Service Manager: Service Request Fulfillment

Service Request Fulfillment and Incident Requests are similar in Service Manager. You may actually be wondering what the difference is between the two. The ITIL and MOM frameworks basically define an incident as a service interruption to an IT system. A service request is a request for service/access to an IT system. This can be requesting access to a system, or requesting a new system to do a task.

Service Requests also have an approval method. This allows for several people or groups to be involved in the process. This can be especially useful for a request that may involve a process where multiple things are done. The system has the ability to lay these steps out and ensure that they are done in the correct order.

Another way service requests are beneficial is that they can be tied to Orchestrator Runbooks. This means that after the service request has been approved, you can have Orchestrator go ahead and do whatever process is needed to fulfill the request. This allows for automation in your environment, freeing up valuable time for your IT staff.

Service Request Template

I would begin service requests with a dedicated template to every service (or like services). These templates will allow you to customize the process for your different services. Putting in the time now to define these different workflows can make automation possible later.

To create your workflow, go the Activities tab of your service request template. Click the “+” button, and select the appropriate activity template. You have five options there. The “Default Dependent Activity” is an activity that the service request relies on to continue. The service request will not continue until this activity is completed. This activity can be automated. The “Default Manual Activity” is the same as the dependent activity, but has to manual. It cannot be automated. The “Default Parallel Activity” is an activity that can occur at the same time as the other activities. This can be helpful if three people of the same approval level need to approve the service request, but in no particular order. The “Default Sequential Activity” is the same as the parallel activity, but the approvals must be done in a set order (such as a manager then director approval).

The “Default Review Activity” is the primary activity. This is the actual approval item. This is why it is important to have different templates for all services. Here is where you specify the actual users that must approve a request.

In the “Approval Condition” box, you can specify whether there has to be complete approval, or a percentage of those on the approval list. You also specify that the activity is automatically approved. Automatic approval can be used if it is a service that everyone gets access to, but you still need a record of the request. Simply fill this out for your organization’s requirements.

Service Offering

Now that we have the template set up, we need to create a service offering that can be published to our customer web portal and the console. Go to the “Service Catalog” option under the Library node of your console. Select the “Request Offerings” tab and “Create new request offering” from the right column. Select the template we created. Create your user prompts. I am creating a service request for network storage access, so I have a field for the requesting user and the directory.

There are a few advanced options you can do here, such as creating a box for the user field that will list all of the users in your environment. That is outside the scope of this article, so I will not go over it here.

For the “Map Prompts” options, be sure to map these fields to existing, default Service Manager fields. This is especially important if you want to do any automation with Orchestrator, as it will not pull custom fields. For my example, I am mapping the username to the title field and the directory to the description field.

Using these two fields will transfer nicely to Orchestrator for automation. Next, follow the remainder of the wizard and publish the offering. Now your users can submit service requests for your services.

Summary

This is a very general article about service requests. Hopefully it can help you to get started with using this feature of Service Manager. It is important to understand the difference between an incident and a service request. Remember that an incident is basically a disruption of a service, while a service request is granting access to existing service or a new service (or system). From a conceptual level, a service request is more like a change request then an incident. It provides a built-in workflow method for you to define and use.

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 020
Cyber Security

WME Security Briefing 26 July 2024

Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware Overview A suspected pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with advanced Android spyware. The operation is associated with the activity cluster codenamed OilAlpha. It

Read More »
WME Cybersecurity Briefings No. 019
Cyber Security

WME Security Briefing 23 July 2024

Samba File Shares Targeted by DarkGate Malware in Recent Cyber Offensive Overview Recent investigations by Palo Alto Networks uncover a brief but significant cyberattack campaign utilizing DarkGate malware. This malicious software exploited Samba file shares to

Read More »
WME Cybersecurity Briefings No. 018
Cyber Security

WME Security Briefing 15 July 2024

OVHcloud Mitigates Record-Breaking 840 Million PPS DDoS Attack Overview In April 2024, OVHcloud, a top French cloud computing firm, successfully stopped a massive DDoS attack. The attack hit a record-breaking rate of 840 million packets per second

Read More »
E-Commerce Security - Solutions for Online Retailers
Azure

E-commerce Security – Solutions for Online Retailers

Today’s hyper-charged e-commerce landscape demands top-notch cybersecurity measures. Cybersecurity for this bustling sector isn’t just about ticking a technical box; it’s the cornerstone of building trust. As businesses and consumers flock to the online space, the

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=