Free Essay

Bmc Best Practice

In:

Submitted By borantall
Words 5623
Pages 23
White Paper November 2006

BMC® Best Practice Process Flows for Asset Management and ITIL Configuration Management

Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC Software, the BMC Software logos, and all other BMC Software product or service names, are registered trademarks or trademarks of BMC Software, Inc. All other trademarks belong to their respective companies. BMC Software, Inc., considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable end user license agreement or nondisclosure agreement for the product and the proprietary and restricted rights notices included in this documentation. Restricted Rights Legend
U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, and DFARS 252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC Software, Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract notices should be sent to this address.

Contacting Us If you need technical support for this product, contact Customer Support by email at customer_support@bmc.com. If you have comments or suggestions about this documentation, contact Information Development by email at doc_feedback@bmc.com. This edition applies to version 7.0 of the licensed program.

BMC Software, Inc. www.bmc.com Contents
Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Process flow shapes and text indicators. . . . . . . . . . . . . . . . . . . 6 For more information . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Chapter 2

ITIL configuration management . . . . . . . . . . . . . . . . . . . 9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Configuration management planning Configuration identification . . . . Configuration specification. . . . . Configuration control . . . . . . . Configuration audit and verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 15 17 19 20

Chapter 3

Asset Management . . . . . . . . . . . . . . . . . . . . . . . . 23
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Procurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Cost management—chargebacks . . . . . . . . . . . . . . . . . . . 30 Cost management—cost capture . . . . . . . . . . . . . . . . . . . 31 Cost management—depreciation . . . . . . . . . . . . . . . . . . . 32 Contract management . . . . . . . . . . . . . . . . . . . . . . . . 33 Software license management—license compliance . . . . . . . . . . . 35 Software license management—new contracts. . . . . . . . . . . . . . 37 Software license management—deployment . . . . . . . . . . . . . . 38 Asset maintenance and CMDB updates—scheduled maintenance . . . . . 39

Contents

3

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

Asset maintenance and CMDB updates—scheduled audits . . . . . . . . 40 Asset maintenance and CMDB updates—review health . . . . . . . . . . 41 Asset retirement . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Version reviews. . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Schedule definitions—maintenance windows . . . . . . . . . . . . . . 44 Schedule definitions—blackout windows . . . . . . . . . . . . . . . . 45 Schedule definitions—maintenance schedules . . . . . . . . . . . . . . 46 Schedule definitions—audit schedules . . . . . . . . . . . . . . . . . 47

4 Contents

Chapter

1

Introduction

This white paper describes the process flows implemented in the BMC® Remedy® 7.0 Asset Management application, and based on IT Infrastructure Library (ITIL) best practices for configuration management. The BMC Remedy Asset Management application lets IT professionals track and manage enterprise configuration items (CIs)—and their changing relationships—throughout the entire asset lifecycle. Asset Management tracks contracts, financial costs, software licenses, outage indicators, and more for the CI information stored within the BMC® Atrium™ Configuration Management Database (CMDB) application. BMC Configuration Management distributes software and patches to desktops, servers, and handheld devices, and can synchronize application code and content. Use this tool to help implement part of the ITIL configuration management process. BMC Configuration Discovery discovers hardware and software and can monitor usage of software. Use this tool to help implement the CMDB data load and the audit parts of the ITIL configuration management process. It can also play a role in the software license compliance part of the Asset Management lifecycle. The BMC Atrium CMDB product provides all the necessary features to implement a CMDB, including normalization and reconciliation of data. Data normalization uses the Definitive Software Library (DSL).

Introduction

5

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

As part of the BMC Remedy IT Service Management (ITSM) Suite, Asset Management is integrated with BMC Remedy Service Desk (which contains the BMC Remedy Incident Management and BMC Remedy Problem Management applications), BMC Remedy Change Management, and BMC Service Level Management, and offers flexibility to support customized business processes. To help you understand how the ITIL configuration management processes are supported by BMC applications, this white paper includes:
!

Process flow diagrams—for both the high-level overview, and the detailed steps. Text explaining how the process is supported by the application. Delineation of the process into separate user roles.

! !

Process flow shapes and text indicators
The process flow diagrams in this white paper use the following shapes and text indicators:
Table 1-A: Process flow shapes and text indicators

Shape or text indicator
&KDQJH LQLWLDWLRQ

Description Start or end shape indicates the starting or ending point of the process flow, for example, change initiation.

Flow line shape indicates the sequence of steps and the direction of the process flow.

 'HWHUPLQH LQFLGHQW W\SH

Action or process shape indicates a single step in the flow, for example, determine incident type.

6 Chapter 1—Introduction

White Paper Table 1-A: Process flow shapes and text indicators (Continued)

Shape or text indicator

Description Decision shape indicates a branching point (Yes or No) in the process flow, for example, customer info correct?

 &XVWRPHU LQIR FRUUHFW"



Off-page shape indicates that the process continues in a different diagram; the number indicates the step. For example, process continues in a different diagram with step 2.1.



Chevron shape indicates that the process started from a different diagram and continues here. For example, process continues from step 2.11.

,QFLGHQW 0DQDJHPHQW

Subroutine shape indicates a sequence of actions that perform specific tasks embedded within an external process flow, for example, Incident Management or Change Management.

Identifies databases used in ITSM 7.0 process flows, for example, service level management or CMDB.

&0'%

For more information
For information about additional BMC best practices, see the following documentation:
! !

BMC Best Practice Process Flows for ITIL Change Management BMC Best Practice Process Flows for ITIL Incident and Problem Management

For more information

7

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

For detailed information about the ITSM 7.0 applications, see the following documentation:
! ! ! !

BMC Remedy Asset Management 7.0 User’s Guide BMC Remedy Service Desk: Incident Management 7.0 User’s Guide BMC Remedy Service Desk: Problem Management 7.0 User’s Guide BMC Remedy Change Management 7.0 User’s Guide

For information about other BMC applications mentioned in this white paper, see the following documentation:
! !

BMC Atrium CMDB 2.0 User’s Guide BMC Configuration Management Introduction to Products 7.0 Guide

For additional information about the relationship between Asset Management, ITIL, and the CMDB, see the following BMC white paper:
!

Asset Management, ITIL®, and the CMDB: Connecting the Dots between IT Operations and the Bottom Line

8 Chapter 1—Introduction

Chapter

2

ITIL configuration management

ITIL configuration management process is responsible for controlling all managed IT infrastructure items and for maintaining the CMDB. BMC supports ITIL configuration management with the following applications:
!

BMC Remedy Asset Management—Lets IT professionals track and manage enterprise configuration items (CIs)—and their changing relationships—throughout the entire asset lifecycle. For details of the extended functionality for asset management that it provides, see “Asset Management” on page 23. BMC Configuration Management—Distributes software and patches to desktops, servers, and handheld devices, and can synchronize application code and content. BMC Configuration Discovery—Discovers hardware and software and can monitor usage of software. Use this tool to help implement the CMDB data load and the audit parts of the ITIL configuration management process. The BMC Atrium CMDB—Provides all the necessary features to implement a CMDB, including normalization and reconciliation of data. Data normalization uses the Definitive Software Library (DSL).

!

!

!

ITIL configuration management

9

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

The ITIL Configuration Management process flow includes the following user roles:
Table 2-A: Configuration Management user roles

Role Configuration manager

Description This is a role in ITIL. The configuration manager and the asset manager might be the same person within an organization. The configuration manager controls the CMDB. ITIL includes a separate role for a configuration administrator who administrates the CMDB. Because BMC can automate some of the steps for a configuration administrator, these flow diagrams attach nonautomated steps to the configuration manager role.

Configuration auditor Discovery

This person audits CIs in the CMDB against the physical items. Some steps of the process are completed or assisted by discovery tools, such as BMC Configuration Discovery. Some steps of the process are completed by the system without manual intervention. This includes databases and other ITSM processes that interact with the ITIL Configuration Management processes, including:
! ! ! !

System

Service support, service delivery, and other related processes

Asset Management Change Management CMDB Incident Management

This section describes the ITIL Configuration Management processes and user roles.

10 Chapter 2—ITIL configuration management

White Paper

For information about BMC applications that support ITIL Configuration Management, see:
! ! !

BMC Asset Management 7.0 User’ Guide BMC Atrium CMDB 2.0 User’s Guide BMC Configuration Management Introduction to Products 7.0 Guide

Overview
The configuration management process includes five stages.
Figure 2-A: Overview of the configuration management process

CMDB

Configuration manager

1 Configuration management planning

2 Configuration identification

3 Configuration specifications

4 Configuration control

Service support, service delivery, and other related processes

Configuration auditor

5 Configuration audit and verification

RFC

Asset Management

Change Management

Incident Management

Asset Management

Incident Management

Change Management

Change Management

The configuration management process begins when the configuration manager plans the configuration management strategy.
Stage 1 Configuration management planning—During this stage, the configuration

manager creates the configuration plan, which includes plans for the CMDB. It also includes building the configuration catalog, the product catalog, and DSL entries.

Overview

11

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

Stage 2 Configuration identification—The configuration manager identifies

configuration items. New configuration items can be recorded and identified as part of Asset Management, Change Management, or Incident Management. When a new configuration item is identified, it is stored in the CMDB.
Stage 3 Configuration specifications—The configuration manager manages

configuration specifications. Configuration specifications are recorded through Asset Management and stored in the CMDB.
Stage 4 Configuration control—The configuration manager controls changes to

configuration items. Requests for configuration changes come from both incident management and change management. Updates to the configuration are stored in the CMDB.
Stage 5 Configuration audit and verification—The configuration manager and the

configuration auditor verify configuration changes and perform periodic configuration audits. Database corrections resulting from this process update the CMDB. If changes are required, a request for change is created and completed by the change management process.

Details
This section describes the detailed steps for each stage of the configuration management process.

Stage 1 Configuration management planning
In this stage, the configuration manager creates and implements a configuration plan. These are manual planning and implementation steps, performed outside of the Asset Management application. The configuration plan includes plans for the CMDB. It also includes building the configuration catalog, the product catalog, and DSL entries.

12 Chapter 2—ITIL configuration management

White Paper

Planning the CMDB is a key aspect of configuration planning. These plans include:
! !

Scope, depth, and breadth of the CMDB. Method to populate the CMDB. For example, the CMDB can be initially populated from spreadsheets and bulk loads. Plans must include how to normalize and reconcile the initial load. Time lines.

!

When determining the scope of the CMDB, plan which CIs will be tracked in the CMDB, such as servers and software. When determining the depth of the CMDB, plan the number and level of CI relationships to maintain. It is helpful to review CI relationship types and contact relationship types. When determining the breadth of the CMDB, plan the level of detail to be tracked on CIs. It is helpful to review CI attributes, financials, maintenance schedules, and other fields. It is also helpful to review CI impacted areas. When implementing the plans, the configuration manager defines structures and foundation data that will be used during the identification stage. For example, product categorizations are used to classify the CIs. Foundation data recorded for CIs can include sites, locations, owners, and (if using the multi-tenancy feature of the application) companies.

Details

13

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management Figure 2-B: Configuration management planning
Configuration manager

1.1 Create a configuration plan

1.2 Implement configuration plan

2.1

Service support, service delivery, and other related processes

Configuration auditor

System

Discovery

The process includes the following steps:
1.1 The configuration manager creates a configuration plan. 1.2 The configuration manager implements the configuration plan.

The process continues with the Configuration identification stage at step 2.1.

14 Chapter 2—ITIL configuration management

White Paper

Stage 2 Configuration identification
In this stage, the configuration manager identifies configuration items. Discovery tools can be used to discover and create CI records.
Figure 2-C: Configuration identification

Configuration manager

2.1 Initial CMDB load?
Yes

No

2.5 Update to standard name catalog required?

2.6 New configuration baseline required?

No

3.1

Discovery

2.2 Gather/ discover initial CI data

2.3 Create new CI record

No

Generate RFC to update standard name catalog

Yes

System

2.4 Software?

Configuration auditor

Yes

Service support, service delivery, and other related processes

Change Management

Asset Management: Software License Management

Change Management

Change Management

Details

15

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

2.1 The configuration manager determines whether to perform an initial CMDB

load.
2.2 If this is an initial CMDB load, CI data is gathered or discovered.

This can be automated, or partially automated, by using discovery tools to find CIs. Also, the configuration manager can physically survey the organization and gather CIs.
2.3 The configuration manager or discovery tool creates a new CI record.

The CI record includes product categorization and other foundation data, such as the site, owner, and company.
2.4 The system determines whether the CI is software.

For software CIs, the system follows the Asset Management process for Software License Management, as described in “Software license management—license compliance” on page 35.
2.5 The configuration manager determines whether an update to the standard

name catalog is required. Standardized names for products are provided by the product catalog. To update this catalog, the asset manager generates an RFC to update the catalog. This update is handled by the change management process.
2.6 The configuration manager determines whether a new configuration

baseline is required. If a new configuration baseline is required, this is handled through the change management process. The process continues with the Configuration specification stage at step 3.1.

16 Chapter 2—ITIL configuration management

White Paper

Stage 3 Configuration specification
In this stage, the configuration manager relates the CI to the configuration baseline and records attributes. At the end of this process, the new CIs might be audited.
Figure 2-D: Configuration specification
Configuration manager

3.1 Relate CI to configuration baseline 3.2 Update attributes and status

3.3 Relate contracts to CIs

3.4 Create people relationships

3.5 Build CI interrelationships

System

Discovery

3.6 Reconcile

Configuration auditor

3.7 Initial audit required?

Yes

3.8 Perform an initial audit

5.1

3.9 Variances discovered?

Yes

4.1

Service support, service delivery, and other related processes

No

No

Configuration Management: Control

4.0

3.1 The configuration manager relates the CI to the configuration baseline. 3.2 The configuration manager updates the attributes and status of the CI.

If discovery tools initially found the CI, some of the attributes might be populated by the tools.
3.3 The configuration manager relates contracts to CIs.

The contracts are managed by the Asset Management process for Contract Management, as described in “Contract management” on page 33.

Details

17

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

3.4 The configuration manager relates the CI to people.

If you have Incident Management, when support staff look at an incident ticket for that person, the CIs related to that person are displayed.
3.5 The configuration manager relates CIs to each other.

When discovery tools find a CI, they might create relationships to other CIs.
3.6 The system reconciles the CI.

The Reconciliation Engine, part of the BMC Atrium CMDB, reconciles CIs from multiple sources. Up until this point, you are working in the discovery data set or the asset sandbox data set. You can configure which source is the standard when there are conflicts.
3.7 The configuration auditor determines whether an initial audit is required.

If an audit is not required, the process moves to the control stage. At this point, it is in a holding state, which you can think of as step 4.0—when an action occurs that requires the CI to be updated, the process starts with 4.1.
3.8 If an audit is required, the configuration auditor performs the initial audit.

Details of the audit process are described in “Configuration audit and verification” on page 20.
3.9 The configuration auditor determines whether variances are discovered.

If variances are discovered, the process moves to the configuration and control stage with step 4.1. Otherwise, the process moves to the control stage, but is on hold until an action occurs that requires the CI to be updated.

18 Chapter 2—ITIL configuration management

White Paper

Stage 4 Configuration control
In this stage, the configuration manager responds to requests to modify the CMDB.
Figure 2-E: Configuration control
4.4 Update CI attributes and relationships 2.1

Configuration manager

4.1 Request to modify CMDB

4.2 CI modified or replaced?
Replaced

Modified

Replaced

4.3 Retire old CI

Discovery

Service support, service delivery, and other related processes

Configuration auditor

System

4.5 Reconcile CI information

Change Management

Asset Management

Configuration Management: Control

CMDB

4.0

4.1 The configuration manager receives a request to modify the CMDB.

This request can come from either the Change Management or Asset Management process.
4.2 The configuration manager determines whether the CI has been modified or

replaced.
4.3 If the CI has been replaced, the configuration manager retires the old CI.

This starts the asset management process for retiring CIs. Also the configuration management process returns to the identification stage with step 2.1.

Details

19

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

4.4 If the CI has been modified, the configuration manager updates the CI

attributes and relationships.
4.5 The system reconciles the CI against other sources that add, modify, and

delete CIs. The Reconciliation Engine, part of the BMC Atrium CMDB, reconciles CIs from multiple sources. You can configure which source is the standard when there are conflicts. The process of modifying the CI is complete, and the control process moves to a holding state, which you can think of as step 4.0—when an action occurs that requires the CI to be updated, the process starts again with 4.1.

Stage 5 Configuration audit and verification
In this stage, the configuration manager initiates an audit, which is performed by the configuration auditor. An audit is a comparison between CIs recorded in the CMDB and the physical items.
Figure 2-F: Configuration audit and verification
&RQILJXUDWLRQ PDQDJHU

,QLWLDWH DXGLW

 'HWHUPLQH VFRSH RI WKH DXGLW

'LVFRYHU\

&RQILJXUDWLRQ DXGLWRU

 5XQ DXGLW  &ROODWH DXGLW UHVXOWV  'HWHUPLQH H[FHSWLRQV DQG SULRULWLHV  9DOLGDWH H[FHSWLRQ

6HUYLFH VXSSRUW VHUYLFH GHOLYHU\ DQG RWKHU UHODWHG SURFHVVHV

5XQ DXGLW FDQ EH GRQH E\ VFDQQLQJ SURGXFW GLVFRYHU\ WRRO PDQXDOO\ REWDLQLQJ LQIRUPDWLRQ

&KDQJH 0DQDJHPHQW

1R

 ,QLWLDO DXGLW"



20 Chapter 2—ITIL configuration management

White Paper

This process begins when the configuration manager initiates an audit. The process continues with the following steps:
5.1 The configuration manager determines the scope of the audit. 5.2 The configuration auditor runs the audit.

An audit can be performed by:
!

Scanning the product. A selective or full inventory can be performed with a bar-code reader.

! !

Using a discovery tool. Manually obtaining the information.

5.3 The configuration auditor collates the audit results.

The configuration auditor starts to analyze the results of the audit.
5.4 The configuration auditor determines exceptions and priorities. 5.5 The configuration auditor validates exceptions. 5.6 If this is an initial audit, the process returns to the configuration specification

stage with step 3.9. Otherwise, the exceptions are handled by the change management process.

Details

21

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

22 Chapter 2—ITIL configuration management

Chapter

3

Asset Management

Asset management extends the CMDB functionality to provide processes for “cradle-to-grave” asset management. The asset management process flows include the following user roles:
Table 3-A: Asset Management user roles

Role Asset manager

Description Manages assets throughout their lifecycle. Other asset users take on one or more of the other roles, depending on their responsibilities. Manages the business needs of the organization. Audits CIs in the CMDB against the physical items. Responsible for managing asset costs. People who deploy and maintain assets. It also refers to people who provide support within the change management, incident management, and problem management processes. Someone in a managerial role, but not necessarily an asset manager or a business manager.

Business manager Configuration auditor Financial manager IT support

Manager

Asset Management

23

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management Table 3-A: Asset Management user roles (Continued)

Role Purchasing Receiving Requester

Description Responsible for procuring assets. Responsible for receiving incoming assets. Someone requesting an asset. This could be a member of IT staff, or anyone in the organization. Some steps of the process are completed by the system without manual intervention. Includes databases and other ITSM processes that interact with the asset management process, including:
!

System

Service support, service delivery, and other related processes

! ! ! ! !

Asset management (and specific processes within asset management) CMDB Change management Configuration management Incident management Problem management

This section describes the Asset Management processes and user roles. For information about using the application, see the BMC Remedy Asset Management 7.0 User’s Guide.

24 Chapter 3—Asset Management

White Paper

Overview
The asset management process flow describes the lifecycle of the asset.
Figure 3-A: Asset lifecycle overview
Version reviews

Schedule definitions

Cost management

Contract management

Procurement

Asset retirement

Software license management

Asset maintenance and CMDB updates

Change Managment

Configuration Management

Overview

25

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

The asset lifecycle starts with procurement and ends with retirement of the asset. The change management process determines when assets are procured and can control when they are retired. When an asset is retired, the configuration management process updates the CMDB. Between procurement and retirement, the asset management includes the following repeating processes:
! ! ! !

Cost management Contract management Software license management Asset maintenance and CMDB updates

Version reviews and schedule definitions apply to the entire lifecycle of assets. Version reviews indicate the review of hardware and software versions. Schedule definitions indicate production scheduling. These include definitions for the following schedules and windows:
!

Blackout windows—Used by asset management, this is the time when a CI must not be brought down. For example, the server used by payroll might have a blackout window when paychecks are processed. This is stored in a time segment. This is used by supporting products, such as Change Management. Maintenance windows—Used by asset management, these indicate the best time to bring down a system for work. They are stored in time segments. When a CI is available, it is available for outages (for example, to perform maintenance). In the maintenance window, when a CI is unavailable, it is unavailable for outages. This process is used by supporting products, such as Change Management. Maintenance schedules—These determine how often maintenance should occur. For example, a particular computer system might need monthly or annual maintenance. If the maintenance requires bringing down the system, the maintenance window and blackout window determine when the CI can and cannot be brought down to perform the work. The maintenance schedules generate a change request to schedule maintenance. Audit schedules—Used by asset management, these are not stored in time segments. The audit schedule generates a change request to schedule the audit.

!

!

!

26 Chapter 3—Asset Management

White Paper

ITSM also includes the following features to account for CI availability:
!

Scheduled outages—Used by change management, a CI is brought down and unavailable to users during this time. This should happen within a maintenance window. Schedule of changes—Used by change management, scheduled changes might not include down time, for example if the CI can be running during the change. It is not stored in time segments. Unscheduled outages—Incident management can indicate CI unavailability, which indicates that a CI is unavailable or partially unavailable to users. These are not tracked as scheduled items.

!

!

Details
Because of the overall flow of the asset management processes, the individual flows are not assigned to numbered stages. This section includes the following process flows:
! !

“Procurement” on page 28 Cost management, which consists of:
! ! !

“Cost management—chargebacks” on page 30 “Cost management—cost capture” on page 31 “Cost management—depreciation” on page 32

! !

“Contract management” on page 33 Software license management, which consists of:
! ! !

“Software license management—license compliance” on page 35 “Software license management—new contracts” on page 37 “Software license management—deployment” on page 38

!

Asset maintenance and CMDB updates, which consists of:
!

“Asset maintenance and CMDB updates—scheduled maintenance” on page 39 “Asset maintenance and CMDB updates—scheduled audits” on page 40 “Asset maintenance and CMDB updates—review health” on page 41

!

!

Details

27

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management
! ! !

“Asset retirement” on page 42 “Version reviews” on page 43 Schedule definitions, which consists of:
! ! ! !

“Schedule definitions—maintenance windows” on page 44 “Schedule definitions—blackout windows” on page 45 “Schedule definitions—maintenance schedules” on page 46 “Schedule definitions—audit schedules” on page 47

Procurement
The procurement process starts the asset lifecycle. In this stage, a requester initiates the process. The process continues with input from purchasing, receiving, and management until the order is either closed or canceled.
Figure 3-B: Procurement
Yes

Requester/ IT support

No

1. Initiate order

2. Check inventory

3. Inventory exists?

No

4. Generate purchase requisition

5. Managed in CMDB?

6. Manually deploy

12. Move to inventory or manually deploy

Order closed

Purchasing

8. Price line items

9. Generate order and send to vendor

Yes

Receiving

10. Receive order
No

Manager

Yes

7. Approve purchase?

No

System

Order canceled

11. Need to deploy CI?
Yes

13. Change request already created?

No

14. Generate change request for deployment

Service support, service delivery, and other related processes

Yes

Order Closed

Change Management

28 Chapter 3—Asset Management

White Paper

1 The requester initiates the order. 2 The IT support checks inventory. 3 IT support determines whether the item is in inventory.

If the item is in inventory, a purchase order is not created.
4 If the item is not available, the requester generates a purchase order.

The process continues with step 7.
5 If the item is available, IT support evaluates whether the item is managed by

the CMDB. Items managed by the CMDB are controlled by the change management process. For items managed by the CMDB, the process continues with step 13.
6 If the item is not managed by the CMDB and is in inventory, IT support

deploys the item. For example, if mice are managed as bulk items in inventory, but not managed by the CMDB, after checking inventory, IT support takes the mouse out of inventory without further interaction with the application.
7 When a purchase order is created, it is sent to a manager for approval.

If the manager does not approve the purchase order, the order is canceled.
8 If the purchase order is approved, purchasing prices the line items. 9 Purchasing generates an order and sends it to the vendor. 10 When the order arrives, receiving processes the item. 11 The system determines whether the item must be deployed as a CI. 12 If the item is not deployed as a CI, it is either moved to inventory or manually

deployed, completing the order process.
13 If the item is deployed as a CI and managed by the CMDB, the system

determines whether a change request has been created for the item. If a change request has been created, the change management process manages deployment of the CI, and the order is completed.
14 Otherwise, the system creates the change request, which is managed by the

change management process.

Details

29

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

Cost management—chargebacks
The financial manager, with feedback from the business managers, performs the chargeback process of cost management.
Figure 3-C: Cost management—chargebacks
IT support

Financial manager

1. Intiate periodic chargeback procedure

2. Verify cost center definitions

3. Generate chargeback charges

4. Generate preliminary reports

7. Generate final reports

8. Close chargeback period

Chargeback records locked

6. Make adjustments

Send to business

No

Business managers

Yes

5. Adjustments needed?

Service support, service delivery, and other related processes

System

1 The financial manager initiates the periodic chargeback procedure. 2 The financial manager verifies the cost center definitions. 3 The financial manager generates the chargeback charges. 4 The financial manager generates the preliminary reports.

These reports are sent to the business manager to review.
5 The business manager analyzes the reports and determines if any

adjustments to the charge back charges are needed.
6 If an adjustment is needed, the financial manager makes the adjustment, then

returns to step 3.

30 Chapter 3—Asset Management

White Paper

7 If no adjustments are required, the financial manager generates the final

reports.
8 The financial manager then closes the chargeback period.

After the chargeback period is closed, the chargeback records are locked.

Cost management—cost capture
In this process, IT support captures costs based on reports from the incident management, problem management, change management, and configuration management processes.
Figure 3-D: Cost management—cost capture
IT support

Capture costs

Service support, service delivery, and other related processes

System

Business managers

Financial manager

Incident Management

Problem Management

Change Management

Configuration Management

Details

31

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

Cost management—depreciation
The asset manager defines the terms of depreciation, which run automatically by the system.
Figure 3-E: Cost management—depreciation
Asset Manager
1. Define depreciation method and timeframe

Business managers

Financial manager

Until fully depreciated

System

2. Amitorize over time

Service support, service delivery, and other related processes

1 The asset manager determines which method of depreciation to use and the

timeframe over which to use it.
2 The asset is amortized over the specified timeframe.

The amortization continues regularly until the asset is fully depreciated.

32 Chapter 3—Asset Management

White Paper

Contract management
In this process, the asset manager oversees the purchase and renewal of contracts with providers, with approval by the business manager. This is an iterative process for each contract. The interval at which the process repeats depends on the length of the given contract.
Figure 3-F: Contract management

New contract

1. Negotiate terms with provider No

2. Business approval(*)

Yes

3. Purchase contract

4. Relate to appropriate CIs

Asset manager

Time passes (length of contract - X) Notify asset manager for expiration of contracts

Renew contract

1. Negotiate terms with provider

2. Business approval(*)

Yes

3. Purchase contract

4. Relate extension to original contract

No
Time passes (length of contract - X)

Business manager

(*) Approve contract

Service support, service delivery, and other related processes

CMDB

Contract management includes both processes for both new and renewed contracts.

New contract process
1 The asset manager negotiates the terms of the new contract with the

provider.
2 The asset manager seeks business approval from the business manager.

If the terms are not acceptable, the asset manager returns to step 1 to renegotiate the terms.

Details

33

BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

3 If the business manager approves the terms, the asset manager purchases the

contract from the provider.
4 The asset manager relates the contract to the appropriate CIs and makes sure

this is recorded in the CMDB. After the passage of time (equivalent to the length of the contract minus the period of time required to renegotiate), the asset manager is notified that a given contract is about to expire, which triggers the contract renewal process.

Contract renewal process
The contract renewal process starts when the asset manager is notified of contracts about to expire.
1 The asset manager negotiates the terms of the contract renewal with the

provider.
2 The asset manager seeks business approval from the business manager.

If the terms are not acceptable, the asset manager returns to step 1 to renegotiate the terms.
3 If the business manager approves the terms, the asset manager purchases the

contract from the provider.
4 The asset manager relates the extended contract to the original contract.

After the passage of time (equivalent to the length of the contract minus the period of time required to renegotiate) the asset manager is notified that a given contract is about to expire, and the process returns to step 1.

34 Chapter 3—Asset Management

White Paper

Software license management—license compliance
In this process, the asset manager manages software license compliance.
Figure 3-G: Software license management—license compliance

Similar Documents

Premium Essay

Benchmarking: a Permanent Process for Excellence

...Benchmarking: A permanent Process for Excellence Benchmarking is a process in which organizations evaluate various aspects of their processes in relation to best practices, usually within their own sector. It is also a process of identifying other organizations that are best at some facet of our operations and then modeling our organization after them (Operations Management, 9/e, Jay Heizer & Barry Render). It selects a demonstrated standard of performance that represents the very best performance for a process or activity. Benchmarking is `the continuous process of measuring products, services and practices against the toughest competitors or those companies recognized as industry leaders, (that is) ... the search for industry best practices that will lead to superior performance (Camp, 1989, 10). According to these definitions benchmarking helps organizations increase their performance. They compare and measure their policies, practices, philosophies, and performance measures against those of high-performing organizations. Benchmarking could be a onetime event but rather a continuous process in which organizations continually seek to challenge their practices. It is a continuous, systematic process of measuring products, services and practices against organizations regarded to be superior with the aim of rectifying any performance ``gaps’’ because of the existence of strong dynamics in the current business world. The aim of benchmarking is to identify competitive...

Words: 1146 - Pages: 5

Free Essay

Mentorship for Practice

...bandaging. Abstract Part of the role of the mentor is to “facilitate the selection of appropriate learning strategies to integrate learning from practice and academic experiences” (NMC SLAiP Standards 2008). Assessing and carrying out leg ulcer dressings is a vital part of working as a community nurse and this report describes how I as a mentor facilitated a student to assist with this activity and identifies some of the range of facilitative strategies to support learning in practice. It describes carrying out an activity, from preparation, implementation and evaluation of the activity, assisting my student to to evaluate her own learning, identify further learning needs and planning and management of how these learning needs can be met. Overall this report demonstrates how supervising a student in a learning situation, setting learning objectives and giving feedback are all part of the role of the mentorship. Background and introduction to the activity Student S is a year two semester two student nurse currently on her second week of a nine week community placement. At this stage she should be using evidence based practice and focusing on the service user. Student S has identified that wound care, rationale behind different dressings and types of bandaging is an area where she needs to gain more knowledge. Further practice in the practical aspects of using aseptic non touch technique and physically applying bandages was also identified as a learning need. Prior to going...

Words: 1348 - Pages: 6

Premium Essay

Coloplast Case

...antifungal cremes cleansers and moisturizers. For 42 years, all Coloplast operations were contained within Denmark, however 97% of its revenue was generated by exporting its products beyond its national borders. In 1999 the company changed its philosophy and began to investigate off shoring its production facilities. In 2001 the first Coloplast production facility opened its doors outside of Denmark. The expansion took place in Tatabanya Hungary. This location was chosen because of cheaper labour and land rates, as well as a more favourable tax rate. The city is located in the Western region of the country which provided better infrastructure. Coloplast had no blueprint to navigate through the expansion process, and had to learn and develop best practises by trial and error. By 2004 the management team in Tatabanya had advanced the production system to the point where it was outperforming the longer established Danish facilities. In 2005 Coloplast revealed an aggressive plan of Strategy 2008. In this plan the company states it will strive to achieve a profit margin of 18% while maintaining 10% organic growth. A key pillar of this plan is the continued relocation of volume production to Hungary and further expansion to China. Coloplast is at crossroads, it needs to decide if it has learned enough from its first international expansion that it can duplicate and improve its success in new locations, or if it should delay new locations and focus on fine tuning its operations...

Words: 1569 - Pages: 7

Premium Essay

Owner

...when accessing the network remotely? 3. What risks, threats, and vulnerabilities are introduced by implementing a Remote Access Server? 4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service? 5. What is a Remediation LAN? 6. Explain the concept of a Remediation Server and traffic separation as it relates to remote access. 7. What is a VPN? Distinguish between VPN server, VPN client, VPN router, and SSL VPNS. 8. What is the difference between a tunnel-mode VPN and a split-tunneling VPN? 9. According to the Remote Access Policy STIG are personally owned devices considered acceptable to perform privileged (administrative) tasks on a DoD network? 10. When connected to a public network or shared public Internet access point, what are some precautions that remote users should take to ensure confidentiality of communications? 11. What are the three types of remote access users as defined by the DoD in the Secure Remote Computing STIG v2r5? 12. What are the additional elements required of a network architecture if the enclave is to support remote access through the public Internet? 13. Name three security best practices for mobile workers as defined in the Secure Remote Computing STIG. 14. True or False. A Thin Client is a pc or laptop without a hard drive or storage space. ...

Words: 278 - Pages: 2

Premium Essay

Lyttasker

...Simulation MBA Capstone Tasks: Best Practices If you are in the MBA Capstone course, you can see the light at the end of the tunnel. These best practices are designed to help make the stretch of your educational journey as smooth as possible. A mindset of excellence Your MBA Capstone tasks should reflect your highest quality work; your current state of excellence. The standards are high for the capstone tasks. Doing just enough to get by or good enough will result in re-work and re-submissions. The best practice is to strive for excellence. Read for understanding Read the course of study, task instructions, and task rubrics. Seek clarification on any points that might be subject to multiple interpretations. Do not assume; know. The best practice is to be prepared by reading for understanding. Capsim Simulation The designation of MBA indicates the ability to lead and manage both vertically and horizontally across an organization. It is the ability to maximize organizational success by understanding the organization as a system of integrated and interdependent parts. Successful completion of assessments in your MBA courses signals that you know the theories and competencies; the simulation is an opportunity to demonstrate and apply your skills. The best practices are listed below. 1. Read the Team Member Guide; understand your role and the roles of other team members. 2. Complete the Capsim pre-work. 3. Understand the simulation is challenging, time intensive...

Words: 1293 - Pages: 6

Premium Essay

Performance Based Services

...------------------------------------------------- Performance based services CON 280 CON 280 Defining Performance Based Services The Federal Acquisition Regulation defines performance-based acquisition as “the means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed.” (FAR 2.1) Specifically performance-based services involve strategies, approaches and various techniques that assist with defining a service requirement based on performance objectives. There are specific characteristics that must exist in order for a requirement to be considered a performance-based acquisition and each characteristic influences and shapes the others. One of the most important characteristics necessary for a performance-based service acquisition is the performance work statement. The performance work statement, commonly known to acquisition professionals as the PWS is defined as the following: a statement of work for performance-based acquisitions that describes the required results in clear, specific and objective terms with measurable outcomes.” The performance work statement is the backbone of a performance-based service contract because it is responsible for specifying the definitive expectations of work that is necessary for the successful performance of a contract. As a contracting officer I am just as accountable as my customers to ensure that the performance work statement describes...

Words: 819 - Pages: 4

Premium Essay

Best Practice Manual for Supervisors

...Best Practice Manual for Supervisors MGT/210 8/18/2011 Lisa Newman The purpose of a best practice manual for supervisors is to provide a reference guideline for new supervisors. As a reference, this manual could serve as a training aid for supervisors and a management resource for performance evaluations of employees. The manual contains an overview of the best practices to use for the following supervisory responsibilities: • Demonstrating communication skills. • Determining effective orientation and training methods. • Improving productivity for teams. • Conducting performance appraisals. • Resolving Conflicts. • Improving employee relations The approaches described in this manual will assist supervisors in providing the best and most effective solutions to any problems the employees or supervisors might face. This guideline will ensure that supervisors are aware of the objectives and standards to follow to help improve employee’s production. Demonstrating communication skills is one of the most important skills a supervisor can have. Supervisors should be able to direct, motivate, and persuade their colleagues in order to maintain an acceptable working relationship that will encourage positive results. A large part of all three of these skills is the ability to listen and absorb the ideas of others (Rue & Byars, 2004). Active listening skills help supervisors absorb their employees concerns. The key to being an active listener is...

Words: 2317 - Pages: 10

Premium Essay

Cemex

...Upon Research, the following are found to be the competitive advantage if CEMEX. * Continued innovation * High level of commitment to customer service and satisfaction * Proven post-merger integration expertise (PMI) * Efficient production, distribution and delivery processes through information system * Ability to identify opportunities in developing countries CEMEX is one of the world's largest building materials suppliers and cement producers. Founded in Mexico in 1906. They supply cement to CEMEX has operations extending throughout the world, with production facilities spanning 50 countries in North America, the Caribbean, South America, Europe, Asia, and Africa. CEMEX’s holds and controls the number 1 rank market shares in almost all countries they are in. this ensures them profit from their customers which are global construction firms or even individuals building their home. CEMEX is the has the largest market share. CEMEX has already established itself as a well known and reliable brand in terms of their product that why their product is heavily preferred by their customers whether firms or individual. CEMEX also acquires companies to extend its market coverage all over the world and it is successful because of its post merger integration and their CEMEX way. CEMEX standardized business processes, technology, and organizational structure across all countries while simultaneously granting countries certain operational flexibility. Opportunity...

Words: 1273 - Pages: 6

Premium Essay

Innovation in Entrepreneurial Organizatons

...Innovation in Entrepreneurial Organizations The nature of entrepreneurial organizations is that they have the capabilities and competencies to create a culture of embedded behaviors that support the constant focus on identifying and subsequently taking advantage of profitable opportunities. In other words, they exist to find and take advantage of opportunities that have the highest potential return. Bateman (2010) states that, “…an entrepreneurial venture has growth and high profitability as primary objectives. Entrepreneurs manage aggressively and develop innovative strategies, practices, and products” (p. 238). Entrepreneurial organizations do this by being willing to try new things, challenge the status quo, and test out new processes. They encourage creativity, risk taking, and continuous learning and improvement. However creativity must then be harnessed and developed by innovation and it takes innovation to turn great ideas into something of value. Thus innovation should be considered fundamental to an entrepreneurial organization’s success. What then is innovation? Bruton (2012) says it well when he concludes that innovation is, “…a process of intentional change made to create value by meeting opportunity and seeking advantage.” (Innovation, para. 1). And although product innovation is a very important aspect of their business, it is only one area that entrepreneurs are interested and excited about. Rasmussen (2013) explains, “The very nature of innovation is changing...

Words: 1476 - Pages: 6

Premium Essay

Problems and Best Practices in Retention

...Assignment #1 Problems and Best Practices in Retention Question 1 What three problems might an organization have with the issue of employee retention? Explain why they could be a problem. There are many reasons an organization may have with the issue of employee retention such as; money, mergers, health benefits, family reasons, etc. The three problems I believe are money, health benefits and work overload caused by a merger. Higher salary is the number one reason why employee looks for change. When employee feels they are not being paid adequately and the differential in pay between new and longer term employees, they are more likely to leave. For instance, an organization average annual pay increase is approx. 4% however employees perceive that the newcomers are paid better. The second problem might an organization have with the issue of employee retention is the benefit programs. Employees feel that they pay too much for health insurance, especially prescription drug programs. An Organization offers their employees the opportunity to choose a benefit package that is best for their family. The employee has an option to choose from high premium low out-of-pocket cost or low premium high out-of pocket cost benefit package. Whichever one an employee decides to choose, their health insurance still cost too much. The third problem would be work overload caused by a merger. Departments being understaffed and the employees feel as if their workloads are too heavy...

Words: 1133 - Pages: 5

Free Essay

Compliance in Garments Factory

...“Analyzing the Compliance practice of With respect to Worldwide Responsible Accredited Production (WRAP)” A Study On Clifton Textile & Apparels Ltd, Baizid Bostami, Chittagong. (THIS INTERNSHIP REPORT IS SUBMITTED FOR THE PARTIAL FULFILLMENT OF THE DEGREE OF BACHELOR OF BUSINESS ADMINISTRATION WITH A MAJOR IN HRM) Prepared By: Abdullah Al Mamun Matric No: R101195 Program : MBA Semester : Autumn 2011 Internship Duration: 1st September, 2011 to 1st December, 2011 Submission Date: 11th June, 2011 Department of Business Administration Faculty of Business Studies International Islamic University Chittagong “Analyzing the Compliance practice of With respect to Worldwide Responsible Accredited Production (WRAP)” A Study On Clifton Textile & Apparels Ltd, Baizid Bostami, Chittagong. (THIS INTERNSHIP REPORT IS SUBMITTED FOR THE PARTIAL FULFILLMENT OF THE DEGREE OF BACHELOR OF BUSINESS ADMINISTRATION WITH A MAJOR IN HRM) Prepared By: Abdullah Al Mamun Matric No: R101195 Program : MBA Semester : Autumn 2011 Supervised By: Mr. Abdullah Ahsan Mamun Lecturer, DBA, IIUC Internship Duration: 1st September, 2011 to 1st December, 2011 Submission Date: 11th June, 2011 ____________________ Signature of Supervisor Department of Business Administration ...

Words: 18243 - Pages: 73

Premium Essay

What's the Matter with Walmart

...Walmart’s stock has been the poorest performer on the big board since the DJI reached its nadir some 3 years ago. The alarming answer is that Walmart’s traditional everyday low price (“EDLP”) positioning is less competitive in the very economic environment in which it seemed designed to prosper. Consumers are more stressed than ever, but now instead of blindly accepting that Walmart has the lowest prices …always… these struggling digitally enabled cybershoppers are surfing the net comparing Walmart’s prices with their competitors. And there are LOTS of competitors, ultra low priced Dollar Stores and hi-lo food retailers, category killers such as Best Buy and Home Depot. Let me give one simple personal example. Yesterday my wife came home from Publix with two huge boxes of Cheerios, which she bought on special for $5. On its best day, Walmart could not match this price or that of dozens of promo items at numerous retailers including Publix, not exactly recognized as the low price leader in Florida. When the issue is item price and consumers are armed with a price comparison capability, the balance of power tilts away from the EDLP retailer. To its credit Walmart’s management has long foreseen the weakness of EDLP as a consumer positioning. They have clung to it because Mr. Sam himself mandated it and it worked for...

Words: 2373 - Pages: 10

Premium Essay

Customer Satisfaction

...Customer Satisfaction: Best Practices Customer Satisfaction is the most prominent factor in the success of a company. It is what puts the wheels in motion for a company to establish a strong foundation while simultaneously fulfilling it’s overall purpose to offer the goods and services that it is designed to provide. Consequently; in order to maintain that status and to provide valued goods or services to those customers in which any company is marketing to, it has to understand the customers needs and more specifically what provides the customer with complete satisfaction. Understanding the customer’s needs and what they require in order to be satisfied, opens up doors and provides the company with the opportunity to generate financial growth, repeat business, and a competitive advantage. In doing so, research has indicated that the best practices to measuring customer satisfaction; is to assess the goals that a company expects to deliver and identify the targeted customer, like: the existing, former, potential, or internal customers. Once a company identifies what their targeted goal is and who the targeted audience may be it is imperative that they then seek input from the customer by asking the customer for feedback. The Voice of the Customer (VOC), (Evans & Lindsay, 2011) is the “customer requirements, as expressed in the customer’s own terms (p. 201).” To develop a clear understanding of what a customer requires in their own terms, companies have been using...

Words: 557 - Pages: 3

Premium Essay

Pm Best Practices

...Project Management Best Practices In the project management world, the development and utilization of best practices is the key to success for projects of all shapes and sizes that yield the highest quality result. Finding the perfect balance between the organization, observing, and governing of projects help organizations reach the goals and objectives set by shareholders and executives. Best practices can be determined by finding simply what works best. Organizations can determine this a couple of ways. One way is to benchmark, or compare practices used by other organizations that are similar to yours. (Veatch, 2011) If a company in your industry is striving, using philosophies or techniques that are commonplace to them should become familiar to your organization. Another way is to use techniques such as postmortem meetings after the closure of projects to determine what worked and what did not. Listening to your resources and determining what was helpful in reaching the goals outlined in the project, or finding out what was an interference can outline practices that will spell success for future projects. Having postmortem meetings itself can be a best practice. It’s always a smart business decision to continue to find ways to improve. David Herron and David Garmus from the Davis Consulting Group, outlined that analysis of quantitative data collected, such as size, effort, duration, and defects along with qualitative data, such as process, methods, skills...

Words: 520 - Pages: 3

Premium Essay

Business Letter

...across a worldwide range of ICT, Business, Social and Public Organizations. As well, for high quality of MBA program practical knowledge is very much helpful for the students. So a short trip for few of our students can help to learn them how bookish knowledge actually works practically. As a successful company Syngenta earn huge reputation in corporate world. We already heard about the story of your successful management in factory. Your company make very good practice of CSR. You have a very good environment of factory product line and production plant. We believe if we want to produce potential future business leader or entrepreneur this type of practice from your organization will be an example for all. We select 12 students from different department of MBA program with two senior faculty as a research team to visit a factory for their better knowledge. Syngenta can be the best for this purpose. If you allow the team to visit your factory at 17th April, 2015 for half a day, they will get to see industry best practices. The team will be reached at 10 am on the notified date and back at 2 pm by own transportation. We like to form a harmonious relationship with your organization and we look forward to your positive response in the interest of our MBA students. If you need further information, please feel free to contact us at +88 01914001470, also can contact through e-mail: mba@uiu.ac.bd. Thanking...

Words: 325 - Pages: 2