17 Mayıs 2015 Pazar

Information Technology Management and Standards Service Operations



1.    Event Management
2.    Incident Management
3.    Request Fullfillment
4.    Access Management
5.    Problem Management
6.    IT Operations Control
7.    Facilities Management
8.    Application Management
9.    Technical Management


Before getting started to examine Access Management and Request Fulfilment it is better to understand the concept of ITSM. In this introduction we will try to describe it and name its processes. Knowing what it stands for is going to help us to undertand other detailed explanations. Service Management is a customer-focused approach to delivering information technology. Service Management provides a framework to structure IT-related activities and the interactions of IT technical personnel with customers and clients. Services allow customers to do business without worrying about underlying technology or IT infrastructure. Services must evolve in order to continue to meet the needs of the customer and respond to technological changes and advances. The Service Lifecycle is the overall framework used to identify, define, manage, and retire IT services.

IT Service Management (ITSM) is defined as a process-based practice intended to align the delivery of information technology (IT) services with needs of the business, which emphasizes benefits to customers. While the process at its core concerns technology, this focus on the client is key.

The purpose of Service Operations can be summed as:

    To coordinate and deliver key activities and processes required to provide and manage
    services at agreed levels to the business, users and customers
    To manage the technology and toolsets that are used to deliver and support services
    To manage, measure, control and feedback improvements in the day to day operations
    To monitor performance, assess metrics and gather data to input into the Continual Service Improvement Process Area









ITSM is often implemented through a set of frameworks. There are many, some of which are complimentary to others, such as ITIL, COBIT, PMBOK, PRINCE, CMMI. IT Services has selected to build its path on ITIL.

After all these general knowledge about ITSM we can say that it is mainly about handling user requests, fixing services carrying operation problem tasks. This view handles a service after is has been deployed and is active to the customer.


Event Management

Let's look first at what an event can be request or incident. If it is an incident , it can become a problem and  problem always triggers change. If it is a request , it can trigger change directly. And every change requires some operations (eg : in the CMDB ) .An event can be defined as any detectable or discernible occurrence that has significance for the management of the IT Infrastructure or the delivery of IT service and evaluation of the impact a deviation might cause to the services.

Event Management, as defined by ITIL, is the process that monitors all events that occur through the IT infrastructure. It allows for normal operation and also detects and escalates exception conditions.



1.Purpose

The goal of Event Management is to detect and analyze events and determine the appropriate process for dealing with the events. This can include categorizing opened tickets, automating processes, comparing performance/behavior against Service Level Agreements, and creating the basis of service improvement and reporting. The ServiceNow platform tracks these events in a number of System Logs, and can respond to them in automated ways using specific policies.

System logs contains a number of logs in the System Logs applications which can be viewed, reported on, or used as the basis of automated policies (see below). These logs include:

 -  Transactions
 -  Emails
 -  Events
 -  Imports
 -  Warnings
 -  Errors

The platform also provides a log file browser, as well as allowing a log file download.

Let's look at the form of the target list :

-  The purpose is the ability to detect events, investigate and determinate the correct control action
-  The events (warnings and exceptions) can be used to automate many routine activities
-  Event Management can be applied to any aspects of Service Management that can be controlled and can be automated (Configuration Items)
-  Provide mechanisms for early detection of incidents.
-  Some types of automated activities can be monitored by exception, reducing downtime.

Incident Management

Objective

·      Restore unscheduled service interruption as quickly as possible

Definition of Terms:

·      An incident is a unscheduled interruption or degradation of service.

Escalation

The process for getting more resources is called escalation. There are two types of escalation:
·      Functional escalation passes the incident to another party within the same unit.
·      Hierarchical escalation passes the incident to someone higher in the hierarchy so more resources can be requested.


Incident Management Activities
            

·        The first step in incident management is identifying the incident. Once the incident is identified, it is logged.
·        The incident is categorized and prioritized.
·         Initial diagnosis is performed. At this point, the person receiving the incident attempts to resolve the incident.
·         If the incident is resolved, it is closed. If the incident is not resolved, the incident is escalated to another unit that will resolve it.
·        Investigation will proceed and initial diagnosis is done. The purpose at this point is to fix the incident as quickly as possible. This is done through workarounds or quick fixes.
·        Once a resolution is determined, the resolution is implemented. Recovery can result if the incident is caused by a newly implemented change.
·        The incident is then classified and initial support is given.
·        When the incident is confirmed as fixed, the incident is closed.

Request Fulfillment

ITIL uses the term service request as a general description for the varying requests that users submit to the IT department.

A service request is a request from a user for information, advice, a standard change, or access to a service. For example, a service request can be a request for a password change or the additional installation of a software application on a certain work station. Because these requests occur on a regular basis and involve little risk, it is better that they are handled in a separate process.

Request fulfillment (implementation of requests) processes service requests from the users. The objectives of the request fulfillment process are:

• to offer users a channel through which they can request and receive services; to this effect an agreed approval and qualification process must exist.
• to provide users and customers with information about the availability of services and the procedure for obtaining these services.
• to supply the components of standard services (for instance, licenses and software media)
• to assist with general information, complaints or comments

Request Fulfillment is to manage the lifecycle of all Service Requests. A Service Request is a generic term that describes the numerous and varied demands placed on the service and support organization. Many are small changes, which are considered to be low risk, frequently occurring and low cost in nature, such as change a password or install a software application request. Alternatively, it may simply be a Customer asking for information. It is the scale, frequency and low-risk nature of the Service Requests that require that they be handled by the Request Fulfillment process, and not Incident or Change Management.

The frequent recurrence of Service Requests requires a predefined process Workflow be set with the support Technicians, service targets and escalation paths in place. To cater for the diverse nature of Service Requests, at minimum two Workflows should be customized for Request Fulfillment, one to handle simple requests for information and the other to deal with standard changes.
In the system, Service Requests are logged against Service Items in the Service Catalog and follow Workflows that ensure that each Request is handled with consistency. The Workflows define the actions required to correctly implement any changes to the Service and define the responsibilities, authorization and timeframe expected to manage the changes that may result from a Service Request.

Once a Workflow is assigned to a Service Request, it is routed to an appropriate Technician based on Service Request Workflow State. After a Technician completes their assignment, the Request is forwarded to the next User based on the configuration of the next State for a standard change or closed, if it is a simple request for information.

When Service Requests are raised for Service Item breakdowns, the system allows them to be easily associated with an Incident within the Analysis tab of the Request. Or, if the Service Request results in a change to an Item that is not in the Service Catalog, a Change Request can easily be generated within the Service Request.

If a Service Request is related to an Incident, Problem or Change Request and that related request in the other Process is closed, the Service Request is automatically closed. The system views the request hierarchy from low to high as Service Request, Incident, Problem and Change Request, and if a related request of a higher type is closed, all the lesser type requests are automatically closed, or if the handshaking facility is enabled for the system, moved to the Pending-Approval State.

The Service Strategy volume provides guidance on how to design, develop, and implement service management not only as an organizational capability but also as a strategic asset. Guidance is provided on the principles underpinning the practice of service management that are useful for developing service management policies, guidelines and processes across the ITIL Service Lifecycle.


Access Management

People in IT Departments faces difficult challenges every single day. For all the people work in IT departments providing an excellent service is not an easy task. The information in your company must flow easily throughout the organizations in a quick and secure way. So in all these considerations, you must ensure its availability and have the necessary resources to access it.

The question is: how can your IT department know what information must be available to each user? And how can you control that every user has access only to the information that is strictly necessary? The answer is having a well organized Access Management organization.

People can come to you with questions like “I haven’t been using this application for a long time so I just forgot my password. What am I supposed to do?” or “I have a new position in this company so I need to be able to Access new specific parts of the system. How can I get this permissions?” etc. All these questions can be answered easily and quickly if you have a well organized management system of accessing in the company.

The image above presents an example of accessing several different points by different users with a not well- organized Access management system. To make things even worse, if there is no IT Service Catalogue defined, it’s almost impossible to maintain any form of Access Management.


Well-organized Access Management relies on other parts of Service Management to do their part as well, e.g. Change Management, Service Desk, and Information Security.


Process activities of Access Management

The role of Access Management is to enable users (and groups of users) with appropriate levels of access to the services presented in the IT Service Catalogue. Access is the term that describes the level and extent of the service functionality available to the user, and is related to the user identity, which uniquely distinguishes one individual from another, verifying / confirming their status within the organization. User rights (or privileges) refer to actual settings within a service that are granted to the user or user group, e.g. read, write, list, execute, delete, change, etc. With all necessary basics covered, lets look at process activities of the Access Management.

Policies and principles of Access Management with basic concepts

Access Management is the process that enables users to use the services that are documented in the Service Catalogue. It comprises the following basic concepts:

Access refers to the level and extent of a service’s functionality or data that a user is entitled to use.

Identity refers to the information about them that distinguishes them as an individual and which verifies their status within the organization. By definition, the Identity of a user is unique to that user.

Rights (also called privileges) refer to the actual settings whereby a user is provided access to a service or group of services. Typical rights, or levels of access, include read, write, execute, change, delete.

Services or service groups: Most users do not use only one service, and users performing a similar set of activities will use a similar set of services. Instead of providing access to each service for each user separately, it is more efficient to be able to grant each user – or group of users – Access to the whole set of services that they are entitled to use at the same time.
Directory Services refers to a specific type of tool that is used to manage access and rights.


Problem Management

 Problem Management Objective

·         Provide long term fixes to existing or possible incidents

       Definition of Terms:

·          Problem - cause of an incident
·          Error - design flaw or malfunction
·          Known Error is created once the root cause is known
   

   Problem Management Activities
         
·         The first step in problem management is to detect the problem. The problem is identified through pro-active or re-active problem management. Most often, information on problems come from Incident Management.
·          After the problem has been identified, the problem is logged.
·         The problem is then categorized and prioritized.
·         If the problem is approved for investigation, the group responsible for the problem investigates and diagnoses the problem.
·         Once the root cause is known or a workaround is in place, a known error is raised.
·        A resolution is determined. Management may decide not to fix the problem. If the resolution is not approved, the error is updated and the problem is closed.
·         If the problem requires change, the fix goes through Change Management and Release Management.
·          Once the change has been done, the problem is closed.

Hiç yorum yok:

Yorum Gönder