ITSM Guide - Extract Chapter 3.2 - Service Operations

15
INNOTRAIN IT IT Service Management QUICK SIMPLE - CLEAR Preview Extract Chapter 3.2 2011

description

INNOTRAIN IT IT Service Management Guide - Extract Chapter 3.2 - Service Operations (English)

Transcript of ITSM Guide - Extract Chapter 3.2 - Service Operations

Page 1: ITSM Guide - Extract Chapter 3.2 - Service Operations

INNOTRAIN IT

IT Service Management

QUICK – SIMPLE - CLEAR

Preview

Extract

Chapter 3.2

2011

Page 2: ITSM Guide - Extract Chapter 3.2 - Service Operations

IT Service Management

I

Authors

Dr. Mariusz Grabowski, Universität der Wirtschaft Krakau

Dr. Claus Hoffmann, Beatrix Lang GmbH

Philipp Küller, Hochschule Heilbronn

Elena-Teodora Miron, Universität Wien

Dr. Dariusz Put, Universität der Wirtschaft Krakau

Dr. Piotr Soja, Universität der Wirtschaft Krakau

Dr. Janusz Stal, Universität der Wirtschaft Krakau

Marcus Vogt, Hochschule Heilbronn

Dr. Eng. Tadeusz Wilusz, Universität der Wirtschaft Krakau

Dr. Agnieszka Zając, Universität der Wirtschaft Krakau

Page 3: ITSM Guide - Extract Chapter 3.2 - Service Operations

3.2 Service operations

3.2.1 Service and infrastructure operations

"Help, my screen went black!" - We are all familiar with this call from users. Every day, we

encounter a wide variety of these incidents in system operation, i.e. deviations from the plans. This

chapter explains how to handle these incidents in a structured manner.

But first, let's briefly explain the relevant terminology: The service desk is the central contact for all

inquiries from users, according to the principle of "one face to the customer." This provides the

customer with a single point of contact for all IT-related inquiries (e.g. hotline, ticket system). In a

few cases, companies even expand their service desk to handle other inquiries (such as event

management). The purpose of this single point of contact is to handle service requests, create an

incident or to submit a request for change. The service desk can be understood as a kind of funnel

that collects all messages and then steers them to the correct processes. Initially, enquiries of all

types are treated as incidents.

Service desk

The service desk is the central function of ITSM. It is the link between the IT service and business

operations. This function is used to transact all enquiries from, and support provided to, employees.

The incident is an unplanned interruption (such as a workstation computer that won't work) or

reduction of the quality of a service (like a slow Internet connection). Failures of elements of the

configuration (Configuration Items) can be treated as an incident without a direct effect on the

service. In this case, one example would be the failure of a mirrored hard drive, where the server is

still up and running. In contrast, Service Requests are enquiries from users (with regard to

information, consultation, standard changes, access) that do not have an effect on the service.

They are one way to satisfy customers' needs. One example is a request for more printer toner

when the printer indicates that it will run out soon.

Disruption or incident?

Page 4: ITSM Guide - Extract Chapter 3.2 - Service Operations

An incident is defined as an IT disruption or IT service enquiry. Examples of an incident could be:

"My Excel is crashing" or "I need to create a PDF from Excel. How do I do that?". All incidents

should be processed by the central service desk and the status updated to enable later evaluation.

The process for managing and processing incidents is usually known as incident management. It

passes through various phases:

1. Entering and classifying the incident

2. Diagnosing the incident

3. Escalating the incident

4. Closing out the incident

The current Version 3 of the IT Infrastructure Library (ITIL) provides a sample process as a best

practice. This can provide the basis for a company to develop its own processes, as the

requirements differ enormously from company to company. For smaller companies, it is surely

good enough to just pick up the phone without any overarching workflow, but in medium to large

enterprises, this results in repeated interruptions of employees' core tasks. In this case, it is

worthwhile to take the more formal route.

In both cases, however, it makes sense to document the incidents and analyse them as part of an

improvement process. Ideally, the incidents should be entered into a ticket system, but a simple list

might be good enough at the beginning.

ITIL recommends the following procedure:

Page 5: ITSM Guide - Extract Chapter 3.2 - Service Operations

Figure 9 - Incident process based on ITIL V3

Page 6: ITSM Guide - Extract Chapter 3.2 - Service Operations

Phase I - Identifying, entering and categorising the disruption

The identification of incidents normally shared equally by the large number of users. Most

deviations can be identified easily, and because of the high relevance for users, they gladly accept

the effort required to report these incidents.

In many cases, however, a proactive configuration is responsible for identifying an incident or

imminent incident. For example, deviations can be identified on the hardware level (such as the

failure of a hard drive in a RAID array) and reported. On a system level, the use of monitoring

solutions has become widespread. This allows, for example, the function of an e-mail server to be

checked by having the monitoring application send an e-mail and measuring how long it takes to

receive a response. If a threshold value is exceeded during this process, this is designated as an

event and an alarm is triggered.

Depending on the systems used and the corporate culture in place, actually entering the disruption

could be the responsibility of the user (in a ticket system, for example) or the service desk agent

(for phone calls or e-mails). In large companies, correctly categorising the ticket ensures that it will

be forwarded to exactly the right specialist. However, even in small companies, it provides the

ability—beginning at a critical mass of disruptions—to identify weak points and areas for

improvement. For example, if a particularly large number of problems with an office application are

reported, it may be worthwhile to provide the users with better training or replace the application.

Like the entry of the disruption, its categorisation can also be carried out by the user or an IT

employee. Based on the collected data, a decision can be made as to whether the entry pertains to

a disruption or service request, which triggers a separate process.

Phase II - Prioritising

The priority assigned to an incident specifies

how the incident is handled by the employees

and tools of the service desk. The prioritising

process often holds a large potential for conflict

between users and services providers, as by

nature users will always assign top priority to

their own incidents. Experience has shown that

in many cases in which users determine the

priority themselves, the priority differs

significantly from reality. Therefore, it is better

to have the incident classified by the service

desk employee, as only he or she has the

necessary overview of the current situation in the company. The definition of the priority is based

on the effect on the supported business processes and the urgency until this effect takes hold.

Figure 10 – Example of prioritising incidents

Page 7: ITSM Guide - Extract Chapter 3.2 - Service Operations

Based on the priority assigned to the incident, response times (time until troubleshooting begins)

and solution times (time until regular operation) can be defined.

Phase 3 – Diagnosing and possible escalating

The objective of the initial diagnostics is to gather all relevant facts (environment data, symptoms

etc.). In many cases, this takes place in direct communication between the service desk employee

and user. If the problem is simple or known, the employee will try to resolve it immediately. If this is

not possible because there is not enough time or the necessary detailed technical knowledge is

lacking, the incident has to be escalated for further handling. It can be distinguished between two

types of escalation:

Functional escalation is passing it on to another authority (person or team) with greater

experience. The forwarding can be either internal (to in-house IT employees) or external (e.g. to a

vendor's support staff). Nowadays, this is often referred to as “second-level support”.

Hierarchical escalation refers to notifying and involving higher management levels to support the

escalation. In this process, the higher-level manager is called upon to overcome organisation

hurdles or mobilise additional resources to solve the problem in a timely manner.

The appropriate specialists now have to create the diagnosis or escalate it further until the final

diagnosis is reached. Regardless of the escalation level, the service desk is responsible for the

incident, co-ordinates the activities and provides users with regular updates about the progress of

their incidents.

Phase 4 – Remedying the disruption

Once a diagnosis for the disruption has been identified, it can be remedied and the normal state

restored. The solutions should always undergo corresponding testing. For example, printing a test

page after removing a paper jam can provide immediate information as to whether other problems

exist. When applications are adapted in what are known as hot fixes or patches, the possible

interactions should be examined before making them available on a large scale.

After a successful resolution and restore, the incident can be closed out. In doing so, the service

desk should ensure that the user is satisfied with the solution. In many cases, this is implemented

by the system in that the service desk changes the status of the incident to resolved, but the user

can close out the incident. In many cases, the next step is a brief survey with a few questions (3-5)

to evaluate the quality of the service desk.

Problem Management

Incident resolved – is that all there is to it? Of course not. In many cases, though the incident is

resolved quickly using the process we just described, but the cause is not eliminated and may

Page 8: ITSM Guide - Extract Chapter 3.2 - Service Operations

result in further problems. For example, if paper jams occur frequently in a certain type of printer,

this type could have a manufacturing defect or be incompatible with the paper being used.

Problem management is concerned with just these kinds of root causes.

Problem

A problem exists when multiple incidents indicate a pattern. Central management of the incidents

by the Help Desk allows recurring problems to be identified (e.g. Excel always crashes for user XY

whenever he or she has Word open at the same time) and long-term solutions can be found.

A problem, i.e. a root cause of one or more incidents, is handled by the problem management

process in multiple steps. Again ITIL provides an adequate reference process:

1. Identifying the problem; this is done by the employees of the service desk, technical

support team or event management.

2. Entering the problem, providing links to the corresponding malfunctions, including a

categorisation for later reporting and the prioritisation of the problem, in a way similar to

incident management.

3. Diagnosing the problem with the objective of identifying the root cause. If the cause has

been identified but no solution is yet available, a workaround (e.g. restart printer) has to

be defined. This is entered as a known error and made available to the service desk so

that it can remedy the corresponding disruption more quickly.

4. Finding a solution with the objective of implementing it as quickly as possible. However, if

a change is necessary for final resolution, this should be done using the procedure defined

in the change management system. This structured procedure reduces and acts as a

check on the possible effects (for more information, refer to Chapter 5Fehler!

Verweisquelle konnte nicht gefunden werden.).

Both incident management and problem management are based on identical concepts with regard

to personnel and tools. In larger organisations, it is recommended to establish a separate team that

runs the service desk function. These organisations can consider concepts such as the centralised

or decentralised service desk, virtual service desk (e.g. in collaboration with a supplier) or even

corresponding time zone concepts for international companies (follow-the-sun principle). In small IT

organisations, the function can also be entrusted to an employee who is responsible for the service

desk and is supported by his or her colleagues. Ideally, this should implement the concept of "one

face to the customer" or, in other words, one contact person for the user in all matters. It makes it

easier for users to communicate with IT, intercepts trivial enquiries directly and enables the

remaining employees (e.g. developers or administrators) to concentrate on their core topics.

Page 9: ITSM Guide - Extract Chapter 3.2 - Service Operations

On the tool side, numerous commercial and open source solutions are available today. Ideally, the

service desk should have the following applications available, which are integrated into one

solution or linked to each other via logical interfaces:

1. Ticket system that manages and documents a disruption or problem over its entire life

cycle. It should also enable communication with the user (e.g. via a Web interface or by e-

mail).

2. Database for collecting known errors and solutions (known error database, KEDB). This

does not always need to be a lofty solution. For smaller organisations, a simple list is

usually sufficient.

3. A configuration management database (CMDB) is a tool that supports many areas. The

database supplies data and information about the entire IT landscape and thus helps to

identify the context and identify problems more easily. For example, you can read which

employee uses which type of printer at his or her workstation. For more information on this

topic, refer to Chapter 4.

3.2.1 Systems & outsourced services

Hands on the keyboard: is the heart of your IT still beating? This chapter is all about the heart of

information technology – the applications, systems, networks and hardware. However, a wide

variety of activities are required in order to set up, maintain and operate this complex configuration.

Have you already outsourced everything? Even if you have, this chapter provides valuable

information.

Before we really get down to business, let's stick with the subject of management for a bit. Many IT

folks consider managing availability and capacity to be a strategic or tactical task. In smaller IT

organisations, however, the usual scenario is that the specialist knows his or her systems in detail

while also providing them with conceptual support; both topics are shifted to the operational level.

Availability management is responsible for all aspects that pertain to the availability of a service.

Generally speaking: when required by the customer, a service provides the needed and planned

function as set forth in the SLA [Service Level Agreement]. Concretely put: when the user wants to

retrieve his or her e-mail, the corresponding e-mail server has to be working. Therefore, availability

management serves as a monitor to ensure adherence to the objectives defined in the SLA and

provides the necessary and possible improvements in terms of availability. In doing so, availability

management can make use of reactive and proactive means:

Page 10: ITSM Guide - Extract Chapter 3.2 - Service Operations

Re-active Pro-active

! Monitoring, measuring, analysing, reporting and verifying the availability

! Examining the non-availability

! Risk assessment and management

! Implementing cost-appropriate countermeasures

! Planning, designing and testing new or changed services

! Testing the availability and failure mechanisms

Service providers often attempt to attract customers by promising 99% availability of the service.

This availability in percent is calculated by dividing the actual availability of the service by the

agreed service time:

!"#$%#&$%$'(! !"!! ! ! !!"#$$%!!"#$%&"!!"#$ ! !"#$!!"!!"#$%&"!!"#$#%&#'&%()!!"#$$%!!"#$%&"!!"#$ !

!

At first glance, the value of 99 percent availability seems very high. However, let's convert this to

minutes and days and see what the results are. Relative to one day, 99-percent availability means

less than 15 minutes of downtime. Calculated over the entire year, these 15-minute periods add up

to 3.5 days. On this basis, a decision can be made as to whether 99 percent is a realistic level or

not. In retrospect, it is worthwhile to check that the promise has actually been kept.

Another critical point for orientation is service availability (regardless of whether in-house or

outsourced) from provision of the service to its consumption (end-to-end). For example, if we

measure provision of a business application based on server uptime, other circumstances (e.g.

failure of the network) between server and user can cause a downtime, which, however, is not

taken into consideration. Accordingly, the measurement should be carried out as close to the

receiver as possible in order to take all eventualities into account.

If a failure occurs despite all preventive measures, availability management provides two additional

metrics:

! Response time – Time between the report of a disruption and the beginning of

troubleshooting.

! Restore time – Time between the report of an incident and restoration of the service.

If service management is outsourced, the most important aspect to be considered when selecting

the service provider is the restore time. Otherwise, the following case can occur: After a hardware

defect, the provider already responds after a few minutes and initiates the order of the spare part.

Page 11: ITSM Guide - Extract Chapter 3.2 - Service Operations

However, if the spare part is not available and a week passes until delivery, the service cannot be

offered again for a few days.

Another management topic is managing the available capacity and the needed capacity in the

future (capacity management). The Capacity Manager acts as the "fortune teller" of corporate IT.

He or she does not look into a crystal ball, but instead analyses the current demand, monitors the

company's development and, based on the corporate strategy, derives the future demand for

services and the underlying infrastructure. He or she must ensure that the needed capacity is

available in the planned quality at all times.

Capacity management consists of three subareas:

! Business capacity management includes all activities intended to identify future business

requirements and reflect them in the capacity plan.

! Service Capacity Management refers to the activities that provide insight as to the

capacities of the IT services required in the future.

! Component Capacity Management includes all activities that monitor the capacity,

performance and utilisation of the individual configuration elements (e.g. PC, printer,

telephone, server).

We can put it most simply by saying that the future requirements of business for the services, and

the demand of the services for the resources, have to be taken into account and reflected in the

capacity planning. Based on this plan, actions are possible to ensure that the goals of the SLA are

also met in the future. For example, the growth of the amount of disk space needed can be

documented, a forecast derived from this and additional disk space purchased in a timely manner.

This ensures that a cost-appropriate IT capacity can be maintained.

Up to this point, we have only talked about management of IT and IT services. However, we must

not forget the specialists who install and maintain the applications and systems. Depending on the

size of the company, these technical operations are divided into various teams and responsibilities.

The common differentiation is between responsibility for systems and applications.

System support, the company's administrators are concerned with all hardware-related topics. In

the ITSM environment, this task is often given the title IT operations management and includes

management of the physical IT infrastructure (typically in data centres or computer rooms). The

foremost goal is safeguarding and optimising the current, stable condition of the infrastructure.

Examples of the tasks of IT operations management include:

! System administration and running operational activities and events

! Console management and job scheduling of the servers

Page 12: ITSM Guide - Extract Chapter 3.2 - Service Operations

! Backup and restore

! Print management

! Performance measurement and optimisation

! Maintenance activities

! IT facility management (climate control system, power supply etc.)

Application management, on the other hand, is responsible for designing, developing, testing and

improving business applications. The areas of responsibility can vary greatly from company to

company. If the software is developed in-house, the range of application management

responsibilities widens. The other option is to outsource application development. Of course, there

are many increments between these two solutions (e.g. standard software with in-house

adaptations). The tasks of application management are defined as follows:

! Supporting the company's applications

! In some cases, designing, developing, testing and improving applications

! Supporting IT operations management

! Training employees

3.2.2 IT procurement

The rapid development of information technology poses constant challenges to the IT departments

of small and medium-sized enterprises: there are new kinds of technologies, changed services and

innovative products. Do these have the potential to add value to the business or are they merely

self-serving? Many calculation options are available for answering this question:

! Total cost of ownership (TCO)

! Total benefits of ownership (TBO) / Total value of ownership (TVO)

! Static or dynamic investment calculation

! Return on investment (ROI)

It is, in fact, true that these options provide the company with correct results in subareas. Viewed

separately, however, they do not provide valid results in the majority of cases. For example, there

is no correct comparison of all costs and benefits, or only purely monetary variables are used.

Ultimately, it is necessary to clarify whether the total benefit (TBO/TVO) to be expected justifies the

total costs (TCO) to be expected over the service life or even creates a profit situation. In other

Page 13: ITSM Guide - Extract Chapter 3.2 - Service Operations

words: a return on investment consideration, which is not limited to the investment costs and the

monetary benefits, but considers all costs and benefits.

Once the investment decision has been made, "all" that is left is to purchase the new IT

components. All too frequently, however, this plan proves to be extremely complex.

Not without reason, as IT procurement processes affect multiple areas of an organization –

including those outside IT – and include services of external providers, such as suppliers.

Accordingly, close co-operation should be pursued and open communication maintained.

Supplier management within the IT organization has the following objective:

! Regularly observing the procurement market and monitoring trends and innovations

! Selecting suppliers, taking into account the strategic significance for the company's business

processes

! Negotiating contracts and agreeing on a fixed scope of services with the suppliers

! Ensuring and continuously increasing the quality of the purchased service

! Managing relationships with suppliers

! Documenting all suppliers, contracts and relationships

In many cases, the tasks are also divided up

between the purchasing department as such and

the IT organization. In doing so, IT co-ordinates

all technical aspects in the cycle, while

purchasing handles structuring the contracts and

pricing.

The greater a supplier's strategic significance for

the company, the more long-term the business

relationships should be. The significance can be

defined based on two variables:

! Value contribution and importance

! Risk and influence

In most cases, a long-term, close-knit co-operation pays off. For example, blanket purchase

agreements often allow more favourable terms and conditions when buying components (e.g. for

the expected quantity of desktop computers in one year, while also allowing optimisations and

relieving workload in the procurement process. Over the medium term, consistent standardisation

can achieve additional effects of scale.

Diagram 11 - Classifying suppliers

Page 14: ITSM Guide - Extract Chapter 3.2 - Service Operations

Is IT procurement not a relevant topic to companies that have outsourced all services? Even when

full outsourcing is used, it is important for there to be a responsible contact person in the company;

here, too, the customer–supplier relationship has to be maintained, quality monitored and the

market observed regularly.

3.2.3 Security and environment

"Sony says sorry - the Playstation manufacturer has apologised for the massive data theft in its

networks and promised free games as compensation and better security measures. (!)“. These or

similar words were used by many daily newspapers to relate the story in spring 2011. Criminality in

the IT environment is nothing new. As a small company, one could surely ask: who could profit

from my data anyway? However, the topic of IT security is more varied than one might think, and

certainly also relevant for smaller companies:

! First names, car marques, birthdays or the favourite football club—many people use easy-to-

remember terms to recall a password. Is a corresponding guideline in place in the company?

! Is the company's administrator password securely stored with the administrator's supervisor in

case the admin is absent?

! Are virus scanners installed and are they updated on a regular basis?

! Are hard drives securely deleted (wiped) before being disposed of?

! Are important servers stored where they are safe from water or heat damage?

! What happens to e-mails when an employee is on vacation?

! Who is permitted to use his or her personal mobile phone in the company?

Numerous statistics prove that approximately half of security-related incidents are triggered not by

external parties, but by the company's own employees. In almost all cases, this is accidental,

usually out of ignorance, a lack of training or carelessness. Accordingly, SMEs should also analyse

the possible hazards and take countermeasures.

In doing so, all possible risks should be taken into account:

! Protecting the information from unauthorised access and malware (e.g. viruses, hacker

attacks, espionage)

! Provisioning the information to authorised persons (Access Management)

! Securing the infrastructure against influences from the area surrounding the IT (e.g.

overvoltage in the power supply network or power failure, flood, heat or even fire)

Page 15: ITSM Guide - Extract Chapter 3.2 - Service Operations

The measures taken (e.g. providing a firewall, using a climate control system) are to be considered

preventive. The measures taken should be in proportion to the possible harm. Operating a server in

the supply closet next to chemicals and moist rags is surely negligent. However, an autonomous,

earthquake-proof data centre is surely also not the right choice for a small company. One hundred

percent protection is possible in rare cases only or associated with high costs that are justified in

only a few application areas. However, the possible risks should be specified accordingly and the

measures planned in case the risks do occur. This is done in what is known as an IT recovery plan

for various scenarios. The objective is to restore normal operation of the disrupted service(s) as

quickly as possible. If, for example, the servers have to be shut down during a long-term power

failure, the recovery plan should describe the systematic procedure at the start so that all

dependencies between the systems are taken into account and no further delay or even damage

occurs.