Professional Documents
Culture Documents
FOUNDATION
STUDY GUIDE
People
Processes Products
Partners
With all this in mind a need has arisen for the creation of a standard
set of practices to manage the IT services being delivered. As a result
of this requirement the Information Technology Infrastructure Library
(ITIL) was created.
ITIL is widely recognized throughout the world, and may well be the
most widely accepted approach to managing and delivering IT services
today.
ITIL provides a proven method for planning, processes, roles and the
how they interact and communicate.
• Service Support
• Service Delivery
• Planning to implement Service Management
• ICT Infrastructure Management
• Applications Management
• The Business Perspective
Whilst the UK Government created ITIL via the CCTA, it is quickly being
adopted throughout the world as the standard for best practice in the
delivery of IT Services. The main focus of ITIL is the IT Service
Management (ITSM)
ITIL Processes
1 Service Desk
1.1 Function
1.2 Mission
The Service Desk acts as the central point of contact between the User
and the IT Service Management Organization. The Service Desk
handles both Service Requests and Incidents. The Service Desk
provides an effective interface to other activities such as Incident
Management, Problem Management, Change Management,
Configuration Management, Release Management, Service Level
Management and IT Service Continuity Management
1.6 Organization
The Service Desk must ensure that it's organized well to provide:
1.8 Structure
o #calls taken,
o #incidents logged,
o #service requests logged,
o #calls abandoned (user hangs up),
o #calls answered within xx seconds,
o average call duration, calls waiting
o #calls logged per Service Desk analyst.
Typically the Service Desk faces many day to day, medium term and
long term challenges. Included in these, but not limited to, are:
o Staffing levels.
o Staff skills and capabilities.
o Dealing with peaks in call volume.
o Managing high impacting incidents.
o Absorbing necessary information to be able to provide an
effective service.
o Maintaining IT Service quality as the Organization becomes more
complex, the number of service increases or the Organization
changes/grows.
2.1 Mission
Remember:
2.2 Goals
2.3 Definition
What is an Incident?
o Applications – Hardware
o Service Requests
o Service Availability
o Deviations from normal service (Service Levels)
2.5 Benefits
2.6 Process
o Fault
o Operating System
o Error Message
o Bug Low Performance
o Hardware
o Server
o Configuration
o Set-up error
2.8 Escalation
2.10 Tools
Note that (typically) one overarching primary tool is used to store real-
time data and information about the status, detail and progress of an
Incident whilst other (local) tools are often used to identify and
diagnose the Incident.
Each support area usually has several tools that are application,
Infrastructure or Service specific. These supporting tools are also vital
for the Incident Management process. They enable the rapid diagnosis
of an Incident often in a very complex environment.
3.1 Mission
3.2 Goals
3.3 Definition
NOTE:
Problem Control:
o Identification
o Classification
o Assign Records
o Investigation and Diagnosis
3.5 Benefits
o Incident
o Problem,
o Known Error
o RFC
After the implementation of a successful change, both the Known Error record
and the Problem record can be closed. But what happens to the original
Incident record?
At this point the Incident record can be closed (because normal service
has resumed) and both the Problem and Known Error Records may be
closed too.
o Kepner Tregoe
o Ishikawa Diagrams
o IS / IS NOT
o Force Field Diagrams
3.11 Tools
As time passes the original core details will be added too and utilized
across many ITIL Processes. This is the power of using an integrated
toolset.
3.12 Metrics
3.13 Challenges
4.1 Mission
4.2 Goals
4.4 Benefits
Such criticisms are usually from people who do not understand and
appreciate the Change Management function. In modern
Organizations, Change Management does not slow down the
absorption of Change, it provides the "gentle brakes" to allow you to
slow down around corners and then rapidly accelerate.
Each Category will determine how in-depth and timely the overall
assessment and approval stages are.
Often the term "Routine" change is also used. These are special pre-
approved types of changes that present very low risk and potential
impact. Typically these are logged and scheduled on the Change
Management tool - but only require local area (e.g. Telecoms)
approval.
Change Manager
The Change Advisory board is a critical part of the Change Process. The
CAB is made up of a broad range of IT and business representatives, all
of which represent a core part of the either the IT Service Organization
or the business.
Now some changes are so small, low impact and well rehearsed that
they have special approval from the Change Manager NOT to have to
be reviewed by the CAB. Such Changes often include minor
Configuration changes to Infrastructure or when small pieces of new
functionality, that have been tested, are 'switched on'.
The attendees are not limited to the above list, and will differ
according to the needs of each Organization. Some Organizations
choose to only invite certain CAB members when certain types of
changes are scheduled for review. This helps to maintain the efficiency
of the Change Process
Oftentimes, the need for Change approval will not coincide or cannot
wait for the next standard CAB meeting. This occurs most when either
action is required to protect or restore IT Service (say, as the results of
an Incident) or when some key component of a project has been
incorrectly dealt with (say, a critical data file needs updating in real-
time to ensure that another planned change will take place
successfully).
The 'agenda' is the same as a standard CAB, however the risk factor
(because not all the CAB are present - or there is little time to engage
with others) is typically higher.
4.7 Process
Process Lifecycle
4.9 Metrics
5.1 Mission
5.2 Goals
5.3 Definitions
Important Definitions:
5.4 Scope
Secondly, the CI's levels will need to be defined and managed down for
each CI item.
o PC
o Keyboard
Mouse
• Screen
o CPU.
o CPU
o Circuit Board
Firmware
• Chipset
o Interfaces
Fan
o Incident.
o Problem.
o Known Error.
o Request For Change
o Change Authorized
o Change tested
o Implemented
o Released
CMDB
Baseline
Level of Control
5.10 Tools
The CMDB:
5.11 Metrics
Once the level of CI's is agreed and configured into the CMDB and
agents, the challenge then becomes ensuring that the agents work as
agreed and actually do populate the CMDB with the right information
at the right time. Agents are software components and these fail
occasionally too.
Just think about the sheer size and complexity of this task in your IT
Organization. How many PC's do you have? How many Servers,
Printers, Software Packages, IT Services, Networks, Databases? Now,
multiply that total number by, say, three because it's assumed that
there are three related (lower level e.g. Keyboard) CI's for each known
asset. You should have a pretty big number in your head.
The CMDB selected will typically be bought from a major Vendor. Most
CMDB's are already fully integrated with the IT Service toolset.
However, challenges can occur when you consider how to obtain
information from another Vendors asset that uses a different way of
communicating, say a different agent. Thankfully communication
standards usually mean that this can easily be overcome - but there
are exceptions. Sometimes, separate local CMDB's are needed to
manage certain "islands" of CI's, which then feed the master CMDB.
When purchasing new assets, the IT Service Organization needs to
ensure that their agents are compatible with the selected CMDB - both
now and in the future.
All tools are not equal. Sometimes, particularly for older Assets (say,
older Network equipment) agents will not readily be available.
Decisions will need to be made about how the information is provided
to the CMDB. Sometimes intelligent scripts are written and executed
from Servers that 'go out' and interrogate the legacy equipment.
Maintaining a CMDB requires a competent IT Service Organization.
Specific skills and experience sets are valuable for the accurate
maintenance and ongoing support of the CMDB.
6.1 Context
Although staff in these areas will design, build, configure, test and
implement systems and Infrastructures; it is Release Management's
responsibility to ensure that this is achieved in a structured manner for
anything that is purposely defined as a 'Release'.
6.2 Mission
6.3 Goals
The Release Manager and the Change Manager have the capability of
ensuring that the destination environment has the actual capability of
receiving the Change e.g. The Operating System is at the correct level
to run the Software that is transitioning.
6.8 Benefits
Remember:
6.13 Metrics
6.14 Challenges
7.2 Goals
The goals of Capacity Management are to:
7.3 Scope
The scope of Capacity Management can be wide ranging, depending
on any particular IT Service Organization.
o All applications
o All systems
o All Infrastructure
o All Networks
o All peripherals
o Human Resources (where necessary to avoid delays to the timely
provision of Capacity).
7.4 Benefits
o There are many benefits of Capacity Management:
7.5 Process
o Performance monitoring
o Workload monitoring
o Application sizing
o Resource forecasting
o Demand forecasting
o Modeling
o The Business
o IT Services
o Technology
o Finance
o Utilization
o Performance
o
The Capacity Database interfaces with, or is integrated with, the
CMDB. Note: Do not confuse the Capacity Database with the CMDB.
They are NOT the same thing!
o Business data,
o Service data,
o Technical data,
o Financial data and
o Utilization data.
7.9 Metrics
A multitude of metrics can exist within each of the three core areas
that Capacity Management focuses on:
8.1 Mission
8.2 Goals
8.3 Scope
8.5 Benefits
8.6 Techniques
Inputs:
o Business availability requirements
o Business impact assessment
o Availability, reliability and maintainability requirements
o Incident and problem data
o Configuration and monitoring data
o Service level achievements
Process:
o Optimization of availability by monitoring and reporting all key
elements.
o Determining availability requirements in business terms.
o Predicting and designing expected levels of availability and
security.
o Production of the Availability Plan.
o Collecting, analyzing and maintaining and reporting availability
data.
o Ensuring SLAs are met but monitoring against them, including
OLAs.
o Continuously reviewing and improving availability.
Outputs:
o Availability and recovery design criteria
o IT infrastructure resilience and assessment
o Agreed targets for availability and maintainability
o Reports of availability, reliability and maintainability achieved
o Availability monitoring
o Availability improvement plans
The tool will have multiple inputs of data from a variety of sources and
some manual capture and data entry may be required.
8.9 Metrics
9.1 Mission
9.2 Goals
9.3 Scope
9.5 Process
9.6 Metrics
9.7 Challenges
10.1 Mission
Remember:
o Maintain
o Improve
o Business Aligned
o Quality
o Review Achievements
o Instigate Action
o Eradicate
o Continuous Improvement
10.2 Goals
o The receiver of the service, i.e. the customer who pays the bills.
Service Level Management ensures that the service targets are
documented and agreed in SLAs (Service Level Agreements)
10.4 Benefits
If you can't monitor it, you can't report on it, therefore you can't
include it in your SLA ! SLM will rely on the tools utilized by other
support functions, for example Service Desk tool to provide incident
reports, Availability Management to provide availability % actuals,
Capacity Management for throughput information
10.8 Metrics
10.9 Challenges
11.1 Mission
activities”
NOTE :
11.2 Scope
11.3 Benefits
o Confidentiality
o Ensuring no unauthorized access to systems or data
o Integrity
o Ensures data / information is accurate and complete
o Availability
o Ensures authorized information is accessible
o Privacy
o Allowing owners of data/information to restrict access
o Verifiability
o Ensures data/information is only used for its intended
purpose
o Ensures security measures are effective
o Availability Management
o Capacity Management
This is a key input to the SLA agreed with the customer. As security
is a key input to the Continuity plan agreed within the SLA this is an
important relationship.
11.7 Challenges
OGC
TSO
www.tso.co.uk/itil
www.tsoshop.co.uk
ISEB
www.bcs.org
ITSMF
www.itsmf.com
www.prometric.com