SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Expanding the Expanded Incident Lifecycle

The workable, practical guide to Do IT Yourself

Page 1 of 4

Vol. 5.7 • February 18, 2009

Expanding the Expanded Incident Lifecycle
By Janet Kuhn, Vice President, itSM Solutions LLC

A

key to improving the quality of IT service begins with understanding and utilizing one of
ITIL’s simplest concepts - the Expanded Incident Lifecycle.
If you have attended an ITIL Foundation course, you undoubtedly remember the slide
depicting the Expanded Incident Lifecycle (Figure 1, below). That is the graphical timeline
that starts with an Incident on the left, progresses through the various stages of diagnosis,
repair, restoration and closure, and then continues to the next Incident.
The labels dispersed along the Incident timeline are not just handy monikers that the Service Desk uses to report the
changing state of an Incident. They represent critical intersections of ITIL processes and activities and provide a roadmap
to shorten the time to recover from an Incident and lengthen the time of error-free operation.

Mean Times to . . .
Before we start, let’s review a few key ITIL measurements, the “Mean Times to . . .”
MTTR (Mean Time to Repair) - This is the average elapsed time between detecting an Incident and repairing the failed
component; e.g., diagnosing and replacing a failed disk. Upon the completion of this activity, there is a functioning disk,
but data has not been restored, and the users are still unable to access or use the service.
Essentially this measures the technical response to diagnose and repair the failed component. The shorter this time, the
better because shortened times mean less downtime for the user.
MTRS (Mean Time to Restore Service) - This is the average elapsed time between detecting an Incident and fully
restoring the service to the user; e.g., restoring data to the disk, recovering and restarting interfaces to other applications,
informing the users that the service is available, and initiating user access (you may not want all of your users to log in
simultaneously upon repair of the service!).
This is a measure of the quality of your operational processes, as well as system design to facilitate recovery after failure.
Again, shortening these times should be your goal.
MTBF (Mean Time Between Failures) - This is the average elapsed time between restoration of service following an
Incident and detection of the next Incident. In this case, a big number representing a long time between failures is good
because it indicates a reliable service.
MTBSI (Mean Time Between System Incidents) - This is the average elapsed time between Incidents, including
downtime represented by the MTTR and MTRS measurements. By understanding the proportion of repair and restoration
time versus failure-free time for a particular service, you can begin to prioritize service and system improvements. For
example, you may decide to commit resources to improving a critical business service that experiences few, but lengthy,
failures, and give a lower priority to repairing a less business-critical service that experiences frequent failures, but which
require few resources and time to restore.

http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm

2/18/2009
Expanding the Expanded Incident Lifecycle

Page 2 of 4

Figure 1

Expanding the Expanded Incident Lifecycle
Now that we’ve looked at what the Expanded Incident Lifecycle diagram tells us, let’s take a look at which ITIL processes
support it, and how you can use it to pinpoint areas to automate or improve.
Occurrence – By definition, an Incident is an unplanned disruption to an agreed service. ITIL offers a number of
proactive ways to protect a service:
Capacity Management – Capacity Management seeks to ensure that proactive measures to improve performance of
services are implemented when it is cost-justifiable to do so.
Availability Management – Availability Management identifies Vital Business Functions (VBF) that are critical to
the business and implements designs that reduce the likelihood of unavailability.
IT Service Continuity Management – IT Service Continuity Management (ITSCM) evaluates risks and threats to IT
services and seeks to avoid them or to moderate them if they do occur.
Information Security Management – Information Security Management proactively improves security controls,
security risk management and reduction of security risks.
Access Management – Access Management executes policies set by Information Security Management.
Service Level Management – Service Level Management does not really prevent Incidents, but it works with the
business to define the levels of agreed services.
Detection - Incident resolution starts when a user or an automated system detects an error with a Configuration Item.
Detection generally occurs sometime after the occurrence of the event. The goal is to shorten the time between Occurrence
and Detection as much as possible. This activity ties directly to:
Capacity Management – Capacity Management ensures capacity can be monitored and measured.
Event Management – Event Management establishes threshold monitoring activities to detect Incidents early.
Incident Management – Incident Management should interface with the Service Desk and Event Management (as
well as the Operations Management and Technical Management functions) to bring all Incidents under the control
of Incident Management.
Service Desk – The Service Desk should have many channels for users to report Incidents when they occur.
Diagnosis – During this stage, staff members try to identify the characteristics of the Incident and match it to previous
Incidents, Problems and Known Errors. If Incident Management cannot match the Incident, the Problem Management
process should start.
Incident Management – Establish a good interface with Problem Management to match the Incident to existing
Problems and Known Errors or to report a new Problem.
Problem Management – Establish strong Problem Management procedures to rapidly and accurately diagnose
problems.

http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm

2/18/2009
Expanding the Expanded Incident Lifecycle

Page 3 of 4

Supplier Management – Establish Supplier Management procedures that document how third-party suppliers will
be involved in diagnosis activities.
Service Level Management – Agree and establish Operational Level Agreements (OLA) with the Operations and
Technical Management functions so everyone knows how to prioritize an Incident or Problem.
Technical Management Function – Document working procedures so that all staff knows what their roles and
responsibilities for diagnosing Problems are.
Repair – Sometimes a repair might raise a Request for Change (RFC) to change one or more Configuration Items (CI).
After the CI is repaired, it may still be unavailable to the user and require recovery.
Change Management – Establish strong Change Management procedures to control changes made as a result of a
problem diagnosis.
Supplier Management – Establish Supplier Management procedures for repairs that are made by third-party service
providers.
Technical Management Function – Ensure Technical Management staff have the proper levels of skills and training.
Recovery – This is the process of restoring the failed CI to the last recoverable state. This includes any required testing,
final adjustment, configuration, etc.
Change Management – Ensure Change Management includes recovery steps in its planning.
Operations/Technical Management Function – Ensure that the Operations/Technical Management functions of
Service Operation document and understand the steps to recovery.
Recovery also has a proactive side, which results in designing services and systems that faster and easier to recover.
Problem Management – Problem Management should review and document problems and potential problems to
develop proactive Problem solutions that can be shared by all IT Service Lifecycle phases and processes.
Service Design – Establish strong Service Design processes to design services to expedite their recovery from failure.
Restoration – Service restoration makes the recovered service available to the user, so that the user can resume work.
Service Desk – Establish a strong interface with the Service Desk to manage user communications during
implementation of the change and restoration of the service.
Service Transition – Establish a strong interface with Service Transition to implement changes and restore service
to the users.
Operations Management Function – Establish good documented procedures with the Operations Management
Function to implement changes and restore service to the users.
Technical Management Function – Establish good documented procedures with the Technical Management Function
to implement changes and restore service to the users.
On the proactive side, restoration capabilities can be “designed into” the service:
Service Design – Service Design should include restoration considerations in its analysis and design of new services.
Closure – Closure occurs some time after restoration. It should give the user ample time to “shake out” the repaired
service to ensure that it is really working, but it should not be so far into the future that users and staff have difficulty
reconstructing what the parameters of the actual failure were.
Service Desk/Incident Management – The Service Desk and Incident Management process should formally close
each Incident after verifying its closure with the user.
Change Management – Change Management includes an immediate technical review to ensure that the Change has
been implemented properly and does not create other problems. Later it does a long-term review to determine
whether the change has created the benefits (beyond resolving a Problem) that the user had anticipated.
Service Level Management – The Service Level Management process should agree with the business what
constitutes “closure” of an Incident. Also, it includes Incidents in its periodic performance reviews with the business.

http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm

2/18/2009
Expanding the Expanded Incident Lifecycle

Page 4 of 4

The Final Step – Closing the Loop
You do not see the “final” step in the Expanded Incident Lifecycle because it is not really a step, but an action “implied” by
the four “Mean Time” measurements.
The last step that ties together the steps along the timeline is to use MTTR, MTRS, MTBF and MTBSI to measure and
analyze the effectiveness and efficiency of all of the activities and processes that contribute to Incident restoration.
Were appropriate resources available to assist with the Incident resolution? Were appropriate interfaces in place so that
resources could be applied in a timely manner?
And, finally, did you learn something that can help the process work better the next time – or prevent the Incident from
occurring?

Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved.
ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002).

http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm

2/18/2009

Weitere ähnliche Inhalte

Was ist angesagt?

A framework for streamlining globally integrated services
A framework for streamlining globally integrated servicesA framework for streamlining globally integrated services
A framework for streamlining globally integrated servicesAli Elkhateb
 
ITIL Foundation V2 200 Sample Questions
ITIL Foundation V2 200 Sample QuestionsITIL Foundation V2 200 Sample Questions
ITIL Foundation V2 200 Sample QuestionsRoberto Pena
 
Lean Itil Event Management
Lean Itil Event ManagementLean Itil Event Management
Lean Itil Event ManagementMd Imran
 
Functions in Service Operation
Functions in Service OperationFunctions in Service Operation
Functions in Service Operationnuwulang
 
Availability Management PD v2.1 06.02.2015
Availability Management PD v2.1 06.02.2015Availability Management PD v2.1 06.02.2015
Availability Management PD v2.1 06.02.2015Patrick McQuinn
 
Introduction to service management quizes
Introduction to service management quizesIntroduction to service management quizes
Introduction to service management quizesnuwulang
 
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...Margeaux Girardin
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
 
An Availability Management Guide
An Availability Management GuideAn Availability Management Guide
An Availability Management GuideSimon Pritchard
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsPrasad Deshpande
 
IT Disaster Recovery Readiness
IT Disaster Recovery ReadinessIT Disaster Recovery Readiness
IT Disaster Recovery ReadinessBashar Alkhatib
 
Help desk assessment report.x10
Help desk assessment report.x10Help desk assessment report.x10
Help desk assessment report.x10rajanam
 
ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar ITSM Academy, Inc.
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
ITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - SignedITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - SignedMohammed Sirajudeen
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
Change management - ITIL Series
Change management - ITIL SeriesChange management - ITIL Series
Change management - ITIL SeriesYudi FlasheR
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesSlideTeam
 

Was ist angesagt? (20)

Dit yvol5iss4
Dit yvol5iss4Dit yvol5iss4
Dit yvol5iss4
 
A framework for streamlining globally integrated services
A framework for streamlining globally integrated servicesA framework for streamlining globally integrated services
A framework for streamlining globally integrated services
 
ITIL Foundation V2 200 Sample Questions
ITIL Foundation V2 200 Sample QuestionsITIL Foundation V2 200 Sample Questions
ITIL Foundation V2 200 Sample Questions
 
Lean Itil Event Management
Lean Itil Event ManagementLean Itil Event Management
Lean Itil Event Management
 
Functions in Service Operation
Functions in Service OperationFunctions in Service Operation
Functions in Service Operation
 
Availability Management PD v2.1 06.02.2015
Availability Management PD v2.1 06.02.2015Availability Management PD v2.1 06.02.2015
Availability Management PD v2.1 06.02.2015
 
Introduction to service management quizes
Introduction to service management quizesIntroduction to service management quizes
Introduction to service management quizes
 
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
Planisware cm jak_06a
Planisware cm jak_06aPlanisware cm jak_06a
Planisware cm jak_06a
 
An Availability Management Guide
An Availability Management GuideAn Availability Management Guide
An Availability Management Guide
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
 
IT Disaster Recovery Readiness
IT Disaster Recovery ReadinessIT Disaster Recovery Readiness
IT Disaster Recovery Readiness
 
Help desk assessment report.x10
Help desk assessment report.x10Help desk assessment report.x10
Help desk assessment report.x10
 
ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
ITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - SignedITIL 2011 Foundation All Volumes - Signed
ITIL 2011 Foundation All Volumes - Signed
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Change management - ITIL Series
Change management - ITIL SeriesChange management - ITIL Series
Change management - ITIL Series
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 

Andere mochten auch

1.google hangouts skills v1
1.google hangouts skills v11.google hangouts skills v1
1.google hangouts skills v1NOEL TENO
 
Career Streams Proposal to Universities
Career Streams Proposal to UniversitiesCareer Streams Proposal to Universities
Career Streams Proposal to UniversitiesAatish Thakur
 
700 classroom activities
700 classroom activities700 classroom activities
700 classroom activitiesHương Ngố
 
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'an
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'anWelcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'an
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'anAdi Tri Soelistio
 
Chapter 1 pengenalan multimedia
Chapter 1 pengenalan multimediaChapter 1 pengenalan multimedia
Chapter 1 pengenalan multimediaAdi Tri Soelistio
 
History of horror films
History of horror filmsHistory of horror films
History of horror filmsjackmac95
 
Laporan budidaya laut
Laporan budidaya lautLaporan budidaya laut
Laporan budidaya lautIbnu Riyadi
 
0.3 arsitektur mikrokontroler
0.3   arsitektur mikrokontroler0.3   arsitektur mikrokontroler
0.3 arsitektur mikrokontrolerAdi Tri Soelistio
 
Doko.vn 822973-sach-lets-go-starter
Doko.vn 822973-sach-lets-go-starterDoko.vn 822973-sach-lets-go-starter
Doko.vn 822973-sach-lets-go-starterHương Ngố
 

Andere mochten auch (15)

Arbor one-line Poetry
Arbor one-line PoetryArbor one-line Poetry
Arbor one-line Poetry
 
1.google hangouts skills v1
1.google hangouts skills v11.google hangouts skills v1
1.google hangouts skills v1
 
Career Streams Proposal to Universities
Career Streams Proposal to UniversitiesCareer Streams Proposal to Universities
Career Streams Proposal to Universities
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Start up chile
Start up chileStart up chile
Start up chile
 
700 classroom activities
700 classroom activities700 classroom activities
700 classroom activities
 
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'an
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'anWelcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'an
Welcome to My Incredible World Bukti Keakuratan Bilangan Dalam Al-Qur'an
 
Chapter 1 pengenalan multimedia
Chapter 1 pengenalan multimediaChapter 1 pengenalan multimedia
Chapter 1 pengenalan multimedia
 
History of horror films
History of horror filmsHistory of horror films
History of horror films
 
Laporan budidaya laut
Laporan budidaya lautLaporan budidaya laut
Laporan budidaya laut
 
0.3 arsitektur mikrokontroler
0.3   arsitektur mikrokontroler0.3   arsitektur mikrokontroler
0.3 arsitektur mikrokontroler
 
Bbfc
BbfcBbfc
Bbfc
 
Doko.vn 822973-sach-lets-go-starter
Doko.vn 822973-sach-lets-go-starterDoko.vn 822973-sach-lets-go-starter
Doko.vn 822973-sach-lets-go-starter
 
4 sql
4 sql4 sql
4 sql
 

Ähnlich wie Dit yvol5iss7

ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operationMuhammad Zamzani
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Abdulaziz AlFaify
 
Technical Support Helpdesk
Technical Support HelpdeskTechnical Support Helpdesk
Technical Support HelpdeskGagan Singh
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
Itism.v20160321.2eng public
Itism.v20160321.2eng publicItism.v20160321.2eng public
Itism.v20160321.2eng publicVolodymyr Mazur
 
ITIL service design
ITIL service designITIL service design
ITIL service designRasha Ragab
 
FIVE MAINTENANCE TYPES PROCEDURES
FIVE MAINTENANCE TYPES PROCEDURESFIVE MAINTENANCE TYPES PROCEDURES
FIVE MAINTENANCE TYPES PROCEDURESkifayat ullah
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainInfosecTrain
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITILconnorsmaureen
 
IRJET- Automated Problem Resolution using KEDB
IRJET- 	  Automated Problem Resolution using KEDBIRJET- 	  Automated Problem Resolution using KEDB
IRJET- Automated Problem Resolution using KEDBIRJET Journal
 
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docx
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docxBusiness Continuity Plan TemplateCIO Maria Sosa has asked you to p.docx
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docxfelicidaddinwoodie
 
Labtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesLabtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesAnjoum .
 

Ähnlich wie Dit yvol5iss7 (20)

Itsm
ItsmItsm
Itsm
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operation
 
Overview to itil
Overview to itilOverview to itil
Overview to itil
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
 
Technical Support Helpdesk
Technical Support HelpdeskTechnical Support Helpdesk
Technical Support Helpdesk
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
Dit yvol3iss47
Dit yvol3iss47Dit yvol3iss47
Dit yvol3iss47
 
Itil
ItilItil
Itil
 
Itism.v20160321.2eng public
Itism.v20160321.2eng publicItism.v20160321.2eng public
Itism.v20160321.2eng public
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
FIVE MAINTENANCE TYPES PROCEDURES
FIVE MAINTENANCE TYPES PROCEDURESFIVE MAINTENANCE TYPES PROCEDURES
FIVE MAINTENANCE TYPES PROCEDURES
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
 
Dit yvol3iss39
Dit yvol3iss39Dit yvol3iss39
Dit yvol3iss39
 
Maintenance management
Maintenance managementMaintenance management
Maintenance management
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITIL
 
IRJET- Automated Problem Resolution using KEDB
IRJET- 	  Automated Problem Resolution using KEDBIRJET- 	  Automated Problem Resolution using KEDB
IRJET- Automated Problem Resolution using KEDB
 
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docx
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docxBusiness Continuity Plan TemplateCIO Maria Sosa has asked you to p.docx
Business Continuity Plan TemplateCIO Maria Sosa has asked you to p.docx
 
Labtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesLabtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practices
 

Mehr von Rick Lemieux

Mehr von Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 
Dit yvol5iss19
Dit yvol5iss19Dit yvol5iss19
Dit yvol5iss19
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Dit yvol5iss7

  • 1. Expanding the Expanded Incident Lifecycle The workable, practical guide to Do IT Yourself Page 1 of 4 Vol. 5.7 • February 18, 2009 Expanding the Expanded Incident Lifecycle By Janet Kuhn, Vice President, itSM Solutions LLC A key to improving the quality of IT service begins with understanding and utilizing one of ITIL’s simplest concepts - the Expanded Incident Lifecycle. If you have attended an ITIL Foundation course, you undoubtedly remember the slide depicting the Expanded Incident Lifecycle (Figure 1, below). That is the graphical timeline that starts with an Incident on the left, progresses through the various stages of diagnosis, repair, restoration and closure, and then continues to the next Incident. The labels dispersed along the Incident timeline are not just handy monikers that the Service Desk uses to report the changing state of an Incident. They represent critical intersections of ITIL processes and activities and provide a roadmap to shorten the time to recover from an Incident and lengthen the time of error-free operation. Mean Times to . . . Before we start, let’s review a few key ITIL measurements, the “Mean Times to . . .” MTTR (Mean Time to Repair) - This is the average elapsed time between detecting an Incident and repairing the failed component; e.g., diagnosing and replacing a failed disk. Upon the completion of this activity, there is a functioning disk, but data has not been restored, and the users are still unable to access or use the service. Essentially this measures the technical response to diagnose and repair the failed component. The shorter this time, the better because shortened times mean less downtime for the user. MTRS (Mean Time to Restore Service) - This is the average elapsed time between detecting an Incident and fully restoring the service to the user; e.g., restoring data to the disk, recovering and restarting interfaces to other applications, informing the users that the service is available, and initiating user access (you may not want all of your users to log in simultaneously upon repair of the service!). This is a measure of the quality of your operational processes, as well as system design to facilitate recovery after failure. Again, shortening these times should be your goal. MTBF (Mean Time Between Failures) - This is the average elapsed time between restoration of service following an Incident and detection of the next Incident. In this case, a big number representing a long time between failures is good because it indicates a reliable service. MTBSI (Mean Time Between System Incidents) - This is the average elapsed time between Incidents, including downtime represented by the MTTR and MTRS measurements. By understanding the proportion of repair and restoration time versus failure-free time for a particular service, you can begin to prioritize service and system improvements. For example, you may decide to commit resources to improving a critical business service that experiences few, but lengthy, failures, and give a lower priority to repairing a less business-critical service that experiences frequent failures, but which require few resources and time to restore. http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm 2/18/2009
  • 2. Expanding the Expanded Incident Lifecycle Page 2 of 4 Figure 1 Expanding the Expanded Incident Lifecycle Now that we’ve looked at what the Expanded Incident Lifecycle diagram tells us, let’s take a look at which ITIL processes support it, and how you can use it to pinpoint areas to automate or improve. Occurrence – By definition, an Incident is an unplanned disruption to an agreed service. ITIL offers a number of proactive ways to protect a service: Capacity Management – Capacity Management seeks to ensure that proactive measures to improve performance of services are implemented when it is cost-justifiable to do so. Availability Management – Availability Management identifies Vital Business Functions (VBF) that are critical to the business and implements designs that reduce the likelihood of unavailability. IT Service Continuity Management – IT Service Continuity Management (ITSCM) evaluates risks and threats to IT services and seeks to avoid them or to moderate them if they do occur. Information Security Management – Information Security Management proactively improves security controls, security risk management and reduction of security risks. Access Management – Access Management executes policies set by Information Security Management. Service Level Management – Service Level Management does not really prevent Incidents, but it works with the business to define the levels of agreed services. Detection - Incident resolution starts when a user or an automated system detects an error with a Configuration Item. Detection generally occurs sometime after the occurrence of the event. The goal is to shorten the time between Occurrence and Detection as much as possible. This activity ties directly to: Capacity Management – Capacity Management ensures capacity can be monitored and measured. Event Management – Event Management establishes threshold monitoring activities to detect Incidents early. Incident Management – Incident Management should interface with the Service Desk and Event Management (as well as the Operations Management and Technical Management functions) to bring all Incidents under the control of Incident Management. Service Desk – The Service Desk should have many channels for users to report Incidents when they occur. Diagnosis – During this stage, staff members try to identify the characteristics of the Incident and match it to previous Incidents, Problems and Known Errors. If Incident Management cannot match the Incident, the Problem Management process should start. Incident Management – Establish a good interface with Problem Management to match the Incident to existing Problems and Known Errors or to report a new Problem. Problem Management – Establish strong Problem Management procedures to rapidly and accurately diagnose problems. http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm 2/18/2009
  • 3. Expanding the Expanded Incident Lifecycle Page 3 of 4 Supplier Management – Establish Supplier Management procedures that document how third-party suppliers will be involved in diagnosis activities. Service Level Management – Agree and establish Operational Level Agreements (OLA) with the Operations and Technical Management functions so everyone knows how to prioritize an Incident or Problem. Technical Management Function – Document working procedures so that all staff knows what their roles and responsibilities for diagnosing Problems are. Repair – Sometimes a repair might raise a Request for Change (RFC) to change one or more Configuration Items (CI). After the CI is repaired, it may still be unavailable to the user and require recovery. Change Management – Establish strong Change Management procedures to control changes made as a result of a problem diagnosis. Supplier Management – Establish Supplier Management procedures for repairs that are made by third-party service providers. Technical Management Function – Ensure Technical Management staff have the proper levels of skills and training. Recovery – This is the process of restoring the failed CI to the last recoverable state. This includes any required testing, final adjustment, configuration, etc. Change Management – Ensure Change Management includes recovery steps in its planning. Operations/Technical Management Function – Ensure that the Operations/Technical Management functions of Service Operation document and understand the steps to recovery. Recovery also has a proactive side, which results in designing services and systems that faster and easier to recover. Problem Management – Problem Management should review and document problems and potential problems to develop proactive Problem solutions that can be shared by all IT Service Lifecycle phases and processes. Service Design – Establish strong Service Design processes to design services to expedite their recovery from failure. Restoration – Service restoration makes the recovered service available to the user, so that the user can resume work. Service Desk – Establish a strong interface with the Service Desk to manage user communications during implementation of the change and restoration of the service. Service Transition – Establish a strong interface with Service Transition to implement changes and restore service to the users. Operations Management Function – Establish good documented procedures with the Operations Management Function to implement changes and restore service to the users. Technical Management Function – Establish good documented procedures with the Technical Management Function to implement changes and restore service to the users. On the proactive side, restoration capabilities can be “designed into” the service: Service Design – Service Design should include restoration considerations in its analysis and design of new services. Closure – Closure occurs some time after restoration. It should give the user ample time to “shake out” the repaired service to ensure that it is really working, but it should not be so far into the future that users and staff have difficulty reconstructing what the parameters of the actual failure were. Service Desk/Incident Management – The Service Desk and Incident Management process should formally close each Incident after verifying its closure with the user. Change Management – Change Management includes an immediate technical review to ensure that the Change has been implemented properly and does not create other problems. Later it does a long-term review to determine whether the change has created the benefits (beyond resolving a Problem) that the user had anticipated. Service Level Management – The Service Level Management process should agree with the business what constitutes “closure” of an Incident. Also, it includes Incidents in its periodic performance reviews with the business. http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm 2/18/2009
  • 4. Expanding the Expanded Incident Lifecycle Page 4 of 4 The Final Step – Closing the Loop You do not see the “final” step in the Expanded Incident Lifecycle because it is not really a step, but an action “implied” by the four “Mean Time” measurements. The last step that ties together the steps along the timeline is to use MTTR, MTRS, MTBF and MTBSI to measure and analyze the effectiveness and efficiency of all of the activities and processes that contribute to Incident restoration. Were appropriate resources available to assist with the Incident resolution? Were appropriate interfaces in place so that resources could be applied in a timely manner? And, finally, did you learn something that can help the process work better the next time – or prevent the Incident from occurring? Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved. ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm 2/18/2009