IT Management Week 3
IT Management Week 3
2
Incident Management
o Restore the affected service, as soon as possible and according to the priority for
the business and the respective agreed service levels.
o Keep the user informed about the status of an incident: estimated solution
times, escalations, etc.
o Minimize the impact of an incident on the business.
o Ensure compliance with service levels: quality, times, availability.
o Identify service improvements proactively.
o Collect service management information.
Incident Management (Restore the Service) - Resources (4P’s)
PROCESS PEOPLE
1. Reception and registration 1. Soft skills: effective communication,
2. Prioritize and Classify empathy, willingness to serve, negotiation
3. Diagnosis and solution by the first level with users, etc.
4. If not resolved, escalate to responsible 2. Technical knowledge: technologies snd
Support team. information systems used in the company,
5. Order Tracking analytical capability, etc.
6. Provide temporary or definitive solution to 3. Permanent training.
restore service 4. Roles: BD’s OS’s, support teams,
7. Inform the user of the status of their order. Networks, Security, Applications, etc.
8. Inform the solution and confirm user’s
satisfaction. SUPPLIER/PROVIDERS
9. Close the incident 1. Contracts with Providers of technology
10.Service survey used in the company
2. Service level agreements SLA's.
PRODUCT 3. formal contract
1. Request attention system 4. Budget
2. Specialized SW for diagnosis and
management of technologies:BDs,
Networks, Security,etc
3. Knowledge DB.
4. monitoring software
Incident Management
Throughout its life cycle, an incident is owned by a person in charge of the Service
Desk (ServiceManager), which monitors the solution process, supports coordination
with other support groups, escalation and keeps the user informed about the
service process.
Incident Management
• Incident Prioritization:
o It is evaluated together with the user and determined based on the impact and
urgency of the incident.
o Impact: effect of the incident on business activities.
o Urgency: Speed with which the incident needs to be resolved.
o Consider:
o Cost of no solution
o Risk or damage to the user
o legal implications
o Customer Interrupt
o Depending on the priority, the dedication of the support groups required for the
solution, money and time spent are determined. Lower priority incidents may
need to be delayed or dropped.
8
Incident Management
• Incident Escalation:
o Horizontal: for specialized knowledge support
o Vertical: at any time, so that the respective authority helps as required (serious
problems or when the SLA will not be met)
9
Incident Management
10
Incident Management
Reactive
Problem
Control
permanent RFC
Incident solution Error Control Change
Management Management
Change
Implementation
Proactive
problem
management
proactive
Situation: Socrates hangs every end of the month.
Problem Management
8. Register a Problem
9. Identify root cause of the incident(problem control): Tests,debugging, review
logs,dump, resource monitoring, etc. It is identified that in moments of high
transactionality, the database's RAM memory is saturated due to a bug in the
Socrates code. (Known Bug)
10. Identify the best solution to the known error(Error checking): a) fix Socrates code
(1 week, $0, medium risk); b) UpgradeDB server HW (30 days, 10K, low risk);
c)Upgrade to the DB version (15 days, 0 dollars, low risk)---→Enter an RFC (Request
for Change)-→ change control
Problem Management
Proactive Problem
Management
It is responsible for identifying and solving problems before these originate incidents:
• Trend analysis: review of incidents and problems that have occurred can provide
information to improve the service (occurrences after a change, repeated incidents with a
given CI, user training, etc.).
• Preventive support actions: trend analysis can identify CI’s for which it is required to
direct resources from support staff to make improvements.
• Inform the organization:problem management allows you to inform the organization
about the health of IT services and make decisions about it. (ex. SLA’s)
By redirecting the IT organization's effort from handling large numbers of incidents to incident
prevention, you will improve service quality and more efficient use of IT resources.
Problem Management
• Service Request: request from a user or an authorized representative of the users to initiate a
service action that has been agreed as a normal part of the provision of the Service
• The purpose of service request management is to support the agreed quality of a service by handling
all predefined and user-initiated service requests in an effective and user-friendly manner.
Service Request
• Unlike an incident, which is unplanned in nature, a request for services can often
be planned into your care:
o Requirements to meet
o Responsible staff
o Standard attention times
o Escalation levels
Service Request
• Considerations:
• The types of requests available, costs, approval levels and attention times must be formalized.
• They must be accessible as part of the catalog of IT services
• Standardized procedure for attention.
• Single point for your request, usually through the Service Desk
23
Service Request
30Ch voice
2Mbps
CAR GOLD: 512 Kbps
SILVER CAR: 1554 Kbps Branch 5
Cisco
converter
vpn-ip 2ch voice
Cisco
4 LBW 3640
1750
Optical Mux 128Kbps
16X2 1 BRI
CAR GOLD: 32 Kbps
CAR SILVER: 96 Kbps LAN
SWITCH 128Kbps
512Kbps
CATALYST CAR GOLD: 32 Kbps 128Kbps
CAR SILVER: 96 Kbps
4006 CAR GOLD: 32 Kbps
INTERNET CAR SILVER: 96 Kbps 2Mbps SWITCH
CAR GOLD: 512 Kbps ATM
SILVER CAR: 1024 Kbps
Cisco
2620 LAN
firewall 2ch voice LAN mux 30Ch
Cisco converter Cisco
PIX 2ch voice Optical voice
1 BRI 1750 Cisco 1 BRI 3640
525 4x2
1 BRI 1750
Inter-LAN
64Kbps
TACNA
Apeseg TRUJILLO PBX
64Kbps Lead Agency
25
Monitoring and Event
• Event: Any change of state that is important for the management of a service or another
configuration item. Events are typically identified through notifications created by an IT service, CI,
or monitoring tool.
• The purpose of event monitoring and management is to systematically observe service components
and record and report state changes identified by events.
• This practice must identify and prioritize infrastructure events, services, business processes and
information security.
• It also establishes an appropriate response to them, including those that may cause an incident.
Monitoring and Event
o Informative: events that do not require action at the time they are identified
but analyzing the data collected from them at a later date, allows take actions to
improve the service
o Warning: They allow action to be taken before a negative impact on the business is
experienced.
o Exception: Indicates that a violation of an established standard has been identified.
This event requires action even though the business impact has not yet materialized.
• Activities:
o To identify: services, systems, CI's, etc. should be monitored and how.
o Implement and maintain: monitoring procedures.
o Establish and maintain: thresholds and other criteria whose changes must be
treated as events and their respective classification.
• Establish and maintain: policies to apply to each type of detected event, related to
ensure an adequate response.
• Automate: thresholds, criteria and monitoring policies
• It is implemented through monitoring tasks and automated control tools, own or third
parties.
Monitoring and Event
• Work in groups, follow instructions in the activity document. Enter the document
you have worked on in the respective Blackboard activity.
31
Thanks for your
attention
32