Podcast
Questions and Answers
What are Change - Approval Policies?
What are Change - Approval Policies?
Course of action applied to change request and defines approvals that should be applied, available for normal, emergency, and standard changes.
What are Change - Policy Inputs?
What are Change - Policy Inputs?
Variable sources used to evaluate a decision to determine approval action.
What do Change - Approval Decisions allow?
What do Change - Approval Decisions allow?
Allows a single policy to handle every approval required for a change type.
What is the purpose of Change Script Includes?
What is the purpose of Change Script Includes?
Signup and view all the answers
What is a Change PIR (Post Implementation Review)?
What is a Change PIR (Post Implementation Review)?
Signup and view all the answers
How does the Change Assignment group function?
How does the Change Assignment group function?
Signup and view all the answers
What are Change KPIs?
What are Change KPIs?
Signup and view all the answers
What triggers Change Tasks?
What triggers Change Tasks?
Signup and view all the answers
What do Change Management OOB workflows facilitate?
What do Change Management OOB workflows facilitate?
Signup and view all the answers
What are Change integration points?
What are Change integration points?
Signup and view all the answers
What is the primary functionality of Change - itil?
What is the primary functionality of Change - itil?
Signup and view all the answers
What role can delete a Change?
What role can delete a Change?
Signup and view all the answers
What defines an Unauthorized Change?
What defines an Unauthorized Change?
Signup and view all the answers
What is a Release?
What is a Release?
Signup and view all the answers
What does Release Management encompass?
What does Release Management encompass?
Signup and view all the answers
What are the stages of the Release Management lifecycle?
What are the stages of the Release Management lifecycle?
Signup and view all the answers
What are Release Tasks?
What are Release Tasks?
Signup and view all the answers
What is the role of the Catalog manager?
What is the role of the Catalog manager?
Signup and view all the answers
What is Knowledge Search?
What is Knowledge Search?
Signup and view all the answers
What are OOB Knowledge Workflows?
What are OOB Knowledge Workflows?
Signup and view all the answers
What does ITSM stand for?
What does ITSM stand for?
Signup and view all the answers
What is a CMDB (Configuration Management Database)?
What is a CMDB (Configuration Management Database)?
Signup and view all the answers
How does CMDB aid ITSM processes?
How does CMDB aid ITSM processes?
Signup and view all the answers
Match the following ITSM processes with their descriptions:
Match the following ITSM processes with their descriptions:
Signup and view all the answers
What do CIs extend from?
What do CIs extend from?
Signup and view all the answers
What is the purpose of CI Relationships?
What is the purpose of CI Relationships?
Signup and view all the answers
To create a new CI class, the itil_admin role must have personalize_directory role.
To create a new CI class, the itil_admin role must have personalize_directory role.
Signup and view all the answers
What is the role of the CMDB - Principle Class?
What is the role of the CMDB - Principle Class?
Signup and view all the answers
What does a CI Class Manager do?
What does a CI Class Manager do?
Signup and view all the answers
What is a Transform Map used for?
What is a Transform Map used for?
Signup and view all the answers
Describe the Incident Management lifecycle stages.
Describe the Incident Management lifecycle stages.
Signup and view all the answers
What methods can be used to create an incident?
What methods can be used to create an incident?
Signup and view all the answers
What are Incident - Category/Subcategory best practices?
What are Incident - Category/Subcategory best practices?
Signup and view all the answers
When does an incident default closure occur?
When does an incident default closure occur?
Signup and view all the answers
When are Caller user details populated in an incident?
When are Caller user details populated in an incident?
Signup and view all the answers
What sets the Priority field in incident management?
What sets the Priority field in incident management?
Signup and view all the answers
What happens during Incident SLA Breach flows?
What happens during Incident SLA Breach flows?
Signup and view all the answers
What do KPIs (Key Performance Indicators) do?
What do KPIs (Key Performance Indicators) do?
Signup and view all the answers
What is required to create a knowledge article from a resolved incident?
What is required to create a knowledge article from a resolved incident?
Signup and view all the answers
What are metrics/counters used in incident management?
What are metrics/counters used in incident management?
Signup and view all the answers
What role is required to delete a record on the Incident table?
What role is required to delete a record on the Incident table?
Signup and view all the answers
What can an ess user do regarding viewing incidents?
What can an ess user do regarding viewing incidents?
Signup and view all the answers
What is the purpose of Related Search Results?
What is the purpose of Related Search Results?
Signup and view all the answers
What does Contextual Search do?
What does Contextual Search do?
Signup and view all the answers
What are Outbound Emails in incident management?
What are Outbound Emails in incident management?
Signup and view all the answers
What is the lifecycle of Problem Management?
What is the lifecycle of Problem Management?
Signup and view all the answers
What is Problem Management?
What is Problem Management?
Signup and view all the answers
What does the Problem Task involve?
What does the Problem Task involve?
Signup and view all the answers
What does it mean to create a Problem from an Incident?
What does it mean to create a Problem from an Incident?
Signup and view all the answers
What initiates a Problem investigation?
What initiates a Problem investigation?
Signup and view all the answers
What defines the Priority of a Problem?
What defines the Priority of a Problem?
Signup and view all the answers
What is the purpose of a Known Error article?
What is the purpose of a Known Error article?
Signup and view all the answers
What action communicates Workaround to incidents?
What action communicates Workaround to incidents?
Signup and view all the answers
What is the aim of Problem Management roles?
What is the aim of Problem Management roles?
Signup and view all the answers
What is the result of resolving a Problem?
What is the result of resolving a Problem?
Signup and view all the answers
What is the focus of Problem Overview reports?
What is the focus of Problem Overview reports?
Signup and view all the answers
What are the recommended Problem metrics?
What are the recommended Problem metrics?
Signup and view all the answers
What is the process of creating a Change from a Problem?
What is the process of creating a Change from a Problem?
Signup and view all the answers
What is a Change?
What is a Change?
Signup and view all the answers
What does a Release entail?
What does a Release entail?
Signup and view all the answers
Outline the Change Management lifecycle stages.
Outline the Change Management lifecycle stages.
Signup and view all the answers
How can a Change Request be created?
How can a Change Request be created?
Signup and view all the answers
What is the purpose of Change > Create New module?
What is the purpose of Change > Create New module?
Signup and view all the answers
What are the OOB Change types?
What are the OOB Change types?
Signup and view all the answers
What does Change Conflict Detection achieve?
What does Change Conflict Detection achieve?
Signup and view all the answers
What are CABs (Change Advisory Boards)?
What are CABs (Change Advisory Boards)?
Signup and view all the answers
What does a CAB Workbench facilitate?
What does a CAB Workbench facilitate?
Signup and view all the answers
What do customers define in Change Models?
What do customers define in Change Models?
Signup and view all the answers
What are Change - State Models?
What are Change - State Models?
Signup and view all the answers
What are Change - State transitions?
What are Change - State transitions?
Signup and view all the answers
What is the Risk Calculation process?
What is the Risk Calculation process?
Signup and view all the answers
What is captured in a Risk Assessment?
What is captured in a Risk Assessment?
Signup and view all the answers
What does the Risk Assessment Designer allow you to do?
What does the Risk Assessment Designer allow you to do?
Signup and view all the answers
What is the result of submitting a Risk Assessment?
What is the result of submitting a Risk Assessment?
Signup and view all the answers
What are the steps in a Change Request?
What are the steps in a Change Request?
Signup and view all the answers
Study Notes
ITSM Overview
- ITSM encompasses CMDB, benchmarks, reporting tools, mobile interfaces, knowledge management, service level management, and assessments.
CMDB (Configuration Management Database)
- Centralized repository managing IT service infrastructure components and their relationships.
- Aids in critical analysis and decision-making for ITSM processes.
Role of CMDB in ITSM Processes
- Associates Configuration Items (CIs) with incidents, problems, and changes to improve prioritization and escalation.
- Provides potential upstream/downstream impact analysis and CI relationship data for planning and documentation.
ITSM Processes Connected to CMDB
- Incident Management: Addresses infrastructure component failures.
- Change Management: Manages necessary adjustments within the data center.
- Problem Management: Identifies defects in infrastructure.
- Request Management: Handles service requests.
Configuration Items (CIs)
- CMDB classes inherit attributes from parent classes, allowing for customizable attributes at each level.
CI Relationships
- Stores data on how CIs interact with each other, crucial for accurate data mapping during CI imports.
Roles and Permissions
- itil_admin role is necessary to create new CI classes.
- Specific roles like problem coordinator and problem task manager are required to manage problem tasks effectively.
Incident Management Lifecycle
- Creation and Classification: Logging details and assigning incidents to appropriate teams.
- Investigation and Diagnosis: Analyzing issues and updating incidents with findings.
- Resolution and Closure: Restoring services and closing incidents after documenting solutions and communication.
Incident Creation Methods
- Multiple channels can be utilized for incident creation including the Service Portal, Incident Application, inbound emails, and web services.
Incident Management Best Practices
- Implement simple, standardized categorization to avoid confusion and miscategorization.
Incident Closure
- Default auto-closure is set for 7 days post-resolution or last update unless configuration changes are made.
Incident Priority Determination
- Priority is established based on impact and urgency; VIP status does not affect priority.
Incident Metrics
- Analysis includes metrics like business duration, reassignment counts, and the age of open incidents.
Problem Management Lifecycle
- Begins with detection and logging, followed by investigation, diagnosis, resolution, and closure.
Problem Management Roles
- Specific roles for managing problems and tasks, including the ability to communicate fixes and workarounds.
Change Management Lifecycle
- Involves creation, approval, implementation, and closure of change requests to minimize service disruptions.
Change Request Creation
- Change requests can be initiated through various channels, including incident and problem management.
Risk Assessment and Management
- Risk must be calculated via a dedicated assessment process, which uses weighted scores for evaluation.
Release Management
- Involves planning, design, and implementation of releases, ensuring smooth delivery of product features and changes.
Change Advisory Board (CAB)
- A structured committee that evaluates and approves change requests based on set conditions, facilitating better governance of changes.
Unauthorized Changes
- These are changes made without the appropriate approvals and are typically logged as emergency changes.
Performance Indicators
- KPIs are integrated into the ITSM process, tracking metrics such as response times, problem resolutions, and the state of incidents.
Integration Points for Change Management
- Integral for linking change requests to incidents, problems, and configurations for a seamless workflow between ITSM tools.### Release Management Process
- Release Planning: Involves creating plans that align with stakeholder expectations and support necessary changes for the release.
- Build & Test: Commences with permission to build the release and concludes with the change management authorization for the release package, which is then integrated into the DML through Configuration Management.
- Deployment: Involves transferring release packages to one or more target environments, concluding with a handover to service operations and early life support.
- Review & Close: Marks the completion of the Release Management process through a final review and closure activities.
Changes and Releases
- Refers to individual modifications made to a product, which can be tied to a Configuration Item (CI) or a change request and integrated within the parent release.
Release Tasks
- Pertains to all necessary tasks needed to implement product features.
- Key components of release management include inputs and outputs such as release type, coordinator, and resource processes leading to successful planning and deployment.
Release - Product
- Involves hardware or software that is constructed and can be linked to Business Services in the Configuration Management Database (CMDB), connecting it to other ITIL processes.
ITSM Mobile Agent
- Identified by (sn_itsm_mobile_agt), permits approvers to view notifications and manage requests via mobile devices.
- Features a global search functionality for people, knowledge articles, and catalog items.
Knowledge Submission Methods
- Manual Creation: Users with a knowledge role can generate new articles through the Knowledge App.
- Incident Form: Articles can be automatically created by selecting the knowledge checkbox upon closure.
- Problem Form: Generates knowledge articles from known error relationships tied to problems.
- Import: Allows permissions for importing Word documents into the Knowledge base.
- External Integration: Admins can connect with WebDAV to create knowledge article records.
KBWorkflowSNC Script Include
- Contains the business logic that governs the workflows for publishing knowledge articles.
- Key functions include publishKnowledge() and getApprovers(), which can be copied and tailored for specific approval processes.
Knowledge Base and Knowledge Articles
- Knowledge Base [kb_knowledge_base]: Does not extend any table; user access criteria are defined.
- Knowledge [kb_knowledge]: Houses knowledge articles and does not extend any table; can be linked to CIs.
Knowledge Version Storage
- Article versions are stored when the Advanced Installer plugin is enabled, allowing for version control.
Knowledge Management Roles
- knowledge_admin: Holds the exclusive capability to perform all CRUD operations including creating Knowledge Base templates.
- Deleting a KB is prohibited for all user roles.
KCS Capabilities Plugin
- Enables roles such as kcs_contributor, kcs_publisher, and kcs_candidate within the knowledge management system, simplifying user access based on ownership or management fields.
Knowledge Management Workflow Stages
- Follows a Draft, Review, Publish, and Retire (DRPR) sequence.
KB Social Q&A Features
- Enables posting questions with a setting to allow social Q&A interactions.
- Features include curated content lists, dynamic usability metrics, and engagement indicators.
Knowledge - Service Portal
- Features a broader interface for viewing KBs and accessing articles, complete with search capabilities, sorting/filtering options, and enhanced commenting abilities.
Knowledge Search Functionality
- Performs searches across all accessible knowledge bases, based on user permissions.
Out-of-the-Box Knowledge Workflows
- Includes processes for instant publication, retirement, and approval workflows for knowledge articles.
Exporting Knowledge Articles
- Articles can be exported in XML format, which includes fields like sys_id and attachments.
Service Catalog Overview
- Users can explore and request catalog items, which may encompass goods, services, or informational content from various organizational departments.
Request Management
- Involves tracking and fulfilling orders placed on the service catalog, ensuring that approval processes and fulfillment tasks are strategically managed.
Request Management Lifecycle
- Submittal: Involves selecting items from the catalog, completing order forms, and submitting requests.
- Approval: May include the approval of the full order or individual items.
- Fulfillment: Request fulfillers carry out defined tasks necessary to complete the request.
- Closure: The process ends once all items in the order have been fulfilled or closed.
Catalog Manager Role
- Responsible for editing catalogs, managing categories, assigning editors, and modifying or publishing catalog items.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on IT Service Management (ITSM) concepts with these flashcards. Each card covers essential terms such as CMDB, Service Level Management, and more. Perfect for preparing for the ServiceNow Certified Implementation Specialist exam.