From the course: Putting ITIL® Into Practice: Applying ITIL® 3 Foundation Concepts
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Event management techniques - ITIL Tutorial
From the course: Putting ITIL® Into Practice: Applying ITIL® 3 Foundation Concepts
Event management techniques
- [Instructor] Your ITIL Foundation course listed some event management techniques: compression, correlation, filtering, intelligent monitoring, roll-up, and verification. The key question here is, which of these techniques are you employing and is that contributing to the event management outcome of ensuring that events worth managing are detected and that alert notifications are sent out that trigger effective action? In this instance, we'll apply the first way, enact and enable outcomes. Here's how. For your event management software, rate with gray for unknown, red for bad, yellow for degraded, or green for good if the tool has each capability: compression, correlation, filtering, intelligent monitoring, roll-up, and verification. Rate again for, is it configured and again for, is it being used? Rate it once more against how it is contributing to the event management outcome we just discussed. Based on this analysis, you should be able to identify the top actions you could take to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Applying ITIL doesn't have to be this way2m 12s
-
(Locked)
The Seven Ways: Service management applications2m 17s
-
(Locked)
The Seven Ways: A service management manifesto5m 52s
-
(Locked)
Enact and enable outcomes8m 26s
-
(Locked)
Enlighten and empower people3m 32s
-
(Locked)
Lower barriers, increase enablers1m 51s
-
(Locked)
Improve moments of truth3m 10s
-
(Locked)
Bringing the first four ways together1m 1s
-
(Locked)
Root out variation and dependency5m 16s
-
(Locked)
Lower transaction costs2m 23s
-
(Locked)
Reflect and act as individuals, teams, and organizations3m 38s
-
(Locked)
Now that we've covered our approach, let's start applying1m 3s
-
-
-
Services and service management2m 19s
-
(Locked)
Service management lifecycle1m 31s
-
(Locked)
Service management terminology1m 14s
-
(Locked)
Service management processes1m 26s
-
(Locked)
Service management functions1m 31s
-
(Locked)
Service management roles1m 23s
-
(Locked)
Service management technology and architecture1m 45s
-
-
-
(Locked)
Services and stakeholders1m 39s
-
(Locked)
Services and business services1m
-
(Locked)
Value perception and stakeholder relations1m 20s
-
(Locked)
Hiding the specifics of costs and risks1m 39s
-
(Locked)
Internal and external services, customers, and users1m 43s
-
(Locked)
Core, enabling, option, and enhancing services1m 5s
-
(Locked)
Service assets1m 5s
-
(Locked)
Service parts1m 24s
-
(Locked)
Service features, qualities, and telemetry1m 37s
-
(Locked)
Service management capabilities1m 30s
-
(Locked)
Service portfolio1m 18s
-
(Locked)
Service catalog1m 12s
-
(Locked)
Utility and warranty = Value1m 19s
-
(Locked)
Variation, dependencies, and service degradation50s
-
(Locked)
SLAs, OLAs, and UCs1m 43s
-
(Locked)
-
-
(Locked)
Why shared terminology is important1m 45s
-
(Locked)
Service management terminology and key principles and models2m 4s
-
(Locked)
Overall and next-level-down understanding1m 31s
-
(Locked)
A hunting we shall go1m 7s
-
(Locked)
Do something with it1m 6s
-
(Locked)
Where does it hurt?1m 2s
-
(Locked)
Key principles and models50s
-
(Locked)
Value creation through services1m 15s
-
(Locked)
People, process, products, and partners1m 58s
-
(Locked)
Five aspects of service design1m 4s
-
(Locked)
CSI approach53s
-
(Locked)
CSFs and KPIs1m 8s
-
(Locked)
Baselines52s
-
(Locked)
Technology, process, and service metrics1m 7s
-
(Locked)