detecting and Recording Initial Classifcation and Support Investigation and Diagnosis Resolution and Recovery Closure
  • 16. Page 16 Incident Logging  Sources of Incidents – Users – Operations – Network management – Systems Management Tools  Record Incident Information  Alert Other IT Domains – Operations – Network Management
  • 17. Page 17 Incident Categorization  Gather additional Information – Key Data Elements  Classification Using – Standard Coding Scheme  Match to Knowledge Base – Previous Incidents – Problems – Know Errors  Assign Initial Priority  Escalate if Necessary
  • 19. Page 19 Incident Priority  What Does It Do to the business? – Business Impact  How Quickly Does it Have to Be Fixed? – Business Urgency  Priority Assignment – Function of Impact & Urgency Priority = Urgency x Impact Impact = Effort upon the Business Urgency = Extent to which the resolution can bear delay.
  • 20. Page 20 Impact  Impact is defined as the number of people affected by a service outage.  Low Impact: One customer affected, where no executive or executive staff are involved.  Medium Impact: Several customers are affected, or an executive or executive staff are involved.  High Impact: Whole organization, complete department or building affected, or revenue/financial systems affected
  • 21. Page 21 Urgency  Urgency is defined as the affect of the event on a customer’s ability to work.  Low Urgency: Ability not impaired, the customer is requesting extra or additional functions or services (a service request).  Medium Urgency: Abilities are partially impaired, and customers cannot use certain functions or services.  High Urgency: Abilities are completely impaired and customers cannot work.
  • 22. Page 22 Priority Priority is based on Impact and Urgency. The priority determines how quickly the issue needs to be addressed.  Low Priority: Work to be completed in 4 business days.  Medium Priority: Work to be completed in 2 business days.  High Priority: Work to be completed in 4 hours.  Urgent Priority: Work to be completed in 2 hours.
  • 23. Page 23 Incident Priority Priority = Urgency x Impact Urgency = Extent to which the resolution can bear delay Impact = Effort upon the Business How quickly does it have to be fixed? – Business Urgency  What does it do to the business? – Business Impact
  • 24. Page 24 Incident Class Incident Class Description Priority 1 (P1 Critical) Key production system/s failed or unavailable causing severe disruption to primary business operations. Priority 2 (P2 High) A critical system/s failed or unavailable causing disruption and impact to critical business operations. No reasonable workaround available in terms of risk, effort and customer impact. Priority 3 (P3 Medium) Some production system/s and or functions are degraded causing medium impact. A reasonable workaround is available but a permanent solution is required. Priority 4 (P4 Low) Some system functionality has failed or is unavailable with minimal inconvenience to users. Business disruption is minimal and a workaround is available. A permanent solution is required.
  • 25. Page 25 Response & Resolution times for Incidents Response Time Resolution Time Incident Priority During regular support hours During on call support hours During regular support hours* During on call support hours* Priority 1 15 min. ½ hour 4 hours 4 hours Priority 2 1 hour 4 hours 6 hours 8 hours Priority 3 4 hours N/A 3 w/days N/A Priority 4 1 w/day N/A As agreed N/A
  • 27. Page 27 Incident Diagnosis  Coordinate Activities – Investigation – Diagnosis  Escalation – Functional – Hierarchical  Coordinate Development of a Workaround  Iterative Process – Keep User Informed
  • 28. Page 28 Incident Escalation 2nd Line Support Team 3rd Line Support Team Service Desk Manager Service Desk Support Team 3rd Line Manager 2nd Line Manager IT Service Manager Functional (competence) Hierarchical(authority)  Functional – First Level to Second Level to third level, Etc. – Increased Requirements for Technical Expertise – Often Based on Elapsed Time to avoid a Service Level Breach  Hierarchical – When Resolution is Not Likely in Time to Avoid a Service Level Breach – Inform in Advance so Timely Action can be taken – Allows Time for Corrective Action
  • 29. Page 29 Escalation Process for Incident Management Escalation level Name and Designation Level 1 Service IT Level 2 Chennai Messaging Team Level 3 Manager Level 4 Group Manager Below chart shows the timelines for escalation for incidents after the defined resolution time has expired. Severity Level 1 Escalation Level 2 Escalation Level 3 Escalation Level 4 Escalation Priority 1 (Critical) 0 Hour** 1/2 Hour 1 Hour 2 hours Priority 2 (High) 1 Hour 4 Hours 8 Hours 2 w/days Priority 3 (Medium) 1 w/day 2 w/days 5 w/days N/A Priority 4 (Low) 3 w/days 5 w/days N/A N/A
  • 30. Page 30 Incident Resolution & Recovery  Matches to Knowledge Base – Problems – Known Errors  Clean Up / Restore Service – Restore Files – Boot Server  Update Incident Record  Raise RFC?
  • 31. Page 31 Incident Closure Activity  Incident Review – Review the Incident against Known Errors problem, solutions, planned changes or knowledge base  Final Classification – Standard Coding Scheme – Enables Quality Analysis  Restricted Authority – Reduced Temptation to “Edit History”
  • 33. Page 33 Incident Management – CSFs & KPIs Critical Success Factors : – Maintaining IT Service Quality – Maintaining Customer Satisfaction – Resolving Incidents within established Service Times Key Performance Indicators: Maintaining IT Service Quality – Number of Severity 1 incidents (total and by category) – Number of Severity 2 incidents (total and by category) – Number of other incidents (total and by category) – Number of incidents incorrectly escalated – Number of incidents bypassing Service Desk – Number of incidents not closed/resolved with workarounds – Number of incidents reopened
  • 34. Page 34 Incident Management – CSFs & KPIs  Maintaining Customer Satisfaction – Number of User/Customer surveys sent – Number of User/Customer surveys responded to – Average User/Customer survey score (total and by question category) – Average queue time waiting for Incident response  Resolving Incidents Within Established Service Times – Number of incidents logged – Number of incidents resolved by Service Desk – Number of incidents escalated by Service Desk – Average time to restore service from point of first call – Average time to restore Severity 1 incidents – Average time to restore Severity 2 incidents
  • 35. Page 35 Incident Management Reports Incident Management reports may include: – Size of current Incident backlog – Number and percentage of Major Incidents – Percentage of Incidents handled within agreed resolution time. – Number and percentage of Incidents incorrectly assigned – Number and percentage of Incidents incorrectly categorized.
  • 36. Page 36 Incident Management - Roles  Incident Manager – Manages Work of Incident Support Staff  First Line Support – Normally the Service Desk  Second Line Support – Generally Higher Technical Skills  Third Line Support – Internal Technical Support – Third-party Support
  • 37. Page 37 Incident Management - Challenges  Incident must be detected as early as possible  Convince all staff that all Incidents must be logged  Availability of information about Problems and Known Errors, workarounds.  Integration into the Configuration Management System  Integration into the Service Level management process
  • 38. Page 38 Event Management Purpose: – Provides the basis for Operational Monitoring & Control Goal : – Monitor all events to enable the achievement of normal operation. Objectives : – Detect, analyze & direct appropriate control actions.
  • 39. Page 39 Importance of Event Management  The ability to monitor and decipher the continuous flow of information about the status of service components is key.  Formal Event Management detects fluctuations in component and service performance, which can be tuned dynamically to suit each condition.  Provides the ability to detect events, make sense of them  Can be used as a basis for automating many Operations Mgt activities, e.g. Executing scripts on remote devices, submitting jobs for processing  Provides an entry point for execution of many Service Operation processes & activities  Provides:- monitoring of SLA’s; basis for Service Assurance & Reporting, and Service Improvement
  • 40. Page 40 Event Management – Key Concepts  Event - Any detectable occurrence in the IT infrastructure.  Monitoring - Monitoring refers to the activity of observing a situation to detect changes that happen over time  Reporting - Reporting refers to the analysis , production and distribution of the output of the monitoring activity  Alert - A threshold has been exceeded  Event correlation - To understand events they are analyzed against other events and their configuration items  Event filtering - Filtering decides if the event is informational, warning or exception – Event Information - no action required ( An IT user may be logging on to a system) – Warning - A threshold is soon to be reached or unauthorized IT event has occurred (An IT user is using unauthorized software) – Exception - Typically a configuration item acting abnormally or a new configuration item has been implemented (An IT user is logged onto a system where memory seems to be filling up too quickly)
  • 41. Page 41 Event Management – Desirable Tool Features  Multi-environmental, open interface to allow monitoring across heterogeneous services & entire IT infrastructure  Easy to deploy, with minimum setup costs  ‘Standard Agents’ to monitor most common components/systems  Open interfaces to accept any standard e.g. SNMP event input  Centralised routing of all events to a single location programmable to allow different location(s) at various times.  Support for design/test phases  Programmable assessment and handling of alerts depending on symptoms & impact  Ability to allow an operator to acknowledge an alert, or if no response then automatically escalate  Good reporting functionality to allow feedback into design & transition phases as well as meaningful management info & and business user dashboard
  • 42. Page 42 Event Management Roles  The Role of the Service desk – Initial Support, Escalation, Communications  Role of Technical and Application Management – Define, Manage Events – Deal with Incidents and Problems related to Event  IT Operations Management – Event Monitoring, provide initial response
  • 43. Page 43 Request Fulfillment Purpose : – Manage non-incident related customer or user requests Goal : – Facilitate the timely and accurate fulfillment of request for service Objective : – Deliver requested pre-approved standard services.
  • 44. Page 44 Request Fulfillment Roles  Service Desk Staff – Service Desk and Incident Management staff provides initial response and handles the request  Staff in other appropriate functions – Responsible for ensuring eventual fulfillment of the request.  External Suppliers, as appropriate – As per the request from the organizations, fulfill the Service Request.
  • 45. Page 45 Problem Management Goal – To minimize the adverse effect on the business of incidents and problems caused by errors in the infrastructure, and to proactively prevent the occurrence of incidents, problems and errors Scope – Identify and resolve IT problems that affect IT services  To minimize the impact of problems and incidents – Pro-active problem management  To reduce the overall number of IT incidents – Maintain information about problems and the appropriate workarounds and resolutions – To ensure that the right level and number of resources are resolving specific problems – Maintaining relationships with third party suppliers Benefits – Identifies and escalates a problem to the highest priority. – Ensures involvement by appropriate staff involved in providing any aspect of the service affected. – Ensures that all possible causes are explored. – Provides needed communication and follow up to ensure resolution. – Learning from experience – the process provides historical data to identify trends, the means of preventing failures and of reducing the impact of failures
  • 46. Page 46 Problem Management – Key Concepts  Problem : – “The unknown root cause of one or more Incidents”  Workaround : – “ A temporary way of overcoming technical difficulties (i.e., Incidents or problems”)  Known Error – “ Problem that has a documented Root Cause and a workaround”  Known Error Database (KEDB) – “Database containing all Known Error Records”
  • 47. Page 47 Problem Management ProblemsIncidents } } } Known Errors Request for Change } } } • How well does IT respond to incidents? • How much does it cost? • Are all incidents logged and tracked? • How is customer satisfaction? • What % of incidents are studied for root causes? • How many FTE? • How quickly is it done? • How much does it cost? • How good are we? • How much does it cost to id a root cause? How many FTE? • What % of problems have identified root causes • How many incidents were caused by changes? • How many changes of each type? • How much do they cost? • How many root causes were eliminated and what % of incidents does that represent?
  • 48. Page 48 Difference between Incident and Problem Management  Incident Management – Restores agreed levels of service – Uses workarounds  Incidents and Service Requests are formally managed through a staged process to conclusion. This process is referred to as the "Incident Management Lifecycle".  The objective of the Incident Management Lifecycle is to restore the service as quickly as possible to meet Service Level Agreements.  The process is primarily aimed at the user level.  Problem Management – Diagnoses the root cause of incidents – Identifies a permanent solution – May take longer than Incident Management  Problem Management deals with resolving the underlying cause of one or more Incidents. The focus of Problem Management is to resolve the root cause of errors and to find permanent solutions.  Although every effort will be made to resolve the problem as quickly as possible this process is focused on the resolution of the problem rather than the speed of the resolution.  This process deals at the enterprise level.
  • 50. Page 50 Problem Management Activities The main activities involved in Problem Management are:  Problem Control – Its responsible for logging and classifying problems to determine their causes and turn them into known errors.  Error Control – records known errors and proposes solutions to them by means of RFCs which are sent to Change Management. It also conducts Post-Implementation Review of these changes in close collaboration with Change Management.  Proactive Problem Management – Analysis of trends from incident records provides view on potential problems before they occur
  • 51. Page 51 Problem Control  The main objective of Problem Control is to turn problems into Known Errors so that Error Control can propose the relevant solutions.  Problem Control basically consists of three phases: 1. Identification and Logging 2. Classification and Allocation of Resources. 3. Analysis and Diagnosis: Known error
  • 52. Page 52 Problem Control 1. Identification and Logging – One of the main tasks of Problem Management is to identify problems. The main sources of information used are:  The incident database  Analysis of IT infrastructure  Service Level Degradation 2. Classification and Allocation of Resources. – Problems are classified according to their general characteristics, such as whether they are hardware or software problems, the functional areas affected and details of the various configuration items (CIs) involved. 3. Analysis and Diagnosis: Known error – The main objectives of the process of analysis are:  Determining the causes of the problem.  Providing work-arounds for Incident Management to minimise the impact of the problem until the necessary changes are made so as to resolve the problem definitively.
  • 53. Page 53 Error Control  Once Problem Control has determined the causes of a problem, Error Control is responsible for logging it as a known error. – Error identification and recording  faulty CI is detected, and known error status is assigned. – Error assessment  initial assessment of means required to solve the problem and raising of an RFC. – Recording error resolution  solution for each known error should be in the PM system, made available for incident matching – Error closure  After successful implementation of the change, the error is closed together with all associated Incident records. – Monitoring problem and error resolution progress  Change management is responsible for implementing RFCs, but error control is responsible for monitoring progress in resolving known errors.
  • 54. Page 54 Proactive problem management  Problem Management may be:  Reactive: Analysing incidents that have occurred in order to discover their causes and propose solutions to them.  Proactive: Monitoring the quality of the IT infrastructure and analysing its configuration in order to prevent incidents even before they happen.  Proactive problem management activities are concerned with identifying and resolving problems and known errors before Incidents occur  Trend analysis  identify “fragile” components and their reason. Requires availability of sufficient historical data. – Targeting support action  towards problem areas requiring most support time, or causing most impact to the business (volume of incidents, number of users impacted, cost to the business). – Providing information to organization  Providing insight in effort and resources spent by organization in diagnosing and resolving problems and known errors to management. Also information on workarounds, permanent fixes, and status information should be given to Service Desk.
  • 55. Page 55 Problem Management - Reporting  Items that can be reported to IT management – Time spent on research and diagnosis – Brief description of actions taken – Planning unresolved problems with regard to use of people, use of tools, and costs – Problems categorized into: status, service, impact, category, user group – Turnaround time of closed problems – Elapsed time and expected resolution period for unresolved problems – Temporary corrective actions  Items that are important for Service Level Management – Number of problems categorized into: user group, category, impact, service – Turnaround time of closed problems – Expected solution period for unresolved problems  Items that are important for Service Desk – Status of problems – Information on bypasses
  • 56. Page 56 Service Desk – IM – PM (PC) (EC) - CM User Incident DB Problem DB Known Error DB Business Case to FIX Raise RFC ERROR CONTROL PROBLEMCONTROL Known Error One or More Incidents with Unknown Underlying cause Root Cause Known and Temp or Perm Fix found STOP NO YES Change Management Incident PM PM PM SD/IM IM
  • 57. Page 57 Problem Management CSFs & KPIs Critical Success Factors  Avoiding Repeated Incidents  Minimizing Impact Of Problems Key Performance Indicators  Avoiding Repeated Incidents – Number of repeat incidents – Number of existing Problems – Number of existing Known Errors Minimizing Impact of Problems – Average time for diagnosis of Problems – Average time for resolution of Known Errors – Number of open Problems – Number of open Known Errors – Number of repeat Problems – Number of Major Incident/Problem reviews
  • 58. Page 58 Access Management Goal : – To grant authorized users the right to use a service, while preventing access to non- authorized users. Scope: – Execute the policies & actions defined by Security & Availability. Benefits
  • 59. Page 59 Access Management – Basic Concepts  Access – Refers to the level and extent of a Service’s functionality or data that a user is entitled to use.  Identity – Information about a user that distinguishes them as an Individual, and which verifies their status within the organization. By definition, the Identity of a user is unique to that user.  Rights ( or Privileges) – Refers to the actual settings whereby a user is provided access to a Service or group of Services. Typical rights, or levels of access include read, write, execute, change, delete.  Service or Service Groups – Ability to grant each user (or group of users) access to the whole set of Services tat they are entitled to use at the same time.  Directory Services – A specific type of tool that is used to manage access and rights.
  • 60. Page 60 Access Management Activities  Requesting Access – Request for access could be a Request for Change (RFC) into the Change Management System (Service Transition) or a Service Request from the Request Fulfillment System (Service Operation). – The Security policies will define which areas and departments may request access, and the Access Management process will design the mechanisms to carry out that request.  Verification – The verification activity verifies a request for access to ensure that the user requesting the access is who he/she says he/she is, and that the user has a legitimate requirement for the service. – Depending on the levels of risk to the organization, the Security policies may define different levels of verifications to access different services.  Providing Rights – Once it has verified a user, Access Management provides the appropriate rights to him/her. – The Security policy defines the rights that should be available to an individual, and Access Management grants rights based on this information.
  • 61. Page 61 Access Management Activities (Cont)  Monitoring Identity Status – One of the problems with many manual Access Management systems in use today is that there is no easy way to monitor when a user changes roles or Identity Status. – Typical events that trigger a change in Identity Status are job changes, promotions or demotions, transfers, resignation or death, retirement, disciplinary action, dismissals.  Logging and Tracking Access – All Technical and Application Management monitoring activities should include reviews of Access rights and utilization to ensure that the rights are being properly used. – The review should direct all exceptions to Incident Management for investigation  Removing or Restricting Rights – Users do not stay in the same jobs or roles forever, and neither should their access rights. – This is another place to set up standard procedures and policies to more easily identify events requiring the removal or restriction of rights.
  • 62. Page 62 Access Management Roles  Information Security Managers – Define and Maintain Policies for this process  Service Desk Staff – Handle the Requests  Staff in other functions (e.g., Technical and Application management) – Execution of the requests
  • 63. Page 63 Functions of Service Operations  Service Desk  Technical Management  Application Management  IT Operations Management
  • 64. Page 64 Service Desk  Goal – To act as the Single Point of Contact (SPOC) between the User and IT Service Management – To handle Incidents and request and provide an interface for other activities such as  Change Management  Problem Management  Configuration Management  Release Management  Service Level Management  IT Service Continuity Management  Benefits – Improved User service, perception and satisfaction – Increased User accessibility via the single point of contact – Improved quality and faster response to User requests – More effective and efficient use of support resources – Better management information to make decision on support
  • 65. Page 65 Service Desk - Objectives  Logging ALL Incidents & Request  First Line – Investigation & Diagnosis  Incident & Request Resolution  Functional and Hierarchal Escalation  Customer Communication – Incident Progress – Pending Changes ( Forward Schedule of Changes) – Agreed Outages ( Projected Service Availability)  Satisfaction Surveys
  • 66. Page 66 Service Desk  Call Center – To handle large volumes of telephone based transactions like telesales or order processing  Help Desk – To manage and resolve incidents quickly and effectively, and to make sure all requests are followed up  Service Desk – To extend beyond the range of services offered by the HD to allow business processes to be integrated into Service Management infrastructure – In addition to handling incidents, to provide an interface for managing changes, SLM, maintenance issues, software licensing, IT Service Continuity Management, Financial, Availability and Configuration Management  All three organizations share these characteristics: – They aim to achieve customer satisfaction – They use technology, people and processes to provide a service to the business
  • 67. Page 67 Service Desk - Objectives  Logging ALL Incidents & Request  First Line – Investigation & Diagnosis  Incident & Request Resolution  Functional and Hierarchal Escalation  Customer Communication – Incident Progress – Pending Changes ( Forward Schedule of Changes) – Agreed Outages ( Projected Service Availability)  Satisfaction Surveys
  • 68. Page 68 Setting up a Service Desk  Understand the business needs and requirements  Define clear objectives  Obtain support, budget and resources  Advertise and sell benefits / communicate quick wins  Involve and educate users / train support staff
  • 69. Page 69 Service Desk – Organizational Structures  Local Service Desk – Co-located with User Community  Centralized Service Desk – Consolidation of Fewer or Single Service Desk  Virtual Service Desk – Support Staff Geographically Dispersed  Follow the Sun – Two or More Geographically Dispersed Service Desks  Specialized Service Desk Groups – Direct Access to Technical Functional Specialist
  • 70. Page 70 Local Service Desks  Designed to support local business needs  Support is usually in the same location as the business it is supporting  Practical for smaller organizations
  • 72. Page 72 Central Service Desk  Designed to support multiple locations  Service Desk is in a central location while the business is distributed  Ideal for larger organization/economies of scale: – Reduces operational costs – Improves resource usage  Could provide secondary support to local desks
  • 74. Page 74 Virtual Service Desk  Location of Service Desk analysts is invisible to the customers  Common processes and procedures should exist – single incident log  Common agreed language for data entry  Single point of contact per customer  On-site presence may still be needed for some functions  “Workload partitioning” needed
  • 75. Page 75 Service Desk - Virtual
  • 76. Page 76 “Follow the Sun” Option  Not a type of Service Desk but an option usually applied to two or more Central Service Desks for global operations  Where Service Desk support switches between two or more desks to provide 24 hr global cover.  Telephony switching needed  Multilingual staff usually required  Local conditions and cultural issues need to be considered  Clear escalation channels needed
  • 77. Page 77 A Self-Service Strategy  Gives some control to Customers, optionally: – Log new incidents, change requests – Self-help – Order good or services  Can reduce work load on Service Desk  Particularly useful “out of hours” and for non-critical activities  Dependant on a strong knowledge base
  • 78. Page 78 Outsourcing the Service Desk  Potential Benefits – Financial savings – Economies of scale – Access to large skill pool – Improved staff and service cover – Competitive marketplace  Care Needed – Viewing the Service Desk as an overload is damaging – SD is the “window of service and professionalism” – Intellectual capital should be protected – Seek “vendor partnerships” and long-term relationships
  • 79. Page 79 Service Desk - Staffing  Staffing Levels – Based on Business Requirements – Customer Service Expectations  Skill Levels – Interpersonal – Business Awareness – Communication – Technical Awareness  Training – New Service Introduction – Business Awareness  Retention – Learning Organization – Team Building  Support Users – User Liaison to Filter Requests
  • 80. Page 80 Service Desk - Metrics  First Line Resolution  Average Time to Resolve  Average Time to Escalate  Cost Per Incident/Request  Customer Updates Completed on Time  Incident/Request Volumes – Hour of Day – Day of week – Week of Month
  • 81. Page 81 Technical Management Technical management is involved in all aspects of the Service Lifecycle. Its activities include : – Acquire and maintain require technical expertise – Skills documentation – Initial and on-going skills training – Design and delivery of user training – Standard definition – Service Design – Project Staffing – Testing – Service Transition (change, release & deployment) – Continual Service Improvement – Service Operation – Diagnosis and recovery from technical failures.
  • 82. Page 82 Technical Management  Role: – Custodian of Technical Knowledge – Support Resources to the ITSM Lifecycle  Objectives – Participate in Planning, Implementation & Maintaining a Stable Technical Infrastructure.
  • 83. Page 83 Application Management  Application management has the overall responsibility for managing applications throughout their lifecycle.  It may involve a number of different application development groups.  Its objective is to design of cost-effective applications that meet the needs of the business customer in support of their business process.  Delivery of the required features and functionality needed to provide the utility and warranty required.  Maintenance of software applications is very important to the overall quality of the services provided.
  • 84. Page 84 Application Management  Role : – Custodian of Application Management – Support Resources to the ITSM Lifecycle  Objective – Well Designed, Resilient & Cost Effective Applications – Deliver Required Functionality – Demonstrate Technical Expertise in Maintenance
  • 85. Page 85 IT Operations Management  Operations Management includes the functional groups involved in day-to-day operational activities  Operation Control oversees and monitors the operational activities in the IT infrastructure  Facilities Management manages the physical IT environment  Its objective is to ensure IT service is achieved and maintained  It is responsible for the optimization of support costs
  • 86. Page 86 IT Operations Management  Role: – IT Operations Control  Maintain stability of day-to-day processes and activities – Facilities Management  Management of Physical IT environment, usually data centers or computer rooms.  Objectives – Achieves & Maintain Stability – Improve Service & Reduce Costs – Demonstrate Responsiveness to Operational Failures
  • 87. Page 87 IT Operations Management IT Operation Management IT Operation Control  Console Management  Job Scheduling  Backup and Restore  Print Na Output  Maintenance activities Facilities Management  Data Centre  Computer Rooms  Recovery Sites  Power and air conditioning  Fire and security systems