SlideShare a Scribd company logo
1 of 17
ITIL
Problem
Management
Contents
Roles
Process
Policy
Purpose of Problem Management
2
3
Contents
Purpose of Problem Management
Terms (Service Operations)
1
Something is broken or about
to break.
Repair as quickly as possible.
Open incidents are measured
against SLAs.
Incident
2
Underlying “root-cause.”
Remains open until
underlying issue is resolved.
Open Problems are not
measured against SLAs.
Creates “work-around.”
Problem
3
Routine pleas for help – but
nothing is broken. These
include items like “can you tell
me Joe Blow’s phone
number”, “can you unlock my
account”, and “will you reset
my password.”
Service Request
Problem Guidelines
There is no time SLA target associated with
problem resolution. Resolution of the root cause
of a problem may take hours or days or even
years
Problems do not need prior approvals to be worked
and resolved. They only need to be prioritised to
work the most critical problems first
If it appears that root cause identification and
resolution are not readily apparent and the impact
is medium or high, effort should be focused first
on providing a suitable documented work around
5
Problem Prioritisation
Problem Priority
Impact: People & Service
Severity: Time
Severity
3-Low
User cannot
perform a portion
of their duties.
2-Medium
User cannot perform
critical time
sensitive functions
1-High
Major portion of a
critical service is
unavailable
Impact
3-Low
 One or two personnel
 Degraded Service Levels but still
processing within SLA constraints 3-Low 3-Low 2-Medium
2-Medium
 Multiple personnel in one physical
location
 Degraded Service Levels at or below
SLA constraints
 Cause of problem falls across multiple
functional areas
2-Medium 2-Medium 1-High
1-High
 All users of a specific service
 Personnel from multiple agencies are
affected
 Public facing service is unavailable
 Any item listed in the Crisis Response
tables
1-High 1-High 1-High
6
Problems use the same prioritisation as incidents. To prioritise,
the impact and severity must be assessed.
Contents
Roles
7
Roles
8
 Problem Reporter
 Anyone can request a problem case to be opened
 The typical sources for problems are the Service Desk, Service
Provider Groups, and proactive problem management through
Quality Assurance
Roles
9
 Service Desk
 Ensure that all problems received/ identified by the Service Desk
are recorded in your ITSM software
 Delegates responsibility by assigning problems to the
appropriate provider group for resolution based upon the
categorisation rules
 Performs post-resolution customer review to ensure that all work
services are functioning properly
 Quality Assurance
 Owns all reported problems
 Prepare reports showing statistics of problems resolved /
unresolved
Roles
10
 Service Provider 2nd Line Groups
 Composed of technical and functional staff involved in
supporting services
 Perform root cause analysis of the problem and develop
potential solutions
 Test potential solutions and develop implementation plan
 Service Provider 3nd Line Groups
 Composed of external technical staff involved in supporting
services
 Perform root cause analysis of the problem and develop
potential solutions
 Test potential solutions and assist in development of
implementation plan
Contents
Process
11
12
Process Flow
Process Flow - Identification
 Anyone within 1st, 2nd 3rd line can request that a problem record be
opened
 All initial information relative to a problem will be logged, especially
related incidents
 Before continuing, the Service Desk will verify the related service
having the issue and correlate it with an existing service and SLA
 After problem verification, the Service Desk will attempt to establish
urgency and impact which define priority.
13
Process Flow – Analyze & Resolve
 Primary root cause analysis will be performed by the Service
Provider Group
 As soon as the problem is clearly documented with identifying
symptoms, linked to the incident, a known error record can be
created within the ITSM software so that if additional incidents
occur, they can be related to the existing problem
 Once the solution is determined, it should be implemented
following the Change Management Process
 Once the solution is implemented and verified, the problem record
may be closed
14
Contents
Policy
15
Problem Policy
Problems must be logged with the Service Desk
before they are worked on
There is no SLA target date connected to problem
resolution (e.g. a start and complete by date)
If a work around for the problem has been
discovered, it should be provided to the Service
Desk and logged into the ITSM software and a
known error recorded
16
17

More Related Content

What's hot

Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesSlideTeam
 
Incident Management
 Incident Management Incident Management
Incident Managementiicecollege
 
The ROI of Problem Management
The ROI of Problem ManagementThe ROI of Problem Management
The ROI of Problem ManagementFrontRange
 
Making Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationMaking Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationAtlassian
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesSlideTeam
 
Deal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayDeal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayLinpei Zhang
 
IT Service Catalogue Overview
IT Service Catalogue OverviewIT Service Catalogue Overview
IT Service Catalogue Overviewcesilia_123
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident ManagementNorthCoastHDI
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementEric Sambraus
 
Incident Escalation process Presentation
Incident Escalation process PresentationIncident Escalation process Presentation
Incident Escalation process PresentationLukas Williamson
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentationsubtitle
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsEdward Paul Pagsanhan
 
Best Practices in Major Incident Management
Best Practices in Major Incident ManagementBest Practices in Major Incident Management
Best Practices in Major Incident ManagementxMatters Inc
 

What's hot (20)

Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation Slides
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Incident Management
 Incident Management Incident Management
Incident Management
 
The ROI of Problem Management
The ROI of Problem ManagementThe ROI of Problem Management
The ROI of Problem Management
 
Making Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationMaking Problem Management Work for Your Organization
Making Problem Management Work for Your Organization
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
Incident management
Incident managementIncident management
Incident management
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
Deal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayDeal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL Way
 
IT Service Catalogue Overview
IT Service Catalogue OverviewIT Service Catalogue Overview
IT Service Catalogue Overview
 
Incident management with jira
Incident management with jiraIncident management with jira
Incident management with jira
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident Management
 
itSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem ManagementitSMF PMSIG - Proactive Problem Management
itSMF PMSIG - Proactive Problem Management
 
Incident Escalation process Presentation
Incident Escalation process PresentationIncident Escalation process Presentation
Incident Escalation process Presentation
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand Standards
 
Best Practices in Major Incident Management
Best Practices in Major Incident ManagementBest Practices in Major Incident Management
Best Practices in Major Incident Management
 

Similar to Problem Management Overview

pm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptxpm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptxJayz41
 
Help desk problem management it-toolkits
Help desk problem management   it-toolkitsHelp desk problem management   it-toolkits
Help desk problem management it-toolkitsIT-Toolkits.org
 
PMI-Service-Level-Agreement for all transactions
PMI-Service-Level-Agreement for all transactionsPMI-Service-Level-Agreement for all transactions
PMI-Service-Level-Agreement for all transactionsRaymondSmith96
 
5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentationAnna Sadokhina
 
training_-_intro_and_process.ppt
training_-_intro_and_process.ppttraining_-_intro_and_process.ppt
training_-_intro_and_process.pptTriLe786508
 
5 Problem Management Traps to Avoid!
5 Problem Management Traps to Avoid!5 Problem Management Traps to Avoid!
5 Problem Management Traps to Avoid!John Barber
 
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...ITIL Indonesia
 
IRJET- Automated Problem Resolution using KEDB
IRJET- 	  Automated Problem Resolution using KEDBIRJET- 	  Automated Problem Resolution using KEDB
IRJET- Automated Problem Resolution using KEDBIRJET Journal
 
Technical Support Helpdesk
Technical Support HelpdeskTechnical Support Helpdesk
Technical Support HelpdeskGagan Singh
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resumevenu goud
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resumevenu goud
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resumevenu goud
 
Pgs problem management assessment 022509
Pgs problem management assessment 022509Pgs problem management assessment 022509
Pgs problem management assessment 022509wardell henley
 
WeChat:PCR
WeChat:PCRWeChat:PCR
WeChat:PCR? ?
 
Introduction to Problem Management
Introduction to Problem ManagementIntroduction to Problem Management
Introduction to Problem Managementssuserc2c42f
 
Computer Science Project pdf
Computer Science Project pdfComputer Science Project pdf
Computer Science Project pdfnickealwilliams2
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperChuck Boutcher
 

Similar to Problem Management Overview (20)

pm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptxpm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptx
 
Help desk problem management it-toolkits
Help desk problem management   it-toolkitsHelp desk problem management   it-toolkits
Help desk problem management it-toolkits
 
PMI-Service-Level-Agreement for all transactions
PMI-Service-Level-Agreement for all transactionsPMI-Service-Level-Agreement for all transactions
PMI-Service-Level-Agreement for all transactions
 
5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation5 forces incident problem mgmt-presentation
5 forces incident problem mgmt-presentation
 
training_-_intro_and_process.ppt
training_-_intro_and_process.ppttraining_-_intro_and_process.ppt
training_-_intro_and_process.ppt
 
5 Problem Management Traps to Avoid!
5 Problem Management Traps to Avoid!5 Problem Management Traps to Avoid!
5 Problem Management Traps to Avoid!
 
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
(ONLINE) ITIL Indonesia Community – Meetup “ITIL Introduction: Incident and P...
 
IRJET- Automated Problem Resolution using KEDB
IRJET- 	  Automated Problem Resolution using KEDBIRJET- 	  Automated Problem Resolution using KEDB
IRJET- Automated Problem Resolution using KEDB
 
Technical Support Helpdesk
Technical Support HelpdeskTechnical Support Helpdesk
Technical Support Helpdesk
 
ITIL
ITILITIL
ITIL
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resume
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resume
 
Teegulla Venu Goud Resume
Teegulla Venu Goud ResumeTeegulla Venu Goud Resume
Teegulla Venu Goud Resume
 
Dit yvol4iss06
Dit yvol4iss06Dit yvol4iss06
Dit yvol4iss06
 
Pgs problem management assessment 022509
Pgs problem management assessment 022509Pgs problem management assessment 022509
Pgs problem management assessment 022509
 
WeChat:PCR
WeChat:PCRWeChat:PCR
WeChat:PCR
 
Dit yvol2iss23
Dit yvol2iss23Dit yvol2iss23
Dit yvol2iss23
 
Introduction to Problem Management
Introduction to Problem ManagementIntroduction to Problem Management
Introduction to Problem Management
 
Computer Science Project pdf
Computer Science Project pdfComputer Science Project pdf
Computer Science Project pdf
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_Whitepaper
 

More from Marval Software

Practical problem solving tips
Practical problem solving tipsPractical problem solving tips
Practical problem solving tipsMarval Software
 
Essential leadership skills and qualities
Essential leadership skills and qualitiesEssential leadership skills and qualities
Essential leadership skills and qualitiesMarval Software
 
Essential Management skills
Essential Management skillsEssential Management skills
Essential Management skillsMarval Software
 
Effective communication on the service desk
Effective communication on the service deskEffective communication on the service desk
Effective communication on the service deskMarval Software
 
Managing customer expectations- the ring ring conversation
Managing customer expectations- the ring ring conversationManaging customer expectations- the ring ring conversation
Managing customer expectations- the ring ring conversationMarval Software
 
Marval's innovative continual service improvement approach
Marval's  innovative continual service improvement approachMarval's  innovative continual service improvement approach
Marval's innovative continual service improvement approachMarval Software
 
Marval Release Management - the political process
Marval Release Management - the political processMarval Release Management - the political process
Marval Release Management - the political processMarval Software
 
ISO/IEC 20000 audit day overview
ISO/IEC 20000 audit day overviewISO/IEC 20000 audit day overview
ISO/IEC 20000 audit day overviewMarval Software
 

More from Marval Software (10)

Practical problem solving tips
Practical problem solving tipsPractical problem solving tips
Practical problem solving tips
 
Essential leadership skills and qualities
Essential leadership skills and qualitiesEssential leadership skills and qualities
Essential leadership skills and qualities
 
Presentation skills
Presentation skills Presentation skills
Presentation skills
 
Essential Management skills
Essential Management skillsEssential Management skills
Essential Management skills
 
Working in service team
Working in service teamWorking in service team
Working in service team
 
Effective communication on the service desk
Effective communication on the service deskEffective communication on the service desk
Effective communication on the service desk
 
Managing customer expectations- the ring ring conversation
Managing customer expectations- the ring ring conversationManaging customer expectations- the ring ring conversation
Managing customer expectations- the ring ring conversation
 
Marval's innovative continual service improvement approach
Marval's  innovative continual service improvement approachMarval's  innovative continual service improvement approach
Marval's innovative continual service improvement approach
 
Marval Release Management - the political process
Marval Release Management - the political processMarval Release Management - the political process
Marval Release Management - the political process
 
ISO/IEC 20000 audit day overview
ISO/IEC 20000 audit day overviewISO/IEC 20000 audit day overview
ISO/IEC 20000 audit day overview
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Problem Management Overview

  • 4. Terms (Service Operations) 1 Something is broken or about to break. Repair as quickly as possible. Open incidents are measured against SLAs. Incident 2 Underlying “root-cause.” Remains open until underlying issue is resolved. Open Problems are not measured against SLAs. Creates “work-around.” Problem 3 Routine pleas for help – but nothing is broken. These include items like “can you tell me Joe Blow’s phone number”, “can you unlock my account”, and “will you reset my password.” Service Request
  • 5. Problem Guidelines There is no time SLA target associated with problem resolution. Resolution of the root cause of a problem may take hours or days or even years Problems do not need prior approvals to be worked and resolved. They only need to be prioritised to work the most critical problems first If it appears that root cause identification and resolution are not readily apparent and the impact is medium or high, effort should be focused first on providing a suitable documented work around 5
  • 6. Problem Prioritisation Problem Priority Impact: People & Service Severity: Time Severity 3-Low User cannot perform a portion of their duties. 2-Medium User cannot perform critical time sensitive functions 1-High Major portion of a critical service is unavailable Impact 3-Low  One or two personnel  Degraded Service Levels but still processing within SLA constraints 3-Low 3-Low 2-Medium 2-Medium  Multiple personnel in one physical location  Degraded Service Levels at or below SLA constraints  Cause of problem falls across multiple functional areas 2-Medium 2-Medium 1-High 1-High  All users of a specific service  Personnel from multiple agencies are affected  Public facing service is unavailable  Any item listed in the Crisis Response tables 1-High 1-High 1-High 6 Problems use the same prioritisation as incidents. To prioritise, the impact and severity must be assessed.
  • 8. Roles 8  Problem Reporter  Anyone can request a problem case to be opened  The typical sources for problems are the Service Desk, Service Provider Groups, and proactive problem management through Quality Assurance
  • 9. Roles 9  Service Desk  Ensure that all problems received/ identified by the Service Desk are recorded in your ITSM software  Delegates responsibility by assigning problems to the appropriate provider group for resolution based upon the categorisation rules  Performs post-resolution customer review to ensure that all work services are functioning properly  Quality Assurance  Owns all reported problems  Prepare reports showing statistics of problems resolved / unresolved
  • 10. Roles 10  Service Provider 2nd Line Groups  Composed of technical and functional staff involved in supporting services  Perform root cause analysis of the problem and develop potential solutions  Test potential solutions and develop implementation plan  Service Provider 3nd Line Groups  Composed of external technical staff involved in supporting services  Perform root cause analysis of the problem and develop potential solutions  Test potential solutions and assist in development of implementation plan
  • 13. Process Flow - Identification  Anyone within 1st, 2nd 3rd line can request that a problem record be opened  All initial information relative to a problem will be logged, especially related incidents  Before continuing, the Service Desk will verify the related service having the issue and correlate it with an existing service and SLA  After problem verification, the Service Desk will attempt to establish urgency and impact which define priority. 13
  • 14. Process Flow – Analyze & Resolve  Primary root cause analysis will be performed by the Service Provider Group  As soon as the problem is clearly documented with identifying symptoms, linked to the incident, a known error record can be created within the ITSM software so that if additional incidents occur, they can be related to the existing problem  Once the solution is determined, it should be implemented following the Change Management Process  Once the solution is implemented and verified, the problem record may be closed 14
  • 16. Problem Policy Problems must be logged with the Service Desk before they are worked on There is no SLA target date connected to problem resolution (e.g. a start and complete by date) If a work around for the problem has been discovered, it should be provided to the Service Desk and logged into the ITSM software and a known error recorded 16
  • 17. 17