Mof SMF Overview
Mof SMF Overview
Management Function
Library
Overview
Microsoft
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of
publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part
of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS
TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this
document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in
this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not
give you any license to these patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and
events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address,
logo, person, place or event is intended or should be inferred.
Overview
Table of Contents
Overview..................................................................................................... 1
Introduction ............................................................................................. 2
Document Purpose ............................................................................... 2
Intended Audience................................................................................ 2
How to Use This Guide........................................................................ 3
Background .......................................................................................... 3
Microsoft Frameworks...................................................................... 3
Microsoft Operations Framework Overview........................................... 6
MOF Core Concepts............................................................................. 6
MOF Core Models ............................................................................... 7
The MOF Process Model .................................................................. 7
The MOF Team Model ................................................................... 10
The MOF Risk Model..................................................................... 13
MOF Process Model Quadrants and Service Management Functions ..... 15
Introduction ........................................................................................... 16
Changing Quadrant................................................................................ 17
Change Management.......................................................................... 17
Configuration Management................................................................ 18
Release Management.......................................................................... 18
Operating Quadrant ............................................................................... 19
System Administration....................................................................... 19
Security Administration ..................................................................... 19
Directory Services Administration..................................................... 20
Network Administration..................................................................... 20
Service Monitoring and Control......................................................... 20
Storage Management.......................................................................... 20
Print and Output Management ........................................................... 21
Job Scheduling ................................................................................... 21
Supporting Quadrant.............................................................................. 22
Service Desk....................................................................................... 22
Incident Management......................................................................... 22
Problem Management ........................................................................ 23
Optimizing Quadrant ............................................................................. 24
Service Level Management................................................................ 24
Financial Management ....................................................................... 24
Capacity Management........................................................................ 25
Availability Management................................................................... 25
Service Continuity Management........................................................ 25
Workforce Management..................................................................... 25
Next Steps.............................................................................................. 27
Appendixes ............................................................................................ 28
Appendix A: Glossary ........................................................................... 29
Appendix B: Acronyms ......................................................................... 97
Appendix C: Suggested Training and Reading ................................... 102
Courses.......................................................................................... 102
Books ............................................................................................ 102
Web Sites ...................................................................................... 102
Chapter 1
Overview
Introduction
Document Purpose
The intent of this document is to introduce service
management functions (SMFs) and provide background
information about their purpose and origin. SMFs
provide operational guidance for Microsoft technologies
employed in computing environments for information
technology applications. SMFs are a core part of
Microsoft Operations Framework (MOF), which
provides guidance through courses, services, guides,
and other media that enable organizations to achieve
mission-critical system reliability, availability,
supportability, and manageability of IT solutions.
The content of this document, and the SMF documents
for which it serves as an introduction, draws from best
practice guidelines documented in the Information
Technology Infrastructure Library (ITIL) from the
Central Computer and Telecommunications Agency
(CCTA) and from years of information technology (IT)
operations experience by Accenture, Avanade Inc., Fox
IT, Hewlett-Packard Company, Lucent
Technologies/NetworkCare Professional Services,
Microsoft Consulting Services (MCS), and Microsoft
Information Technology Group (ITG). In 2000, the CCTA
was incorporated into the Office of Government
Commerce (OGC); it will be referenced as OGC in this
document.
Intended Audience
This material is valuable to both internal staff and
consultants. It is aimed primarily at two main groups: IT
operations managers and IT professionals, as well as
support staff (including analysts and service desk
specialists) working in or supporting the operations of a
production IT environment.
It is assumed that readers are fully conversant with
Microsoft Operations Framework process, team, and risk
models. These concepts are briefly reviewed in this
document, but are described in greater depth in a series
of technical papers. These documents, describing the
various MOF models, may be found at
http://www.microsoft.com/mof.
Overview
Introduction
Executive summary
Contributors
Background
The OGC developed ITIL as a comprehensive and
coherent code of practice to help organizations provide
efficient and cost-effective IT services. The OGC is a
United Kingdom government executive agency
responsible for developing best practices advice and
guidance on the use of information technology in service
management and operations. To accomplish this, the
OGC charters projects with leading IT companies
around the world to document and validate best
practices in the disciplines of IT service management.
Microsoft Frameworks
Microsoft Frameworks are bodies of knowledge
pertaining to the development, deployment, and
operation of software and infrastructure solutions. The
frameworks provide technical guidance built on proven
practices for people, processes, and technology based on
the IT life cycle. Frameworks content is distributed
through a variety of mechanisms, including technical
papers, courseware, and service offerings, generally
associated with Microsoft Solution Offerings. A vital
part of the frameworks strategy is to address the
dynamic, ever-changing nature of today's distributed IT
environments. Microsoft Consulting Services, Product
Support Services, and Microsoft partners deliver
Overview
Overview
Changing
Operating
Supporting
Optimizing
Overview
Operations review
Figure 1.
Relationship of MOF process model, quadrants, and SMFs
10
Overview
11
12
Figure 2.
The MOF team model
Team Role
Release
Infrastructure
Support
Operations
Security
Partner
Overview
13
Figure 3.
The MOF risk management process
14
Overview
15
Chapter 2
MOF Process Model Quadrants
and Service Management
Functions
16
Introduction
As shown in Figure 2 in the previous chapter, each of the
quadrants in the MOF process model is associated with
several SMFs, which in turn apply directly to the IT
activities performed within the quadrant. This section
provides an abstract of each of the SMFs within the
context of its container quadrant.
Overview
17
Changing Quadrant
The changing quadrant includes the processes and
procedures required to identify, review, approve, and
incorporate change into a managed IT environment.
Change includes hardware and software assets as well
as specific process and procedural changes.
The objective of the change process is to introduce new
technologies, systems, applications, hardware, tools, and
processes, as well as changes in roles and
responsibilities, into the IT environment quickly and
with minimal disruption to service.
SMFs within the changing quadrant include:
Change management
Configuration management
Release management
Change Management
Since most IT systems are heavily interrelated, any
changes made in one part of a system may have
profound impacts on another. The change management
SMF is responsible for managing changes to ensure that
all parties affected by a given change are aware of and
understand the impact of the impending change. It is
also responsible for minimizing or mitigating
disruptions or adverse effects due to change. Change
management should be applied to any asset in the
environment that is necessary for meeting the service
level requirements of the solution. The change
management SMF utilizes such processes, artifacts, and
authorities as change controls, requests for changes, and
the change advisory board.
18
Configuration Management
The configuration management SMF is responsible for
identifying, recording, tracking, and reporting of key IT
components or assets called configuration items (CIs).
The information captured and tracked depends on the
specific CI, but often includes a description of the CI, the
version, constituent components, relationships to other
CIs, location/assignment, and current status.
Configuration items typically correspond to each of the
assets placed under the control of the change
management SMF. CIs are typically recorded in a
configuration management database (CMDB). The
configuration management SMF is concerned with
establishing, maintaining, and managing the CIs and
CMDB.
Release Management
Release management facilitates the introduction of
software and hardware releases into managed IT
environments. This SMF is the coordination point
between the release development/project team and the
operations groups responsible for deploying the release
into production. Release management coordinates with
the change and configuration management processes to
ensure that the shared CMDB is kept up-to-date with
changes implemented by new releases and that the
software content of those releases is stored in the
Definitive Software Library (DSL). Release management
builds and manages release rollout plans and works
with development teams and the customer during
planning and development in order to facilitate a
smooth rollout.
Overview
19
Operating Quadrant
The operating quadrant includes the IT operating
standards, processes, and procedures that are applied
regularly to service solutions to achieve and maintain
service levels within predetermined parameters. The
goal of the operating quadrant is highly predictable
execution of day-to-day tasks, both manual and
automated. This is accomplished through the provision
of detailed, prescriptive operating guides and references
for each of the service solutions controlled by IT.
SMFs within the operating quadrant include:
System administration
Security administration
Network administration
Storage management
Job scheduling
System Administration
System administration is responsible for keeping the
enterprise systems running. System administration
oversees the entire distributed processing environment.
It coordinates the activities of the other SMFs within the
quadrant and ensures that the SMFs are performed
efficiently and effectively.
Security Administration
Security administration maintains a safe computing
environment, ensuring that all data within the system is
secure and complete. The SMF is responsible for the six
basic requirements that help ensure data confidentiality,
integrity, and availability. These six basic requirements
are: user identification, authentication, access control or
authorization, confidentiality, system integrity, and
nonrepudiation.
20
Network Administration
Network administration is the process of managing and
running all networks within an organization. Network
administration, a comprehensive discipline that must
manage people, processes, and the technologies with
which they interact, is responsible for the maintenance
of the physical components (such as servers, routers,
switches, and firewalls) that make up the organizations
network.
Storage Management
Storage management deals with on-site and off-site data
storage for the purposes of data restoration and
historical archiving. The storage management team must
ensure the physical security of backups and archives.
The goal of storage management is to define, track, and
maintain data and data resources in the production IT
environment through appropriate planning, policy
setting, and monitoring for the management of storage
assets.
Overview
21
Job Scheduling
Job scheduling involves the continuous organization of
jobs and processes into the most efficient sequence. The
intent of this function is to maximize system throughput
and utilization to meet service level agreement and user
requirements, and optimize the use of available capacity.
Job scheduling is closely tied to service monitoring and
control and to capacity management.
22
Supporting Quadrant
Processes and activities found within the supporting
quadrant are associated with resolving incidents, events,
and requests in accordance with performance criteria
contained in the service level agreement. The key
objective of this quadrant is the timely resolution of
incidents, problems, and inquiries for end users of the IT
services provided. SMFs within the supporting quadrant
utilize both reactive and proactive functions to manage
services in accordance with service level agreements.
The three service management functions that support
this MOF quadrant include:
Service desk
Incident management
Problem management
Service Desk
The service desk is the key service management function
of the supporting quadrant. It coordinates all activities
and customer communications about incidents,
problems, and inquiries related to production systems. It
is the single point of contact between service providers
and customers/users on a day-to-day basis. Requests
come to the service desk for help on solving issues and
problems across a vast array of applications,
communication systems, desktop configurations, and
facilities. The three primary areas within which the
service desk operates are incident management, self
help, and customer relationship management. In
particular, service desk interacts closely with incident
management in performing their respective functions
and procedures.
Incident Management
Incident management is the process of managing and
controlling faults and disruptions in the use or
implementation of IT services as reported by customers
or IT partners. The primary goal of incident
management is to restore normal service operation as
quickly as possible and minimize the adverse impact on
business operations, thus ensuring the maintenance of
the best possible quality and availability of levels of
service within the limits of the service level agreement.
Overview
23
Problem Management
Problem management seeks to ensure stability in service
solutions by identifying and removing errors in the IT
infrastructure. Problem management is responsible for
clearly defining the overall support model used,
escalation procedures, incident correlation, root cause
analysis, problem resolution, and reporting of incidents
and their resolution.
24
Optimizing Quadrant
The optimizing quadrant includes the service
management functions for managing (decreasing) costs
while maintaining or improving service levels. This
includes review of outages/incidents, examination of
cost structures, staff assessments, and availability and
performance analysis, as well as capacity forecasting.
The optimizing functions described are typically
performed in an iterative fashion over time: performing
modifications, noting performance and cost, and then
repeating the cycle.
The six service management functions contained within
the optimizing quadrant include:
Financial management
Capacity management
Availability management
Workforce management
Financial Management
Financial management ensures that any solution
proposed by a foundational SMF (service continuity,
availability, capacity, or workforce) meets the
requirements defined in service level management
(SLM) and is justified from a cost and budget
standpoint. This is often referred to as a cost-benefit
Overview
25
Capacity Management
Capacity management activities include planning,
sizing, and controlling service solution capacity to
satisfy user demand within the performance levels set
forth in the service level agreement. This requires the
collection of information about usage scenarios,
patterns, and peak load characteristics of the service
solution, as well as stated performance requirements.
These data collection activities are included in the
service management function.
Availability Management
The singular goal of availability management is to
ensure that the customer can use a given IT service at
any time. This requires heavy involvement through the
requirements and planning phases of the project in order
to carefully evaluate requests for change within the
production environment and to minimize adverse effects
on availability.
Workforce Management
Achieving the objectives described for each of the
service management functions requires an adequately
skilled and trained workforce. The workforce
management function implements best practices to
continuously assess key aspects of the IT workforce and
make appropriate investments and changes as
26
Overview
27
Next Steps
This document provided introductory level information
pertaining to the intent, organization, structure, and
interrelationships of the Microsoft Frameworks
(Microsoft Solutions Framework and Microsoft
Operations Framework) and the underlying core models
and principles of MOF.
Additional, detailed information on the frameworks
themselves is available through technical papers
available at the Microsoft public Web site, located at
http://www.microsoft.com/mof.
For practitioners who want to learn more about specific
service management functions, detailed guides have
been prepared for each. These SMF guides provide
prescriptive guidance for the processes and procedures
required to fulfill each of the service management
functions. In addition to this guidance, service offerings
and training are also available for selected SMFs. These
offerings are available through Microsoft Solutions for
Management, either in combination or as standalone
services or courseware.
Appendixes
28
Overview
29
Appendix A: Glossary
absorbed overhead
Overhead that, by means of absorption rates, is included
in costs of specific products or saleable services in a
given period of time. In turn, under- or over-absorbed
overhead is the difference between overhead cost
incurred and overhead cost absorbed; it may be split
into its two constituent parts for control purposes.
absorption costing
A principle whereby fixed, as well as variable, costs are
allotted to cost units and total overheads are absorbed
according to activity level. The term may be applied
where either production costs, or costs of all functions,
are so allotted.
abstentions
A member may abstain due to lack of impact of the
change in his or her area of responsibility.
accept
One of three key concepts in the Microsoft approach to
managing project trade-offs. It refers to accepting costs
and resources as a time-and-materials strategy. See also
optimize and constrain.
acceptance test
A release readiness test used to validate whether the
technical solution satisfies the usability and operability
requirements specified in the functional specification.
access control
The access and privileges granted to users so that they
can perform certain authorized functions on a system.
30
actions
An action can be a script, program, command,
application start, or any other remedial response that is
required. Typical actions include automated actions,
operator-initiated actions, or operator-driven actions.
Actions are generally defined to correct an event that
represents an incident within the IT infrastructure;
however, actions can also be used to perform daily tasks,
such as starting an application every day on the same
node.
advice
Advice is more commonly known as an alert. It is a
notification that an operational event requiring attention
may have occurred. An alert is generated when
monitoring tools and procedures detect that something
has happened, either at the service, service function, or
component level.
agent
(1) A common term used in the computer industry to
describe an executable software component that is
capable of performing some type of action(s) on behalf
of one or more users. In the system and network
management domain, agents typically can be configured
for specific thresholds and used to monitor specific
thresholds of interest to an administratorfor example,
error thresholds, performance thresholds, and capacity
thresholds.
(2) A service that runs on every computer you want to
monitor. An agent captures information from the
computer on which it is running. An agent applies
predefined processing rules to the captured data and
performs actions as defined by the processing rules.
alarm
An alarm is a system notification that an event that has
been defined as being of interest has occurred.
alert
An indication that a significant event, such as the breach
of a threshold, has occurred. Alerts are defined by
processing rules.
alert forwarding
A feature that sends alerts from one configuration group
to another. Features allow for the creation of an efficient
Overview
31
alert rule
A processing rule that specifies one response for a
number of previously defined alerts.
alert severity
A property of an alert indicating its seriousness.
Examples include Service Unavailable, Security Breach,
Critical Error, Error, Warning, Information, and Success.
allocated cost
A cost that can be directly identified with a business
unit.
analyze
Measure the exposure.
application
The application is the top-most layer of the IT stack. The
application is the piece of IT that most users see. In order
to provide a service, such as accounting, the users make
use of an application, such as SAP Financials.
apportioned cost
A cost that is shared by a number of business units (an
indirect cost). This cost must be shared equitably
between these units.
approval logic
Pre-defined guidelines for the CAB vote to approve or
reject the RFC within the change authorization process.
32
asset
(1) A component that is managed by the organization
from the perspective of its balance sheet value.
(2) A component of a business process. Assets can
include people, accommodation, computer systems,
networks, paper records, fax machines, and so on.
attribute
A computer characteristic typically defined by a registry
key or value.
authentication
The method by which users prove to the system that
they are who they claim to be. Authentication is used in
passwords, smart cards, biometrics, and so forth.
authoritative restore
An authoritative restore causes the restored domain
controllers replicated data to be authoritative in relation
to its replication partners. Such a restore is unusual, but
when used, it has the effect of rolling back the entire
network to the point in time of the backup. This action
may be used to restore erroneously deleted information
of a replicated set of data.
authorization
A process that verifies that the user has the correct rights
or permissions to access a resource in a domain.
automated actions
Message-linked, pre-configured responses to eventgenerated incidents. Automated actions do not require
any operator intervention and usually start as soon as a
message is received. An operator can manually restart or
stop automated actions if and when necessary.
availability
The ability of a component or service to perform its
required function at a stated instant or over a stated
period of time. It is usually expressed as the availability
ratio, that is, the proportion of time that the service is
actually available for use by the customers within the
agreed service hours.
Overview
33
availability management
(Noun) A MOF service management function in the
optimizing quadrant. It employs the process of
describing, managing, directing, and proactively
maintaining the availability of information and services
at a reasonable cost and in accordance with agreed-upon
service delivery levels.
(Verb) Ensuring that current and future service
provision meets the business requirements/expectations,
is seen as cost-effective/value adding, and can be
recovered in the event of a service interruption.
availability plan
A plan that is compiled and/or refined within the
availability management process. The availability plan
sets out what availability is necessary in the long term.
The plan contains a number of set scenarios with respect
to future availability requirements.
backup
This term is most commonly used to refer to a copy of all
the files on a computers disks that is made periodically
and kept on magnetic tape or another removable
medium (also called a dump).
bandwidth
In analog communications, the difference between the
highest and lowest frequencies in a given range. For
example, an analog telephone line accommodates a
bandwidth of 3,000 hertz (Hz), the difference between
the lowest (300 Hz) and highest (3,300 Hz) frequencies it
can carry. In digital communications, bandwidth is
expressed in bits per second (bps).
baseline
A frozen picture of the IT environment at a set point
in time that identifies the structure of the IT
environment and the underlying dependencies of the
components of that environment.
batch system
A system that takes a set of commands or jobs, executes
them, and returns the results, all without human
34
best practices
An optimal set of procedures and functional principles
that, when followed, produce superior system reliability,
availability, supportability, and manageability, resulting
in effective IT service management.
boundaries of responsibility
The scope of the IT environment within which the
configuration management function is responsible to
track and control IT components established as
configuration items. Boundaries are established during
the setup process and are usually delineated either
geographically or organizationally.
breakdown
An incidental, short-term interruption of automated
information services.
bug
See error
business consequence
In the MOF risk model, a description of the way in
which the operational consequence would affect the
business as a whole.
Overview
35
business function
A business unit within an organizationfor example, a
department, division, or branch.
business impact
Measure of the business criticality of an incident or
problem. Often equal to the extent to which an incident
leads to distortion of agreed-upon or expected service
levels.
business process
A group of business activities undertaken by an
organization in pursuit of a common goal. Typical
business processes include receiving orders, marketing
services, selling products, delivering services,
distributing products, invoicing for services, and
accounting for money received. A business process
usually depends on several business functions for
supportfor example, IT, personnel, and
accommodation. A business process rarely operates in
isolation, that is, other business processes will depend
on it and it in turn will depend on other processes.
business unit
A segment of the business entity through which
revenues are received and expenditures are caused or
controlled. These revenues and expenditure are used to
evaluate segmental performance.
CAB
See change advisory board.
CAB/EC
See change advisory board emergency committee.
call
The initial contact between an IT customer and the
service desk before any details are recorded.
capacity management
(Noun) A MOF service management function in the
optimizing quadrant. The process of describing,
managing, directing, and proactively maintaining the
capacity of information and supplied services in
accordance with agreed-upon quality performance
levels and processing capacity at reasonable cost.
(Verb) Ensuring that current and future business
requirements for IT services are considered, planned,
and implemented in a timely fashion. It also ensures that
36
capacity planning
The process of forecasting system and environment
utilization and workloads and then developing plans to
ensure that the system and environment will be able to
support anticipated performance demands.
capital costs
Typically, those costs that apply to the physical
(substantial) assets of the organization. Traditionally,
capital costs involved the accommodation and
machinery necessary to produce the enterprises
product. Capital costs are the purchase or major
enhancement of fixed assetsfor example, computer
equipment (building and plant) and are often also
referred to as one-off costs.
capitalization
The process of identifying major expenditure as
capitalwhether there is a substantial asset or notto
reduce the impact on the current financial year of such
expenditure. The most common item to which
capitalization is applied is software, whether developed
in house or purchased from a third party.
category
A classification used to group incidents of a similar
nature.
change
(Noun) Any new IT component deliberately introduced
to the IT environment that may impact an IT service
level or that otherwise affect the functioning of the
environment or one of its components.
Overview
37
change authority
A group that is given the authority to approve change,
by a project board, for example. Sometimes referred to
as the configuration board.
change authorization
An approval process driven by the change manager that
gives the IT organization structure and control over
which changes are deployed.
change category
The measurement of a changes deployment impact on
IT and the business. The change complexity and
resources required, including people, money, and time,
are measured to determine the category. The risk of the
deployment, including potential service downtime, is
also a factor.
change classification
The assigning of a priority and a category to the change,
using its urgency and its impact on the users and
infrastructure as criteria. It provides a way to align the
business impact of a change with its deployment speed
and mechanism. The four change classifications are:
major, significant, minor, and standard.
38
change control
The procedure that ensures that all changes are
controlled, including the submission, analysis, decision
making, approval, implementation, and postimplementation of the change.
change development
The planning and development of a change. The process
can vary immensely in scope and includes reviews at
key interim milestones.
change history
Auditable information records that describe what was
done, when it was done, by whom, and why.
change initiator
A person who initiates a request for change.
change log
A log of requests for change raised during a project. The
change log contains information on each change, its
evaluation, what decisions have been made, and its
current status, including raised, reviewed, approved,
implemented, or closed.
change management
(Noun) A MOF service management function in the
changing quadrant. It employs the practice of
administering changes with the help of tested methods
and techniques in order to avoid new errors and
minimize any impact on the agreed-upon IT service
levels in accordance with service level agreements.
(Verb) Making changes to the infrastructure, or any
aspect of services, in a controlled manner. Change
management enables approved changes with minimum
disruption.
change manager
The role that has overall management responsibility for
the change management process in the IT organization.
Overview
39
change owner
The role that is responsible for planning and
implementing a change in the IT environment. The
change owner role is assigned to an individual for a
particular change by the change manager and assumes
responsibilities upon receiving an approved RFC. The
change owner is required to follow the approved change
schedule.
change priority
A change classification that determines the speed with
which a requested change is to be approved and
deployed. The urgency of the need for the solution and
the business risk of not implementing the change are the
main criteria used to determine the priority. Four typical
priority levels are: emergency, high, medium, and low.
change record
A record containing details of which configuration items
are affected by an authorized change (planned or
implemented) and how.
change release
The deployment of a change into the IT production
environment by release management.
change request
The formal initiation of a change through the submission
of a request for change.
change review
A change management process activity that refers to a
post-deployment evaluation of whether the change is
achieving the goals that were established for it.
changing quadrant
The first quadrant in the MOF process cycle where a
new release is prepared and then released into
production. The changing quadrant starts with a release
approved review, to determine if the release is ready for
implementation in the target environment, and
culminates in the release readiness review, in which the
release is assessed for effective implementation.
Examples of changing quadrant activities include:
40
charging
The process of establishing charges in respect to
business units and raising the relevant invoices for
recovery from customers.
CI
See configuration item.
classification
(1) The grouping of items by classes or categories.
(2) An expression of the value of items by placing them
in a certain order on the basis of category, impact, and
urgency. Also, the process of formally grouping
configuration items by type (for example, software,
hardware, documentation, environment, application).
Classification can be used to support decisions based on
priorities.
(3) The process of formally identifying incidents,
problems, and known errors by origin, symptoms, and
cause.
client
A computer system or process that requests a service
from another computer system or process (a server),
using some kind of protocol, and accepting the servers
responses. For example, a workstation that requests the
contents of a file from a file server is a client of the file
server.
A client is part of client/server software architecture.
Overview
41
client/server
The combination of software, hardware, and network
components in which one or more clients (computers)
request services from one or more servers (computers)
and through which the computer network functions for
the user as one computer.
closure
The process of confirming customer satisfaction and
then formally closing an incident record or problem
record.
closure category
A classification used to group incidents or problems at
closure, depending on their root cause.
cluster
A collection of nodes that appears to be a single-server
system, allowing for greater application availability and
scalability than would be possible with a single system.
CMDB
See configuration management database.
component
An individual part of the product, including the agent,
consolidator, Data Access Server (DAS), or database.
computer group
Collection of computers with some attribute in common.
Computer groups are defined by computer grouping
rules for similar event management.
computer view
A window that displays specified computers in the
configuration group.
confidentiality
A component of encryption. Confidentiality mechanisms
ensure that only authorized people can see data stored
on or traveling across the network.
42
configuration baseline
A configuration of a product or system established at a
specific point in time, which captures both the structure
and details of that product or system and enables that
product or system to be rebuilt at a later date.
configuration control
Activities that control changes to configuration items.
They include evaluation, coordination, approval, or
rejection of changes.
configuration group
A group of computers containing the following
Microsoft Operations Manager 2000 components: one
database, one or more Data Access Servers, one or more
consolidators, and one or more agents.
configuration management
(Noun) A MOF service management function in the
changing quadrant. It employs the process of identifying
and defining configuration items in a system, recording
and reporting the status of configuration items and
requests for change, and verifying the completeness and
correctness of configuration items.
(Verb) Identifying and defining configuration items in a
system, recording and reporting the status of
configuration items and requests for change, and
verifying the completeness and correctness of
configuration items.
Overview
43
configuration manager
The role that is responsible for managing the activities of
the configuration management process for the IT
organization. The role also selects, assigns
responsibilities to, and trains the configuration
management staff.
consolidation rule
A processing rule for grouping multiple events from a
computer into a single summary event.
contingency plan
A product of the service continuity management
process. It is a plan for an alternative system or manner
of conducting business during an IT crisis.
continuity
The uninterrupted consistency and persistence of
processes and the certainty that the processes will
continue in operation. See also service continuity
management.
control
The act of reacting to and implementing the plan.
corrective action
See resolution action.
cost
The amount of expenditure (actual or notional) incurred
on, or attributable to, a specific activity or business unit.
cost effectiveness
The act of ensuring that there is a proper balance
between the quality of a service and the resources
expended on it. Any investment that increases the costs
of providing IT services should always result in
enhancement to service quality or quantity.
44
costing
The process of identifying the costs of the business and
breaking them down and relating them to the various
activities of the organization.
cost management
All the procedures, tasks, and deliverables that are
needed to fulfill an organizations costing and charging
requirements.
cost unit
In the context of CSBC, the cost unit is a functional cost
unit that establishes standard cost per workload element
of activity, based on calculated activity ratios converted
to cost ratios.
countermeasure
A technological or procedural response to address a
single point of failure or other threat to the availability
of an IT service. Two examples of countermeasures are
the use of redundant power supplies and the
implementation of a proven database backup procedure.
current values
A current value is defined as the real time value of an
item of data that is deemed to be of sufficient criticality
to be permanently monitored. Current values are used
to ensure that service is maintained or recovered
quickly.
customer
The recipient of a service.
data availability
In security terms, the ability of authorized users to
access the data they need when they need it.
data backup
The process of periodically moving data from one type
of medium (typically hard disk) to a secondary storage
medium for potential retrieval at a later date.
Overview
45
database
A central product component that stores information,
including events, alerts, rules, and scripts.
data confidentiality
In security terms, the ability to restrict data accessibility.
data integrity
In security terms, ensuring that data presented to
authorized users is accurate and not improperly
modified.
data recovery
The process of completely restoring data to the state it
was in at a previous point in time. Data recovery is
usually performed as a result of some kind of disaster
that has caused serious data loss, corruption, or both.
data restore
A restore is the process of retrieving data (a single file or
many files) from a storage medium to a target location
(typically a hard disk).
DCAM
Database Access Server (DAS), Consolidator (C), and
Agent Manager (AM) components of MOM, which sit
between the collection agents and the central
database(s).
46
depreciation
The loss in value of an asset due to its use and/or the
passage of time. The annual depreciation charge in
accounts represents the amount of capital assets used up
in the accounting period. It is charged in the cost
accounts to ensure that the cost of capital equipment is
reflected in the unit costs of the services provided using
the equipment. There are various methods of calculating
depreciation for the period, but convention usually
recommends the use of current cost asset valuation as
the basis for the depreciation charge.
detection
The process of detecting an incident, either
automatically via an event management system, or by a
report from a human contact.
diagnosis
The process of determining the cause of an incident or
problem.
differential charging
Charging business customers different rates for the same
work, typically to dampen demand or to generate
revenue for spare capacity. This method can also be used
to encourage off-peak or nighttime running.
digital certificate
An attachment to an electronic message used for security
purposes. The most common use of a digital certificate is
to verify that a user sending a message is who he or she
claims to be, and to provide the receiver with the means
to encode a reply.
direct cost
A cost that is incurred for, and can be traced in full to, a
product, service, cost center, or department. Direct cost
is an allocated cost. Direct costs are direct materials,
direct wages, and direct expenses.
Overview
47
direct costs
Costs that can be traced to a particular activity or
organizational department.
directory
A directory is an information or data source used to
store information about objects. A telephone directory
stores information about telephone subscribers. In a file
system, the directory stores information about files.
directory service
Directory services allow users and applications to find
network resourcessuch as users, servers, applications,
tools, services, and other informationover the
network. The goal of directory services is to ensure that,
through a simple and organized process, information is
accessible through the network by any authorized
requester.
disaster recovery
Similar to a contingency plan, however, it traditionally
refers to a recovery from a natural disaster. The
contingency plan may anticipate and serve the purpose
of the disaster recovery plan if it is broad in scope.
discounting
The offering to business customers of reduced rates for
the use of off-peak resources. See also surcharging.
disk cluster
A technology solution that allows an organization to
connect two or more computers together in such a way
that they appear to act as a single computer.
48
documentation coordinator
The role that is responsible for reviewing existing
manuals and changing them as needed to support the
modifications to the production environment.
downtime
The unavailability of one or more configuration items
(CIs). It is measured from the start of the incident to the
restoration of an IT service.
DSL
See definitive software library.
egress
Egress can be defined as anything that leaves the facility
or is connected externally. Primary egress facilities are
typically outside of the direct control of the IT
department and therefore must be provided by another
party. Because of their criticality, IT may be required to
provide secondary sources for all egress services in the
event of a failure of the primary system. Egress services
typically consist of security, water, sewage, janitorial
service, gas, electricity, and Internet access.
elements of cost
The constituent parts of costs according to the factors
upon which expenditure is incurred, including
materials, labor, and expenses.
Overview
49
end user
See user.
environment
A collection of hardware, software, network
communications, and procedures that work together to
provide a discrete type of computer service. There may
be one or more environments on a physical platform
for example, test and production. Environments have
unique features and characteristics that dictate how they
are administered in similar, yet diverse, manners.
error
A defect in software or hardware that causes a
malfunction. Known in the vernacular as a bug. See also
known error.
error detection
A technique for detecting when data is lost during
transmission. This allows the software to recover lost
data by notifying the transmitting computer that it needs
to retransmit the data.
escalation
The process of raising the profile of a problem to
increase the awareness and/or resources available to
resolve it. See also functional escalation and management
escalation.
event
An occurrence within the IT environment (usually a
fault or incident) detected by a monitoring tool or an
application that is consistent with pre-defined threshold
values (within, exceeding, or falling below). An event is
deemed to require some sort of response, or, at a
minimum, is worth recording for future consideration or
an entry to be added to a log.
event consolidation
Combining multiple events into one event. The single
event identifies the number of consolidated events and
when the first and last consolidated events occurred.
event correlation
Event correlation is the process by which organizations
can identify the relationships between events. When
identified, event correlation can produce a smaller (that
is, more manageable) set of events with either the same
or more information content.
50
event log
Event logs are files in which events are stored. Every
operating system has its own set of event logs and
applications (for example, network and system
management systems).
event rule
A processing rule for generating an alert when specific
events occur.
event view
A window that displays specified events in the
configuration group.
evidence
Information indicating the nature and/or cause of an
incident or problem.
exception report
A report detailing an identified discrepancy.
existing problem
A problem that has been identified, which may or may
not have a workaround, but does not yet have an
identified resolution.
expert user
See super user.
facilities
Facilities consist of the building that houses the data
center, along with any associated components. These
components may consist of edifices, environmental
controls, physical security, fire suppression systems, or
human convenience.
facilities management
The process involved in the management of physical
structures that support the operations environment. It
includes property, utilities, power backup, property
maintenance, and monitoring. This process is often
managed by external specialists.
Overview
51
filter
A technology allowing different administrators to only
see the events they have defined as important to them.
For example, a storage management administrator
would filter events to show only storage management
events. Most third-party management systems can be
configured to filter events.
financial management
A MOF service management function in the optimizing
quadrant. It provides the sound management of
monetary resources in order to support organizational
goals. Financial management may include cost
accounting, budgeting, project investment appraisals,
and in some organizations, cost recovery.
financial year
An accounting period covering 12 consecutive months.
firewall
A dedicated gateway computer with special security
precautions on it. It is used to service the outside
network, especially Internet connections and dial-in
lines. The idea of a firewall is to protect a cluster of more
loosely administered machines hidden behind it from
hackers. The typical firewall is an inexpensive
microprocessor-based device containing no critical data.
The firewall has modems and public network ports
connected to it, but just one carefully watched
connection back to the rest of the cluster. The special
precautions taken within a firewall may include threat
monitoring, call-back, and even a complete iron box
configurable to particular incoming IDs or activity
patterns.
font
A graphic design applied to a collection of numbers,
symbols, and characters. A font describes a certain
typeface, along with other qualities, such as size,
spacing, and pitch.
forwarding
See alert forwarding.
52
full cost
The total cost of all the resources used in supplying a
servicefor example, the sum of the direct costs of
producing the output, a proportional share of overhead
costs, and any selling and distribution expenses. Both
cash costs and notional (non-cash) costs should be
included, including the cost of capital. See also total cost
of ownership.
full release
A release that replaces all components of a release unit,
regardless of whether they have changed since the last
version of the software.
function
Description of the performance of a feature, product, or
component.
functional escalation
The process of assigning additional resources or skills to
an incident in order to meet service targets. See also
escalation and management escalation.
functional management
A process responsible for the maintenance of the
functionality of an information system that is central to
its use.
go/no-go decision
The formal management decision to proceed or not
proceed with the deployment of a release into the
production environment. This decision is made during
the release readiness review. This term is also sometimes
used to indicate milestone approvals during the change
development process.
hardware
A layer of the MOF IT infrastructure. Hardware, as used
here, represents a wide range of component types. While
not a comprehensive list, hardware certainly contains
computers and storage devices. Within each of these
there can be memory, fans, power supplies, and many
other device types. Regardless of how it is defined, extra
hardware and spare parts need to be allocated to a data
center in order to replace pieces that might fail.
Overview
53
hierarchical escalation
See management escalation.
hub
A network device that forwards every incoming packet
out through all of its ports. See also switch.
identification
Any mechanism used to uniquely identify a user or a set
of privileges on a system. Identification can be likened to
a key. Access control can be likened to a lock. Both the
key and lock must match in order for a user to gain
access.
identify
The act of determining a condition and a consequence.
impact
(1) A measure of the business criticality of an incident,
problem or request for change. Often equal to the extent
of a distortion of agreed or expected service levels.
(2) In the MOF risk model, the degree of loss that the
business consequence would cause. This degree of loss is
measured on a numeric scale: the higher the impact, the
higher the number. Closely related to the ITIL meaning
of the same term, which is the business criticality of an
incident. Impact can also be measured in actual dollars
as opposed to a numeric scale.
impact analysis
(1) A quantitative research method in which a study is
conducted regarding the effects that an error or change
implementation may have on the other parts of the
configuration, along with the subsequent effects on the
service level. This analysis also considers the risks of the
error or change implementation and the potential
severity.
(2) An analysis of the potential damage or loss that may
be caused to the organization resulting from a
disruption to those processes. Business impact analysis
identifies the form the loss or damage will take, how
54
implementation scenario
A short overview of the organizational aspects and
scheduling relating to the execution of installation work.
The scenario involves a step-by-step plan that includes
the various actions, tests, persons responsible, and the
duration of the actions to be carried out.
implementation
The process of executing the production release and
stabilization of an IT change that encompasses one or
more configuration items (CIs).
incident
Any event that is not part of the standard operation of a
service and that causes, or may cause, an interruption to,
or a reduction in, the quality of that service.
incident count
The number of incidents that have occurred as the result
of a particular problem or known error.
incident management
(Noun) A MOF service management function in the
supporting quadrant. It is the function that controls and
manages the life cycle of all incidents from occurrence to
closure.
(Verb) Restoring normal service as quickly as possible
and minimizing adverse impacts on business operations.
indirect cost
A cost incurred in the course of making a product,
providing a service, or running a cost center or
department, but which cannot be traced directly and in
full to the product, service, or department, because it has
been incurred for a number of cost centers or cost units.
These costs are apportioned to cost centers/cost units.
Indirect costs are also referred to as overheads.
Overview
55
information system
The entirety of the hardware, accompanying basic
software and applications software, datasets, persons,
and procedures required for gaining knowledge of,
directing, or supporting business processes.
information technology
The architecture, structures, and processes that are the
core of an information systems strategy. The entirety of
those components (for example, computers, networks,
and information systems) with which information
provision is realized.
informed customer
An individual, team, or group responsible for ensuring
that monies spent on IT are directed to best effect, that is,
that the business is receiving value for money and
continues to achieve the most beneficial outcome. In
order to fulfill its role, the informed customer function
must gain clarity of vision in relation to the business
plans and assure that suitable strategies are devised and
maintained for achieving business goals. The informed
customer function ensures that the needs of the business
are effectively translated into a business requirements
specification, that IT investment is both efficiently and
economically directed, and that progress toward
effective business solutions is monitored. The informed
customer should play an active role in the procurement
56
infrastructure role
One of six roles in the MOF team model. It is responsible
for the evolving enterprise architecture and ensures that
plans are in place to meet the new and changing
requirements of running the business from a
networking, telecommunications, hardware, and
software perspective. Additionally, the infrastructure
role includes responsibility for shared/common data
management such as customer and product data, space,
and storage planning (data centers, field and remote
offices, test labs, development labs, and so forth), and
the tools necessary to support the infrastructure.
initial support
The process of trying to resolve an incident at first point
of contact, using information from known errors,
existing problems, previous incidents, knowledge bases,
documentation, and the implicit knowledge of initial
support staff.
initiator
The source of the initial incident or problem report.
integration
The degree to which consecutive types of actions or
work are carried out by an organizational unit.
integrity
A concept that ensures that data is not garbled,
modified, or lost during transmission across a network.
It also ensures that data is from the intended sender and
not from an impostor. Data integrity mechanisms
include checksums and digital signatures.
intellectual property
Non-tangible property that is the result of creativity.
interface
A physical or functional interaction at the boundary
between configuration items.
Overview
57
Internet
A specific internetwork that is available for public use.
The Internet was originally created by the Defense
Advanced Research Projects Agency (DARPA), an
agency of the United States Department of Defense, for
interconnecting military contractors and research
organizations. The U.S. military no longer controls the
Internet, however.
internetwork
A group of connected local area networks (LANs). A
network of networks. In many cases, an internetwork is
composed of LANs in distant locations connected by
means of a wide area network (WAN). Most
internetworks are proprietary and used expressly for
connecting a company to its remote offices and business
partners.
investigation
The progress of determining further details regarding an
incident.
IT infrastructure
The sum of an organizations IT-related hardware,
software, data communication facilities, procedures,
automation tools, documentation, and people.
IT infrastructure library
See information technology infrastructure library.
IT service
A described set of IT functionality that fulfills one or
more needs of the customer and supports the customers
business objectives. This term may also be used to refer
to the components (for example, computers, networks,
information systems, processes, or combination thereof)
with which customer service provision is realized.
58
IT service management
An approach that IT organizations can take to plan,
develop, deliver, and maintain quality IT services that
are customer-focused and process-driven, as well as
meeting both cost and performance targets as defined by
the SLA or OLA.
IT service provider
Any organizational units, whether internal or external,
that deliver and support IT services to a customer.
ITEC
See information technology executive committee.
ITIL
See information technology infrastructure library.
job scheduling
(Noun) A MOF service management function in the
operating quadrant. It involves the continuous
organization of jobs and processes into the most efficient
sequence, maximizing system throughput and
utilization to meet service level agreement (SLA)
requirements.
(Verb) Ensuring the efficient processing of data at a predetermined time and in a prescribed sequence to
maximize the use of system resources and minimizing
the impact to online users. Its goal is to ensure the
successful execution of batch runs while minimizing the
impact on live users of system resources. The main
activities of job scheduling include monitoring, analysis,
tuning, and implementation of batch runs.
knowledge base
A collection of rule comments that embodies knowledge
about the meaning and importance of events. The
Microsoft Knowledge Base contains predefined
information from Microsoft. The company knowledge
base contains information entered by the Microsoft
Operations Manager 2000 user.
known error
An incident or problem for which the root cause is
known and for which a temporary workaround or a
Overview
59
lab testing
A test conducted in a simulated, non-production
environment built to mirror the production
environment. This environment is completely
disconnected from the production environment.
life cycle
The phases an IT component goes through from the time
it is conceived to the time it is retired from service. The
life cycle represents an approval process for
configuration items, problem reports, and change
documents.
line-of-business application
A software application that is critical to the functioning
of the enterprise.
60
maintenance
Tasks aimed at the upkeep and protection of the
technical infrastructure that can result from such things
as errors in the application software, necessary extension
of the functionality, or technical developments in the
area of hardware and basic software.
major change
A change category describing changes that have a
potential impact on the highest percentage of users or on
a business-critical system. The change may be new
technology or a configuration change. It may involve
downtime of the network or a service.
major incident
An incident with a high impact, or potentially high
impact, which requires a response that is above and
beyond that given to normal incidents. Typically,
these incidents require cross-company coordination,
management escalation, the mobilization of additional
resources, and increased communications.
major problem
A problem with a high impact, or potentially high
impact, which requires a response that is above and
beyond that given to normal problems. Typically,
these problems require cross company coordination,
management escalation, the mobilization of additional
resources, and increased communications. There are
normally longer timescales available in which to plan a
resolution to a major problem, compared to a major
incident, which often requires an immediate response.
This means that it is better to treat the issue as a
proactive requirement, and hence progress it under
problem management as a major problem. If it is left to
incident management because it lacks the immediacy of
other incidents, there is a risk of it not being progressed.
An example of a past major problem is the year 2000
issue.
majority
A simple majority or a pre-defined percentage of
members must vote yes for change to be approved.
Overview
61
management escalation
The process of raising the profile and awareness of an
incident up the management hierarchy, so as to keep
managers updated and to obtain the necessary
commitment and authority for the required support
resources. Also called hierarchical escalation. See also
escalation and functional escalation.
management stations
Management stations are computers dedicated to
managing and monitoring the nodes in the system.
marginal cost
The cost of providing the service now, based on the
investment already made.
match
A known error, existing problem, or previous incident
record that has the same characteristics as an incident
currently being addressed.
matching
The process of comparing records of known errors,
existing problems, and previous incidents against a
current incident record to obtain a match.
62
measurement
(1) A value determined by calculation or by data
acquisition from a sensor.
(2) The act or process of measuring.
metadirectory
Metadirectory products are essentially directories of
directories. They provide a common infrastructure that
exists at a level above various directories, directing
queries and returning responses through a single,
transparent user interface. Metadirectories provide
integration and unification.
metric
An analysis of one or more measurements to produce
information. For example, current temperature is a
measurement (datum). An analysis of how the current
temperature compares to the average temperature for
this date is a metric (information).
Overview
63
middleware
A layer of the MOF IT infrastructure model. Middleware
can be defined as the part of the application that the
users do not see. Middleware includes databases, Web
services, and messaging systems such as Microsoft
COM+. Given this broad definition, the question of what
constitutes middleware varies greatly from application
to application.
milestone review
A meeting that takes place at the end of each phase of
change development and signals agreement to proceed
to the next step. The level of formality in the reviews is
dependent on the complexity of the change.
minor change
A change category applied to changes that impact a
smaller percentage of users than do significant changes.
Also, they involve less risk because of the organizations
relatively high experience level with the proposed
change.
missing event
An event that was supposed to occur within a specified
time interval, but did not occur.
MOF
See Microsoft Operations Framework.
64
Configuration management
Problem management
Workforce management
Overview
65
MSF
See Microsoft Solutions Framework.
network administration
(Noun) A MOF service management function in the
operating quadrant. It employs the process of
maintaining communications systems and links, along
with accompanying data-processing procedures, in
accordance with the requirements and preconditions
arising from their use and the characteristics of the
network components.
(Verb) Being responsible for the efficient operation of the
network at all times and providing a reliable, consistent,
scalable network infrastructure that meets or exceeds
service levels and optimizes enterprise assets. Its goals
are to provide day-to-day administrative services in
support of the network infrastructure. This entails
managing and resolving incidents and problems,
managing performance, and providing a secure network
environment. Works in concert with other SMFs, such as
capacity management and security administration.
node
66
non-authoritative restore
This type of restore is used to provide a start point (the
point of time at which backup was taken) for data
replication to minimize the replication traffic on the
network. The restored data is synchronized with data on
other domain controllers through replication. Only
changed data (rather than the entire directory) is
replicated. In the absence of this start point, all data
would be replicated from other servers.
nonrepudiation
A security concept that applies to proving the
transmission of a particular message. If a system applies
technical nonrepudiation, the sender of a message
cannot later deny having sent the message, and the
receiver of a message cannot later deny having received
the message. Furthermore, if the message contains
contractual information, the presence of a digital
signature with the message can ensure at a later time
that the contractual information was not improperly
altered.
norm
An idea held by members of a group that can be
expressed in the form of a rule and specifies what
members are expected to do in given circumstances.
notification group
A list of operators and scheduled availability for
receiving page or e-mail responses.
OMR
See operations management review.
Overview
67
operating quadrant
The second quadrant in the MOF process cycle. It
encompasses the day-to-day activities of an IT
organization. Its activities ensure the smooth operation
of the operations environment.
operating system.
(1) A program that controls the hardware. The operating
system provides access to the central processing unit,
memory, storage devices, and so on. Because of this
relationship, correct operating system performance is
critical to correct application performance. The user may
not be aware of the operating system or what it does, but
68
operational costs
Those costs resulting from the day-to-day running of the
IT services sectionfor example, staff costs, hardware
maintenance, and electricity. Operational costs relate to
repeating payments whose effects can be measured
within a short time frame, usually less than the 12month financial year.
operations
The on-going activities IT personnel perform on IT
environment components to run and manage the
information technology system and support the business
organization. These activities emphasize execution and
are particularly evident in the MOF operating quadrant.
operations review
The management review within the operating quadrant.
The primary goal of the operations review is to assess
the effectiveness of internal operating processes and
procedures and make improvements as appropriate.
This evaluation is focused on the internal processes and
procedures utilized to meet service level requirements
and how those activities can be improved. The
operations review assists in the retention of the
corporate knowledge. It is crucial that, as the operations
staff gains experience with a process, system, or
application, it documents this experience and retains it
in the corporate knowledge base. The operations
reviews can be both release-based and time-based.
operations role
One of six roles in the MOF team model. It includes
skilled specialists who focus on technology areas and
production-systems tasks necessary to run the business
Overview
69
operator
The person scheduled to receive e-mail or page
responses from Microsoft Operations Manager 2000.
operator-driven actions
Manual tasks that are performed in response to a
message generated by one or more system management
tools. The operator will need to follow manual password
change procedures in order to overcome the occurrence.
Operating procedures such as these should be clearly
defined, documented, and tested.
operator-initiated actions
Message-linked, pre-configured responses to eventgenerated incidents. These actions are started and
stopped by an operator.
optimizing quadrant
The fourth quadrant in the MOF process cycle. It
evaluates the operational functionality of an IT
organization. The objective of this quadrant is the
optimization of cost, performance, capacity, and
availability in the delivery of IT services. The optimizing
quadrant includes the service management functions to
manage costs while maintaining or improving service
levels. This includes the review of outages/incidents, the
examination of cost structures, staff assessments,
availability, performance analysis, and capacity
forecasting.
70
outsourcing
The process by which functions performed by the
organization are contracted out for operation, on the
organizations behalf, by third parties.
overhead
The total of indirect materials, wages, and expenses.
package release
A release that includes a package of software
configuration items that are introduced into the
production environment.
packet
An Open Systems Interconnection (OSI) network layer
transmission unit that consists of binary information.
This information includes both data and a header
containing an identification number, source and
destination addresses, and error-control data.
partner role
One of six roles in the MOF team model. It includes
management of a broad collection of IT partners, service
suppliers, and outsource vendors who work as virtual
members of the IT staff in providing hardware, software,
networking, hosting, and support services.
passive components
Those parts of a network that carry information but do
not require their own source of power. Passive
Overview
71
patch
An update (commonly called a fix) to a version or
release. Each patch introduced into the environment
needs a corresponding version adjustment.
peer-to-peer network
A network in which every computer is an equal and
functions as both a client and a server. This means that
any computer can share its resources with the network
and access the shared resources on other computers.
Peer-to-peer networks should be generally limited to 10
or 15 nodes or fewer on a single LAN because each
system has to maintain its own user accounts and other
security settings.
performance data
Sampled numeric data collected from Microsoft
Windows NT performance counters.
performance measure
Sampled numeric data collected to aid in capacity
planning.
performance management
A sub-process focused on managing both the
performance of the IT solutions used by the customers
and the performance of the underlying resources on
which the solution depends. It is responsible for
ensuring the monitoring of the performance of all IT
solutions, as detailed in the OLA targets for key IT layers
in the technical infrastructure. It also is responsible for
ensuring the monitoring of the performance of the
underlying resources. All of the collected data is
recorded, analyzed, and reported. As necessary, the
capacity management staff ensures that the performance
of the solutions meets the business requirements. Service
monitoring and control is a key SMF for this subprocess.
72
performance threshold
Sampled numeric data compared to a threshold value.
Microsoft Operations Manager 2000 generates an alert if
the threshold is crossed in either direction.
pilot
The experimental and preliminary stage of a project or
deployment aimed at minimizing the impact of the
deployment and providing valuable feedback on the
projects suitability for completion.
pilot plan
A document that contains the objectives, rollout and
rollback procedures, support and training requirements,
and communication strategy for the pilot test of a
change.
pilot test
A test in a controlled and limited deployment of a
release package into the production environment. It is
initially limited to IT organizations and then rolled out
to a pre-selected group of users.
plan
Setting mitigations, triggers, and contingencies.
pod
A method of scheduling service desk personnel.
PostScript
A page-description language (PDL), developed by
Adobe Systems Incorporated for printing on laser
printers, that offers flexible font capability and highquality graphics. PostScript is the standard for desktop
publishing because it is supported by imagesetters, the
high-resolution printers used by printing services for
commercial typesetting.
Overview
73
pre-approved change
See standard change.
primary restore
This type of restore is used when the server being
restored is the only working server of a replicated
dataset and is being rebuilt from backup.
PRINCE2
The standard U.K. government methodology for project
management.
print job
The source code that contains both the data to be printed
and the commands for printing. Print jobs are classified
into data types based on what modifications, if any, the
spooler must make to the job for it to print correctly.
print server
A computer that is dedicated to managing the printers
on a network. The print server can be any computer on
the network.
print spooler
Computer software that accepts a document sent to a
printer by the user and then stores it on disk or in
memory until the printer is ready for it. This collection
74
printer driver
A program designed to allow other programs to work
with a particular printer without concern for the
specifics of the printers hardware and internal
language. By using printer drivers that handle the
subtleties of each printer, programs can communicate
properly with a variety of printers.
priority
The sequence in which an incident or problem needs to
be resolved, based on impact and urgency.
private view
A view that is accessible only by the user who created it
and is saved in the My Views folder.
problem
An unknown, underlying cause of one or more
incidents.
Overview
75
problem management
(Noun) A MOF service management function in the
supporting quadrant. Its primary objective is to
effectively address the root cause of incidents in order to
reduce their quantity and severity in the production IT
environment. It employs the processes aimed at
detecting and effecting structural improvements in the
technical infrastructure and the settlement of problems
arising from the use and management of information
systems.
(Verb) Minimizing the adverse effect on the business of
incidents and problems caused by errors in the
infrastructure. Proactively preventing the occurrence of
incidents, problems, and errors.
procedure
The description of a formalized method of working
(when and in what order actions are to be carried out)
for a specified process or part thereof). Procedures
provide for coordination between departments.
process
A series of actions or operations designed to achieve an
end.
process control
The practice of planning and regulating a process so as
to enact it in an effective and efficient way.
processing
The daily operation of all systems in the IT environment.
processing rule
A rule that defines how Microsoft Operations Manager
2000 collects, processes, and responds to information.
Types of processing rules include event, filtering,
missing event, consolidation, alert, performance
measuring, and performance threshold.
76
process model
See MOF process model.
protocol
The standardized way in which communication takes
place between two components.
public view
A view that is accessible by anyone, and is saved in the
Public Views folder.
quadrant
The four distinct divisions of the MOF process model,
culminating in a major or external review.
quality level
A measure of quality, expressed as a measurable
quantity (the response time or availability percentage,
for example).
quality
The totality of those properties and characteristics of a
product or service that is important in enabling the
fulfillment of established or self-evident needs.
Overview
77
quorum
Defines the minimum number or minimum majority
percentage of people required to be present for a vote.
recording
Preserving information in permanent form.
recovery
The process of carrying out actions to restore normal
operation of service once an incident has been resolved.
release
(noun) A collection of one or more changes that includes
new and/or changed configuration items that are tested
and then introduced into the production environment.
release management
(Noun) A MOF service management function in the
changing quadrant. It employs the processes of
coordinating and managing the activities by which all
releases to the production IT environment are planned,
tested, and implemented.
78
release manager
The role that is responsible for managing the activities of
the release management process for the IT organization.
For releases with large and complex scopes, the release
manager forms a team to manage the release activities.
The release manager selects the team members and
assigns team roles and responsibilities.
release mechanism
The method and process for rolling out a change. The
release team should deploy each release using a
mechanism that allows it to automate as much of the
process as possible because this ensures repeatability
and consistency.
release package
The processes, tools, technologies, and documents
required to move a release into production. Also, all of
the components of the changes that comprise the release.
release planning
The activity in the release management process that
defines and prioritizes all requirements for the release. It
creates a comprehensive set of release plans, including a
test plan, rollout plan, and others. These plans are used
by all team members as the release moves through the
release management process.
release role
One of six role clusters in the MOF team model. It
participates in system upgrades and ongoing revisions
of software development projects. It frequently serves as
the primary actor in releasing a new service offering into
IT operations. The release role of the MOF team model is
the point at which the logistics manager role of the MSF
team model intersects with MOF. This is where the
handoff between development/test and production
operations occurs, which is a crucial juncture for the
smooth transition of the system into production.
Overview
79
release schedule
A timetable created by the release manager that plans
the rollout, based on the priority and urgency of the
release in relation to others. It details schedule activities
and resources accordingly.
release scope
The release manager performs this step to provide the
team with the answers to key questions that are used to
plan the release. The resulting steps and any decisions
made are captured and then recorded in the change log.
release strategy
The overarching design, plan, and approach for
deployment of a change into production.
release unit
A component or set of components packaged together as
a single release unit and released into the test and
production environments.
reliability
The ability of a component or IT service to perform a
required function without failing, under stated
conditions for a stated period of time.
replicas
Online copies of the directory data. In the event of a
server failure, peer replicas provide continued service
and access to the data while the failed server is repaired.
When the server is recovered, it can be returned to
service as a replica server.
reporting
The collection, production, and distribution of an agreed
level and quality of service information (for use in
capacity, availability, and service level management, for
example).
request
See service request.
80
resilience
The capacity of an IT service to continue to provide a
required function in the event that a portion of the
underlying infrastructure suffers a failure.
resolution
The process of implementing resolution actions in
accordance with change and release management
processes.
resolution action
An action that will resolve an incident or problem. In the
case of an incident, this may be a workaround.
resolution completion
The point at which manual/automatic action has been
taken and all recording and incident management
actions have been successfully completed.
resolver group
A specialist support team to which an incident may be
assigned. This may be an internal team or an external
vendor.
resolution history
A feature in Microsoft Operations Manager 2000 that
automatically tracks changes to alert fields. Users can
also enter their own information about an alert.
resolution state
The status of an alert relative to the cycle of its
resolution. Default resolution states include New,
Acknowledged, and Resolved, among others.
resource cost
The amount of machine resource that a given task
consumes. This resource is usually expressed in seconds
for the CPU or the number of I/Os for a disk or tape
device.
Overview
81
resource management
A sub-process that focuses on the management of the
individual resources of the IT infrastructure. From the
workloads, it determines the present and future required
resources. It is responsible for ensuring that all resources
are acquired and implemented in a timely and costeffective manner.
resource profile
The total resource costs that are consumed by an
individual online transaction, batch job, or program. It is
usually expressed in terms of CPU seconds, number of
I/Os, and memory usage.
resources
Resources are typically computer and related
equipment, software, facilities, or organizational
(people). The IT Services section needs to provide the
customers with the required services.
response
An action that Microsoft Operations Manager 2000
initiates when a processing rule match occurs.
Notifications, command or batch files, scripts, and
SNMP traps are examples of possible responses.
Responses that occur on the consolidator computer are
called central responses. Responses that occur on the
agent computer are called local responses.
response time
The time between the start (sending a request or
command) and the end (obtaining the result) of an
online transaction.
review
The reassessment and re-examination of the people,
process, and tool elements of the service monitoring and
control function. The reassessment is designed to ensure
82
RFC
See request for change.
risk
The possibility of suffering a loss; an event that may or
may not happen. If an event is guaranteed, then it is not
a riskit is a known problem that can be planned for.
The loss is relative. Failure to achieve the maximum
possible gain is considered to be a loss. The opposite of a
risk is an opportunity or the possibility of experiencing a
gain.
risk management
A discipline and environment of embedded decisions
and actions to assess continuously what can go wrong,
determine what risks are important to deal with, and
implement strategies to deal with those risks.
role
A set of responsibilities, activities, and authorizations.
Depending upon the intensity of labor involved and the
size of the organization, one person can perform
multiple roles within an organization, or multiple
persons can perform a single role.
role cluster
A concept defining six general categories of activities
and processes. The processes within a role cluster all
support the same quality goal. It is important to
recognize that role clusters are groups of activities that
share a common goal. They are not job descriptions, and
they do not imply any kind of organizational chart.
rollback plan
Documented details outlining how to stop and/or back
out a change that has been deployed or is in the process
of being deployed and return to the previous state of the
IT environment.
Overview
83
rollout
The physical deployment of the release into production.
rollout plan
A comprehensive plan built by release management that
is used to identify the activities (and the resources)
required to successfully deploy a release into the
production environment. Also, detailed documentation
that outlines how a change is physically deployed by the
release team.
rollout preparation
The step in the release management process during
which the rollout team is preparing the IT infrastructure
for the release. It requires assembly of resources and prestaging of hardware and software.
rollup
A series of patches joined consecutively.
router
Routers enable LANs and WANs to achieve
interoperability and connectivity, and they can link
LANs that have different network topologies (such as
Ethernet and Token Ring). Routers match packet
headers to a LAN segment and choose the best path for
the packet. The forwarding decision is based on routing
tables, which optimizes network performance.
rule
A method of grouping computers or identifying data to
collect. Organizations can define two types of rules.
Computer grouping is a rule that creates a collection of
computers for similar event management. Processing is a
rule that defines the events, alerts, and performance data
to collect, what to do with the information once it is
collected, and how to respond to the indicated condition.
rules
Rules are a predetermined task or set of taskseither
automatic or operator initiatedthat are to be followed
upon the occurrence of an event.
84
scalability
Scalability refers to the capacity of the application to
perform increasing amounts of work while sustaining
acceptable performance levels. For example, if one
system/processor supports ten users, then two
systems/processors should support twenty users, and so
forth. Linear scalability assumes a straight line with a
slope of one.
scaling out
Scaling out, sometimes referred to as scaling wide, refers
to expanding a solutions capacity by incrementally
adding more serverscomplete with processors,
storage, and bandwidthand sharing the user load
across these servers. This is also referred to as horizontal
scaling or horizontal growth.
scaling up
Scaling up, sometimes referred to as scaling high, refers
to expanding a solutions capacity by incrementally
adding more devices to an existing server, typically by
adding central processing units (CPUs), memory, disks,
and network interface cards (NICs) to a server. This is
also referred to as vertical scaling or vertical growth.
script
A simple program that can be added to a processing rule
as a response or used as an extension to the event
criteria definition.
security
Comprises security policies, as specified by security
design and processes that address IT asset
confidentiality (protection of data), integrity (accuracy of
data), and availability (access to data).
security administration
A MOF service management function in the operating
quadrant. It employs the process of developing,
implementing, and managing security controls.
Associated components include data confidentiality,
data integrity, and data availability.
security incident
An occurrence that has or potentially could have
consequences with regard to the confidentiality,
integrity, or availability of the organizations data and/or
services.
Overview
85
security role
One of six role clusters in the MOF team model. It is
responsible for corporate data, network, and operational
security. A second area of responsibility is the
development and implementation of a comprehensive
plan for the retention, classification, and secure disposal
of data. Additionally, the security role is responsible for
having a sufficient plan to recover a corporate
networkincluding all critical business applicationsto
at least a minimum operational configuration in a short
amount of time.
self-managed team
A classification of a service desk team that typically
manages itself. Also, a method of scheduling service
desk personnel.
self service
The process by which IT customers are able to perform
some part of the incident management process
themselves, without using the service desk.
self tracking
The process by which IT customers can view (but not
update) details of calls they have raised with the service
desk.
server
A computer that provides some service for other
computers connected to it via a network. The most
common example is a file server, which has a local disk
and services requests from remote clients to read and
write files on that disk.
service
(1) A layer of the MOF IT infrastructure model. This is
the function that IT is helping the business perform. It
likely has a name that is easy for the business to
understand, such as payroll. In order to perform this
function, however, the business needs the support of the
IT layers below. (2) A long-running application that
executes in the background on Windows NT,
Windows 2000, and Windows .NET servers. Services
typically perform working functions for other
applications.
86
service achievement
The actual service levels delivered by the IT
organization to a customer within a defined life span.
service catalog
A directory of all services that an IT organization offers.
Or, a written statement of IT services, default levels, and
options.
service delivery
A collection of IT service management disciplines and
processes that are directed at optimizing operational
processes (service support) and that are responsible for
the final service provision. The service delivery
disciplines are service level management, service
continuity management, availability management,
capacity management, and financial management.
service desk
A MOF service management function in the supporting
quadrant. Also, the single point of contact within the IT
organization for users of IT services.
service level
An agreed-upon quality and quantity of services to be
supplied.
Overview
87
service management
A collection of people, processes, and technology
through which conditions are created that ensure the
continuity and quality of the agreed-upon services.
Service management includes IT operations as a practice
in delivering services, but maintains a broader scope by
emphasizing, supporting, and continually improving IT
services.
service manager
The entity that is ultimately responsible for day-to-day
provision and monitoring of an individual service across
all relevant sites. Also responsible for providing SLA
compliance measures and for ensuring that the service
88
service provider
An internal or external provider of an IT service.
service request
Every incident that is not a failure in the IT
Infrastructure.
services
The deliverables of the IT Services organization as
perceived by the customers; the services do not consist
merely of making computer resources available for
customers to use.
service target
An achievable and measurable service level objective
documented within a formal agreement.
significant change
A change category applicable to changes that are nonstandard and impact a high percentage of users. Their
change development and release processes are likely to
require more careful planning, more time, and more
resources than are required for standard and minor
changes. These changes may involve downtime of the
network or a service. Examples are new products, new
users, or network changes.
Overview
89
significant incident
An incident that has impacted or potentially could
impact agreed-upon service levels.
SLA review
The interval-based review at the end of the supporting
quadrant. The operations staff, lead by the support team,
reviews the SLAs and the associated metrics during this
review and determines which services have met the
service level requirements. The staff then takes
corrective action to address those areas that fail to meet
the requirements.
software environment
Software used to support an application. Examples
include operating systems, database management
systems, development tools, compilers, and application
software.
software release
All of the new, modified, or existing software
configuration items that are made available for use at
any given time.
solution
(1) The coordinated delivery of the elements needed
(such as technologies, documentation, training, and
support) to successfully respond to a business problem.
(2) An identified means of resolving an incident or
problem that provides a resolution for the underlying
cause.
90
standard change
A change category that describes changes that are preapproved and can bypass the authorization process to
proceed directly to release. These changes can do this
because they have an established deployment path and
impact the smallest percentage of users of any of the
change categories. Standard changes represent trusted
and accepted solutions to a set of requirements.
standard cost
A pre-determined calculation of what a cost should be
under specified working conditions. It is built from an
assessment of the value of cost elements and correlates
technical specifications and the quantification of
materials, labor, and other costs to the prices and/or
wages expected to apply during the period in which the
standard cost is intended to be used. Its main purposes
are to provide bases for control through variance
accounting, to provide valuation of work in progress,
and fix selling prices.
standard costing
A technique that uses standards for costs and revenues
for the purposes of control through variance analysis.
standardization
The establishment of technical specifications for
products, working methods, and similar components to
achieve system uniformity. Use of the standard
specifications can be made mandatory for subordinate
organizations.
storage management
(Noun) A MOF service management function in the
operating quadrant. It provides management of onsite
and offsite data storage for the purposes of data
restoration and historical archiving.
Overview
91
storage media
Any media used for storing data, including hard disks,
floppy disks, optical disks, and magnetic tape.
strategic management/level
Actions concerning the relationship of the organization
to its environment and the basic outlines of the
organization structure. Decisions on a strategic level
influence the processes within the organization. Final
responsibility lies with the directors, but functionaries at
lower management levels have an important role as
information providers. Strategic management gives
direction to the business, economic, organizational, and
technological aspects of management.
subenvironment
A logically autonomous part of a conceptual
environment that belongs to a specific application or
service.
sunk cost
Cost already incurred which cannot be recovered
regardless of future events.
super user
In some organizations it is common to use expert
users (commonly known as super, or expert, users) to
deal with first-line support problems and queries. This is
typically done in specific application areas or
geographical locations where there is not the
requirement for full-time support staff. This valuable
resource needs, however, to be carefully coordinated
and used.
support chain
The support team hierarchy from initial support through
to development teams or external vendors, who between
themselves perform the support processes.
support role
One of six role clusters in the MOF team model. The
support role includes service desk and production
support functions. The goal of the service desk is to
92
supporting quadrant
The third quadrant in the MOF process cycle. It supports
IT operations in day-to-day operations. The supporting
quadrant incorporates the concepts of integrated
resolution processes. These processes include a service
desk, incident management, problem management, and
service recovery processes. Tasks performed in the
supporting quadrant are concurrent with tasks
performed in the operating quadrant.
surcharging
Surcharging involves charging business users a
premium rate for using resources at peak times.
switch
A network device that forwards each incoming packet
only to the port that provides access to the destination
system. See also hub.
symptoms
The description of the effects of an incident or problem.
system
An integrated composite that consists of one or more of
the processes, hardware, software, facilities, and people
that provides a capability to satisfy a stated need or
objective.
system administration
A MOF service management function in the operating
quadrant. It focuses on the day-to-day tasks associated
with maintaining enterprise systems.
sysvol
The sysvol is a replicated dataset that is stored on every
domain controller. It contains the scripts and policies
that are used within the domain.
task scheduler
A system or application that automatically invokes
scripts or programs at specified times.
team model
An organizational work model that emphasizes the use
of small, cohesive teams of role specialists who
communicate on an equal basis in the accomplishment
of their individual and group tasks.
Overview
93
testing coordinator
The role that is responsible for developing test scripts,
managing the release user acceptance testing process,
evaluating the testing results, beginning the process of
problem correction, and determining how to handle
failures. At the completion of testing, the coordinator
develops a test analysis report that management uses to
decide whether to continue the release process and
begin the pilot phase.
test plan
A document that provides the detailed blueprint for the
types and level of testing to be performed on a change
being developed.
test scripts
Documented step-by-step procedures or automated
processes that dictate the testing process to be
performed for a release.
third-party supplier
An enterprise or group, external to the customer's
enterprise, that provides services and/or products to that
customer's enterprise.
third-party contracts
Contracts placed with external providers for the
provision of all or part of the infrastructure delivering all
or part of a service being monitored.
threshold/criteria
As used in the system and network management
industry, a threshold is a configurable value above
which something is true and below which it is not.
Thresholds are used to denote predetermined levels, and
when thresholds are exceeded, actions may occur.
threshold rule
A processing rule for creating an alert when a Windows
NT performance counter value crosses a defined
threshold. See also performance threshold.
ticket
A set of identification data for a security principle,
issued by a domain controller for purposes of user
authentication. Two forms of tickets in Windows are
ticket-granting tickets (TGTs) and service tickets.
94
track
To maintain formal documentation of a plan, which is
always kept current.
training plan
A document that describes how the organization will
meet the training needs for a release. It incorporates a
gap analysis that drives the type of training to be
conducted and is balanced with its impact on
productivity and day-to-day operations.
triad
A method of scheduling service desk personnel.
unanimous
Every member must vote yes for change to be approved.
underpinning contract
A contract between IT and one or more external vendors
that defines the responsibilities of all participating
parties. The contract binds these parties to providing a
particular service (or service component, such as
hardware, software, and so on) of a specific, agreedupon quality and quantity. It also constrains the
demands IT and/or its users may place upon the service
(or service component) to those agreed-upon limits
defined by the contract.
unit costs
Costs distributed over individual component usage. For
example, it can be assumed that, if a box of paper with
1,000 sheets costs $10, then each sheet costs 1. Similarly,
if a CPU costs $1 million per year and it is used to
process 1,000 jobs that year, each job costs on average
$1,000.
Overview
95
upgrade
An adjustment to the version or release in which the
version number changes.
uptime
The time between incidents or failures when customer
expectations are met as specified by the OLA or the SLA.
urgency
A measure of the business criticality of an incident or
problem based on the impact and on the business needs
of the customer.
user
The person who uses the services on a day-to-day basis.
variance analysis
Variance analysis is an analysis of the factors that have
caused the difference between predetermined standards
and the actual results. A variance is the difference
between planned, budgeted, or standard cost and actual
cost (or revenues). Variances can be developed
specifically in reference to the operations carried out in
addition to those previously mentioned.
version
The status of a configuration item, consisting of one or
more changes at the specification level.
vetoes
One member may have the ability to say no, which
results in rejection of a change request. For example, the
security member may have veto on any change with a
potential impact on either the domain name system or a
firewall.
view
A window in the Microsoft Operations Manager 2000
Monitor snap-in that displays specified data from the
database.
96
Web console
An interface that allows users to access database
information from any Windows platform that can run
Microsoft Internet Explorer.
workaround
A method of avoiding an incident or problem, either by
implementing a temporary fix or by ensuring that the
customer is not reliant on a particular aspect of a service
that is known to have a problem.
workforce management
A MOF service management function in the optimizing
quadrant. It recommends best practices to recruit, retain,
maintain, and motivate the IT workforce.
Overview
97
Appendix B: Acronyms
ACD
ACL
ADF
AMDB
AMM
API
ASCII
AST
ATM
BCM
BIA
BRM
BSI
CA
certification authority
CAB
CAB/EC
CASE
CBF
CCTA
CDB
capacity database
CERT
CFIA
CI
configuration item
CIA
CIM
CLI
CMDB
COP
Code of Practice
COPC
98
CPS
CPU
CRAMM
CSBC
CSS
CTI
Computer-Telephony Integration
DCAM
DHS
DMTF
DSL
DT
downtime
E2E
end-to-end
EDI
EFQM
EUAE
end-user availability
EUDT
end-user downtime
EUPT
FAQ
FSC
FTA
GOT
GUI
HR
human resources
HTML
ICAM
ICT
IDEF
ICAM definition
IIS
IPSec
Overview
99
IR
incident report
ISO
ISP
IT
Information Technology
ITAMM
ITEC
ITIL
ITSC
IT service continuity
ITSCM
ITSMF
IVR
KDC
KER
KPI
KSF
LAN
LDAP
LOB
line of business
MBNQA
MCS
MIB
MIM
MMC
MOF
MOM
MSF
MTBF
MTBSI
MTTR
NOS
OCR
OGC
OLA
OLR
OLTP
PBX
PC
personal computer
PCL
PDA
PDL
PIN
PING
PIR
post-implementation review
PKI
PPP
Point-to-Point Protocol
PR
problem record
PRINCE
PSA
PSTN
QA
quality assurance
RAG
red-amber-green
RAID
RBAC
RFC
RFI
ROCE
ROI
return on investment
RWO
real-world object
SAN
SIP
SLA
SLAM
SLR
100
Overview
SMF
SMO
SMTP
SNMP
SOA
SOO
SPOF
SQL
TCO
TCP/IP
TGT
ticket-granting ticket
TOP
TOR
terms of reference
TP
transaction processing
TQM
UC
underpinning contract
UPS
VB
Visual Basic
VBF
VoIP
VPN
VSI
WAN
WFD
WIP
work in progress
WMI
101
102
Books
The following books serve as a bibliography for this
introduction to the SMFs or as recommended reading to
further understand the concepts contained in them.
Planning to Implement Service Management ISBN 0 11
330877 9
Service Support
Service Delivery
ISBN 011330014X
Web Sites
For more information on Microsoft Frameworks and its
offerings, see:
http://www.microsoft.com/msf
http://www.microsoft.com/mof
For more information on ITIL, see http://www.itil.co.uk/
For more information on the Help Desk Institute, see
http://www.helpdeskinst.com/
For more information on the Customer Operations
Performance Center, see http://www.copc.com