The Best NOC and Service Desk Operations Book Ever!
The Best NOC and Service Desk Operations Book Ever!
The Best NOC and Service Desk Operations Book Ever!
MSP Universitys
Erick Simpson
MCP, SBSC
Contents
What Can You Expect From This Book? .............................. 13
The Difference Between a NOC and a Service Desk ............ 16
Section 1: Infrastructure Design ......................................... 22
SERVICE LOCATION REQUIREMENTS - PROVIDER ............................. 23
At the Providers Location ................................................ 23
Environmental Requirements .......................................... 24
NOC and Service Desk System Requirements .................. 26
NOC and Service Desk Hardware Requirements ............. 27
NOC and Service Desk Operating Systems and Software
Requirements .................................................................. 28
Communication Requirements ....................................... 30
Protocols........................................................................... 31
Security Requirements ..................................................... 32
Connectivity Requirements .............................................. 32
Broadband Requirements ................................................ 33
1
10
12
15
Incident Management
Problem Management
Configuration Management
Change Management
Risk Management
Release Management
Service Level Management
Availability Management
Capacity Management
IT Service Continuity Management
Security Management
Communication Management
16
Incident
Mgmt
Security
Mgmt
Problem
Mgmt
Svc
Continuity
Mgt
Config
Mgmt
NOC/
Service
Desk
Capacity
Mgmt
Change
Mgmt
Avail
Mgmt
Risk Mgmt
Svc Level
Mgmt
Release
Mgmt
19
21
22
Environmental requirements
o NOC/Service Desk
o Data Center
System requirements
o Hardware
o Operating systems and software
o Services
Communication requirements
o Protocols
o Security
Connectivity requirements
o Broadband
o Remote access
Business Continuity
o Backup/DR Plan
o Service Availability
23
Environmental
NOC/Service Desk
Data Center
System
Hardware
OS/Software
Services
Communications
Protocols
Security
Connectivity
Broadband
Remote Access
Business
Continuity
Backup/DR Plan
SVC Availability
Environmental Requirements
NOC/Service Desk
The outsourced service provider or internal service manager will
normally conduct NOC and Service Desk operations from a
centralized location staffed with support personnel. The capacity
planning, design, implementation and staffing of this facility for
the effective delivery of these services require careful
consideration for not only its current service delivery
requirements, but future growth. Therefore, the business-critical
functions and requirements of the facility necessitate the
following:
Physical security
Adequate physical space planning, allowing for future
growth
24
25
Physical Security
26
Specific configuration
Specific WAN/LAN/DMZ Location
Interoperability with other local or remote devices
Hardware redundancy
CPU
RAM
HDD
BIOS
Physical
Connectivity
Connectivity
Method
Protocols and
Ports
Security
Configuration
Location
Interoperability
Redundancy
29
OS Type
Application Type
Configuration
Connectivity
Method
Protocols and
Ports
Security
Interoperability
Availability
Backup/Restore
Communication Requirements
Communication requirements for NOC and Service Desk
service delivery are defined as those data and voice network,
bandwidth and protocol requirements necessary to receive
and aggregate performance data and alerts from managed
locations; as well as deliver remote management and
maintenance to endpoints at these locations. This remote
management and maintenance can occur securely over wide
area data networks, while communications and updates by
30
Security Requirements
Transmission of the aggregated performance data and alerts
generated within disparate end user or client networks from
remote monitoring and management solutions to the
outsourced service providers or the internal service
managers NOC and/or Datacenter is normally accomplished
through secure protocols, and may include:
Connectivity Requirements
In this context, connectivity requirements for NOC and Service
Desk service delivery are defined as those services, devices
and processes that allow the transfer of performance data and
alerts from the remote monitoring and management solution
at the end users or clients location to the outsourced service
providers or the internal service managers NOC and/or
Datacenter, and provide remote access, control and desktop
32
Bridges
Routers
Switches
Gateways
Firewalls
Broadband services
Secure network protocols
Broadband Requirements
In order for successful delivery of NOC and Service Desk
services, fast, reliable broadband carrier service at both the
end users or clients location and the outsourced service
providers or the internal service managers NOC and Service
Desk are required to support both remote monitoring and
management services from disparate end user or client
networks, as well as to provide effective remote access
capabilities for efficient maintenance services.
Remote Access and Control Requirements
The capability to remotely access endpoints in end user or
client networks to share desktops and deliver NOC and Service
Desk services is the cornerstone of a successful remote
management and maintenance deliverable. By delivering
33
34
35
37
Physical security
Scalable, redundant network infrastructure
Redundant environmental controls
Continuous, redundant distributed power
Fire detection and prevention systems
Redundant voice and broadband carrier services
38
Physical Security
Redundant Network
Redundant Environmental Controls
Redundant Power
Fire Prevention/Suppression
Redundant Voice/Broadband
Backup/DR/Business Continuity
Specific configuration
Specific WAN/LAN/DMZ Location
Interoperability with other local or remote devices
Hardware redundancy
CPU
RAM
HDD
BIOS
Physical
Connectivity
Connectivity
Method
Protocols and
Ports
Security
Configuration
Location
Interoperability
Redundancy
42
OS Type
Application
Type
Configuration
Connectivity
Method
Protocols and
Ports
Security
Interoperability
Availability
Backup/Restore
Bridges
Routers
Switches
Gateways
Firewalls
Broadband services
Secure network protocols
45
46
Environmental requirements
o NOC/Service Desk
o Data Center
System requirements
o Hardware
o Operating systems and software
o Services
Communication requirements
o Protocols
o Security
Connectivity requirements
o Broadband
o Remote access
Business Continuity
o Backup/DR Plan
o SVC Availability
47
Environmental
NOC/Service Desk
Data Center
System
Hardware
OS/Software
Services
Communications
Protocols
Security
Connectivity
Broadband
Remote Access
Business
Continuity
Backup/DR Plan
SVC Availability
rd
48
Environmental requirements
o Customer location
System requirements
o Hardware
o Operating systems and software
o Services
Communication requirements
o Protocols
o Security
Connectivity requirements
o Broadband
o Remote access
Environmental
End User or Client
Location
System
Communications
Hardware
OS/Software
Services
Protocols
Security
Connectivity
Broadband
Remote Access
49
Environmental Requirements
Client Location
The outsourced service provider or internal service manager
will normally install remote monitoring and management
agents on individual, dedicated or shared hardware at the end
users or clients location as required by their chosen RMM
(remote monitoring and management) solution. Therefore,
the business-critical functions of these solutions necessitate
the following environmental requirements at these locations:
50
Physical Security
Redundant Power
Redundant Voice/Broadband
Remote Accessibility
Climate Control
Backup/DR/Business Continuity
System Requirements
51
CPU
RAM
HDD
BIOS
Physical
Connectivity
Connectivity
Method
Protocols and
Ports
Security
Configuration
Location
Interoperability
Redundancy
54
OS Type
Application
Type
Configuration
Connectivity
Method
Protocols and
Ports
Security
Interoperability
Availability
Backup/Restore
Communication Requirements
Communication requirements for NOC and Service Desk
service delivery are defined as those network and protocol
requirements necessary to receive and aggregate
performance data and alerts from end user and client
locations, as well as to allow delivery of remote management
and maintenance to endpoints at these locations. This remote
management and maintenance can occur securely over wide
area data networks, while communications and updates from
the outsourced service provider or internal service manager to
55
Security Requirements
Transmission of the aggregated performance data and alerts
generated within disparate end user or client networks from
remote monitoring and management solutions to the
outsourced service providers or the internal service
managers NOC and/or Datacenter is normally accomplished
through secure protocols, and may include:
Connectivity Requirements
In this context, connectivity requirements for NOC and Service
Desk service delivery are defined as those services, devices
and processes that allow the transfer of performance data and
alerts from the remote monitoring and management solution
at the end users or clients location to the outsourced service
providers or the internal service managers NOC and/or
Datacenter, and provide remote access, control and desktop
sharing capabilities to the outsourced service provider or the
internal service manager and include network connections,
equipment and services such as:
Bridges
Routers
Switches
Gateways
Firewalls
Broadband services
Secure network protocols
Broadband Requirements
In order for successful delivery of NOC and Service Desk
services, fast, reliable broadband carrier service at the end
users or clients location is required to support both remote
monitoring and management services from disparate end user
57
58
59
60
63
64
Syslogs
Event Logs
System Uptime
SNMP
Services
Servers
Routers
Switches
Firewalls
VM hosts and guests
IP Phones
Access Points
PCs
Printers
Broadband Services
Email Services
Web Services
SQL Services
Backup Services
67
Antivirus Services
VPNs
Bandwidth
VoIP QOS
WMI
Syslog
SNMP
68
72
73
74
A CRM system
A service request or trouble ticketing component
A project management component
A scheduling & dispatching component
A time tracking component
An expense tracking component
An inventory control component
An asset management component
A configuration & change management component
A service agreement & SLA management component
A knowledge base component
A resource management component
Quoting & invoicing integration with accounting
systems
A sales funnel component
75
Service Desk
NOC
Professional Services
Marketing
Sales
Purchasing
Inventory
Accounting
79
80
82
83
87
88
Scalability
Automatic call distribution (ACD) or customizable call
routing (CCR)
Interactive voice response (IVR)
Call monitoring
Call recording
Call accounting (Reporting)
89
91
Increase
1st Call
Resolution
Shorten
Avg. Call
Times
Improve
Response
Time
Reduce
Blockage
Reduce
Hold Times
Voice
Solution
92
Shrink
Abandon
Rates
93
2.
3.
4.
5.
6.
96
PSA Solution
Documents
Service Request
PSA Solution
Assigns Priority,
Escalation, Queue
PSA Solution
Messages
Affected Parties
Incident
Management
Activity Occurs
PSA Solution
Messages
Affected Parties
PSA Solution
Cancels Alert In
RMM Tool
Consolidated
Reporting And
Analytics Occurs
97
Hardware
Operating Systems
Software Applications
Services
Services
Users
Locations
Vendors
Agreements/SLAs
Users
Applications
Locations
OS
Hardware
Vendors
NOC/SVC
Desk
98
SLAs
NOC Services
The NOC and Its Deliverables
In order to insure high availability of hardware, operating
systems, software applications and services under
management, the outsourced service providers or internal
service managers NOC must continuously monitor their
operating states and implement an alerting and response
process to address incidents when these operating states
deviate from established parameters.
In addition to continuously monitoring and reactively
responding to alerts from managed endpoints and services,
the NOC delivers proactive maintenance services such as
patching and updating operating systems, software
applications and device configurations, and optimizing the
operational states of host devices and systems through
activities such as deletion of temporary files, disk
defragmentation, Active Directory, DNS, DHCP and Event Log
management and pruning.
Remote Monitoring and Management
In order to maintain managed systems per service and
maintenance agreements and their SLAs, the outsourced
service provider or internal service manager must conduct
continuous monitoring of these systems and services. This is
facilitated through the Remote Monitoring and Management
99
Proactive Maintenance
102
Backups
Connectivity
Cloud/Email/Web/SQL/FTP Services
Windows Services/Events
Device Memory Utilization/Performance
Device Processor Utilization/Performance
Device Hard Drive Utilization/Performance
Router/Firewall Logs
104
Antivirus Alerts
Network Security/Unusual Traffic/Attacks
VoIP QOS
VPNs
User Sessions/Authentication
105
SPOC
IMR
SLA
106
108
110
111
113
Reporting
The Value of Reporting
The outsourced service provider or internal service manager
will integrate the Remote Monitoring and Management tools
reporting function with the Voice Communications and
Professional Services Automation solutions to generate rich,
customized consolidated reports for internal and external (or
end user or client-facing) purposes.
The outsourced service provider or internal service manager
will utilize specifically customized reports internally to analyze
key metrics to evaluate NOC and Service Desk performance
and modify internal processes and procedures to improve
outcomes.
Externally, the outsourced service provider or internal service
manager will utilize specifically customized reports with end
users or clients to validate the successful delivery of services
within SLA and according to existing service agreements; as
well as to identify opportunities to improve the availability or
performance of existing devices, operating systems, software
applications and services through activities outside of the
scope of the existing agreement or SLA. These activities may
involve replacement or reconfiguration, which may or may not
be conducted by the outsourced service provider or internal
114
116
117
121
Services
Priorities
Responsibilities
Guarantees
Availability
Serviceability
Performance
Operation
Response
Resolution
Definition of services
Term of agreement
Fees and payment schedule
122
Taxes
Coverage hours
Exclusions
Performance measurement
Incident management process and response time
Limitation of liability
Service requirements
Covered equipment and/or services
123
1.
Term of Agreement
This Agreement between
_______________________________, herein referred to
as Client, and _______________________________,
hereinafter referred to as Service Provider, is effective
upon the date signed, shall remain in force for a period of
three years, and be reviewed annually to address any
necessary adjustments or modifications. Should
adjustments or modifications be required that increase
the monthly fees paid for the services rendered under
this Agreement, these increases will not exceed ______%
of the value of the existing monthly fees due under this
Agreement. The Service Agreement automatically
renews for a subsequent three year term beginning on
the day immediately following the end of the Initial Term,
unless either party gives the other ninety (90) days prior
written notice of its intent not to renew this Agreement.
a) This Agreement may be terminated by the Client
124
II.
III.
2.
3.
Taxes
It is understood that any Federal, State or Local Taxes
applicable shall be added to each invoice for services
or materials rendered under this Agreement. Client
shall pay any such taxes unless a valid exemption
126
Coverage
Remote Helpdesk and Vendor Management of Clients
IT networks will be provided to the Client by Service
Provider through remote means between the hours of
8:00 am 5:00 pm Monday through Friday, excluding
public holidays. Network Monitoring Services will be
provided 24/7/365. All services qualifying under these
conditions, as well as Services that fall outside this
scope will fall under the provisions of Appendix B.
Hardware costs of any kind are not covered under the
terms of this Agreement.
Support and Escalation
Service Provider will respond to Clients Trouble Tickets
under the provisions of Appendix A, and with best effort
after hours or on holidays. Trouble Tickets must be
opened by Clients designated I.T. Contact Person, by
email to our Help Desk, or by phone if email is
unavailable. Each call will be assigned a Trouble Ticket
number for tracking. Our escalation process is detailed
in Appendix A.
Service outside Normal Working Hours
127
Hardware/System Support
128
6.
Excluded Services
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
8.
Miscellaneous
This Agreement shall be governed by the laws of the
State of __________. It constitutes the entire
Agreement between Client and Service Provider for
monitoring/maintenance/service of all equipment
listed in Appendix B. Its terms and conditions shall
prevail should there be any variance with the terms
and conditions of any order submitted by Client.
Service Provider is not responsible for failure to render
services due to circumstances beyond its control
including, but not limited to, acts of God.
9.
Authorized Signature
Service Provider
Date
Authorized Signature
Client
Date
134
135
Support Tiers
136
140
141
142
Appendix B Cont.
143
144
Section 4: Processes
In order for the outsourced service providers or internal
service managers NOC and Service Desks to deliver uniform,
measurable services in adherence to established SLAs; and
provide end users or clients with a consistent, satisfactory
support experience, they need to develop, implement and
hold their staff accountable to effective service delivery
processes and procedures.
In this context, these NOC and Service Desk service delivery
processes are defined as those processes and workflows
which are necessary in order to allow the NOC and Service
Desk the ability to effectively deliver scheduled and
unscheduled services to end users or clients efficiently, and
include:
145
Remote support
Onsite support
147
148
151
1
2
3
4
153
6
7
154
10
10
155
11
12
13
156
12
13
14
15
16
17
160
6
7
8
10
162
163
165
Risk Management
Risk Versus Reward
In this context, Risk Management processes utilized by the
outsourced service providers or internal service managers
NOC and Service Desk embody the identification and
assessment of potential risks during service delivery, and the
strategies utilized to minimize, monitor for and control the
probability or impact of negative outcomes to the end user or
client.
Strategies for managing risk may include:
166
172
Capital equipment
Vehicle expenses
Tools
IT
General office and operation expenses
173
Labor
Marketing
Insurance
Professional fees
Sales
174
Capacity Management
Right-Sizing Infrastructure and Services for Growth
In this context, Capacity Management is comprised of those
processes, procedures and activities that the outsourced
service provider or internal service manager employs to insure
that their service capacity is scalable to support their own
growing client base as well as their end users or clients
growth.
The Capacity Management process insures that NOC and
Service Desk services are scalable to meet internal and
external performance needs cost-effectively.
In order to properly optimally align service deliverable
capabilities to end user or client business needs economically,
the outsourced service provider or internal service manager
must:
175
Application performance
Workload performance
Demand performance
Resource performance
Hardware performance
176
177
178
Availability Management
When Do You Want It?
In this context, Availability Management is comprised of those
processes, procedures and activities that the outsourced
service provider or internal service manager employs to insure
availability of the end users or clients IT and IT-supported
business functions and services. Availability Management
requires continual monitoring, optimizing and management of
critical devices, operating systems, application software and
services, making a properly configured and operating Remote
Monitoring and Management tool a must to deliver services
and insure availability cost-effectively.
The Availability Management process insures the reliability,
availability, serviceability, resilience and security of the end
users or clients IT and IT-supported services and business
functions.
Effective Availability Management is a requirement for the
outsourced service providers or internal service managers
NOC and Service Desk to maintain end user or client SLAs.
179
Security Management
Is Information Safe?
In this context, Security Management is comprised of those
processes, procedures and activities that the outsourced
service provider or internal service manager employs to insure
the confidentiality, integrity and availability of their own
internal, as well as their end users or clients information, or
data. This obviously requires securing much more than simply
the information itself, but also the physical hosts of the
information, the means of accessing the information, the
transport of the information and the personnel authorized to
access the information.
The Security Management process insures the confidentiality,
integrity and availability of information.
A Security Plan establishes the level of security required to
support the outsourced service providers or internal service
managers internal, as well as end user or client-facing SLAs.
Effective Security Management requires the establishment of
a Security Policy which defines:
180
181
Communication Management
Can You Hear Me Now?
In this context, Communication Management is comprised of
those processes, procedures and activities that the outsourced
service provider or internal service manager employs to foster
effective, efficient internal and end user or client-facing
communications.
Effective Communication Management is critical in
maintaining internal efficiencies and evaluating and improving
client satisfaction especially for the Service Desk.
In addition, since communication in all of its varied forms is
such a vital component in the creation and maintenance of a
pleasant work environment and culture; which is reflected in
the outsourced service providers or internal service
managers staffs interaction with end users or clients, it is
beneficial to help them build awareness, strengthen
interpersonal skills and reinforce best practices for
communications through an established Communication
Management process.
Communication Management governs the content, delivery,
timing and means of delivery of all internal and external
channels of communication within and without an
organization.
182
Verbal communications
o Face to face
o Telephonic
o Voicemail
Nonverbal communications
o Facial expressions
o Body language/bearing
o Style of dress
Written communications
o Email
o Instant Message
o Text Message
o Letters
o Faxes
o Reports
o Minutes
o Agendas
o Memos
o White boards
o Pin up/cork boards
o Written Phone messages
183
o Pictures/photos/images
o Website
o Newsletter
Interpersonal communications may be conducted by the
outsourced service providers or internal service managers
NOC and Service Desk staff with another staff member, a
group, or an end user, client or groups of these, and this
interpersonal communication can be delivered through
written, verbal and nonverbal means. Thus, the staff member
must be mindful of the following:
186
Section 5: Clients
In order for the outsourced service providers or internal
service managers NOC and Service Desks to deliver uniform,
measurable services in adherence to established SLAs; and
provide end users or clients with a consistent, satisfactory
support experience, they need to develop, implement and
hold their staff accountable to effective qualification, onboarding and ongoing service delivery and customer
satisfaction processes and procedures.
187
188
192
193
194
Type
CPU
RAM
HDD
BIOS
Physical
Connectivity
Connectivity
Method
Protocols and
Ports
Physical
Security
Access Rights
Configuration
Location
Interoperability
Redundancy
196
OS Type
Application
Type
Configuration
Connectivity
Method
Protocols and
Ports
Security
Interoperability
Availability
Backup/Restore
Services
In order to achieve standardization across infrastructure
services, the outsourced service provider or internal service
manager may consider the following and establish specific
baseline requirements based upon the role of these services in
supporting the infrastructure:
Specific configuration
Service availability and redundancy
Support/SLA
Communication and status reporting
Security methods
Interoperability and ability to communicate with other
local or remote systems, services, functions
Service availability and redundancy
Service backup, restore and business continuity
processes
Service Type
Provider
Configuration
Availability /
Redundancy
Support/SLA
Security
Interoperability
Availability
Backup/Restore
200
On-Boarding Clients
The Importance of an Effective On-Boarding Process
Once the decision has been made to begin service delivery for
a new client, the outsourced service provider or internal
service manager must execute an effective, efficient onboarding process in order to meet client and end user
expectations and facilitate future service.
A poorly designed and executed on-boarding process will
quickly erode client and end user confidence and satisfaction
and increase service delivery difficulty and cost for the
outsourced service provider or internal service manager. No
matter how you slice it, this is not the way to begin a new
client relationship.
A successful on-boarding process begins before the decision is
made to deliver services to the client.
Read that again. Now think about this it is not possible to
on-board a client successfully if the outsourced service
provider or internal service manager does not collect the
required data in order to set up the clients account and
configure the Remote Monitoring and Management tool,
Professional Services Automation solution, billing and
communications systems to support them.
201
202
Service Desk response and incident managementspecific processes (issue identification, documentation,
prioritization, assignment, remediation, escalation,
completion, QA, closure, communication, etc.)
Support tiers
Service Level Agreement
Customer Service
Reporting
Service Go-Live
After the outsourced service provider or internal service
managers NOC and Service Desk has completed their clientspecific training and the client and their end users have
received their support training, a service turn-up, or go-live
date can be established. This is the date that all systems,
processes, services, NOC and Service Desk staff and the client
and their infrastructure and end users will be designated as
ready to participate in NOC and Service Desk maintenance and
support services.
The first thirty days after go-live with a new client will be the
most critical for the outsourced service provider or internal
service manager and their staff, as this is the time when the
end users will be the most critical, and need to be won over by
the new support relationship and its service delivery
processes. If there are too many hiccups during this sensitive
211
212
Delivering Service
Day to Day Service Delivery
Although many of the roles, processes, procedures, activities
and responsibilities of an outsourced service providers or
internal service managers NOC and Service Desk and their
respective personnel are more alike than they are dissimilar,
once again, the differentiator between the two is the focus of
their responsibilities.
Although the NOCs duties and responsibilities are oriented
towards proactively managing and maintaining efficient
operating states of hardware devices, software operating
systems and applications and insuring the continuity of
services; and the Service Desks and its staffs duties and
responsibilities are focused on managing end user incidents
and problems, they both respond to incidents and problems
that impact these by following established service delivery
processes.
Based on best practices for proactive and reactive
maintenance and service delivery, at a high level, the general
framework governing these processes is shared by both the
NOC and Service Desk, with differences surfacing based upon
specific tasks. The following sections will reflect this similarity
at a high level.
213
or say the right thing in the wrong way, or say the right thing,
but in doing so contradict something that the client or end
user had been told previously by someone else. In any of
these scenarios, a top-of-mind awareness and fear of
accidentally doing any of these things during conversations
with clients or end users is required by all Service Desk staff.
Here are some things to keep in mind:
221
Service Desk staff: Hi, Mary this is Bob from the Service
Desk. Im calling you to follow up on the service request you
opened regarding X is this a good time for me to
troubleshoot that with you?
Mary: Hi Bob, yes this is a good time.
Service Desk staff: Great, my understanding from reading the
service request notes is that . Is that correct?
Mary: Yes Bob thats what is happening.
Service Desk staff: Okay, do you mind if I start a remote
desktop sharing session with you, so I can begin
troubleshooting?
Mary: Sure Bob, go right ahead.
Service Desk staff: Okay, Mary Im going to put you on mute
while the session initiates, and pick back up when Im
connected. Will that be okay?
Mary: No problem, Bob.
Service Desk staff places end user on mute while session is
initiated
Service Desk staff: Okay, Mary Im in. Would it be ok if I take
a look at a few things in order to help narrow down the cause
222
223
Mary: Sure, Bob. Thank you for your help. What was the
problem? What did you do?
Service Desk staff: Youre welcome, Mary it was my
pleasure. Until Im 100% confident that the issue is resolved, I
prefer to keep from stating with absolute certainty what the
cause was and the fix you know, I could be wrong! (jokingly)
How about we wait for the QA process so I can be sure, and if
youre still interested, well be happy to share the technical
details with you. Is that ok?
Mary: Oh sure, Bob, its really not that important.
Service Desk staff: Ok then, Mary, Ill document our support
session in the notes here and place this request in our QA
queue for 24 hours. If the issue should happen to crop up
again, please let us know, ok?
Mary: Sure will. Thanks again.
Service Desk staff: My pleasure. Have a great day.
Can you appreciate how smoothly this support session went?
Ill bet you were wondering just how in the world a Service
Desk staff could effectively deliver a support session by
blanking the users desktop (of course this wont be possible in
all cases), placing the end user on mute for most of it, and
224
then not sharing what the cause of the issue was, or even
better what they did to resolve it.
Now, if the issue does recur, and a different Service Desk staff
is assigned to work on it, there is no potential for the end user
to complicate the session with misheard or misinterpreted
data from the first support session. And because the service
request wasnt closed, but instead placed in a QA status, with
the end users expectations set appropriately, the Service
Desk staff has avoided the you didnt fix it the first time or
this is the second (or third) time Ive opened a request for the
same thing perception, as the issue was never considered
resolved and the request was never closed.
225
Client Satisfaction
Measuring Client Satisfaction and Improving Retention
If the outsourced service provider or internal service manager
does not develop and execute a consistent, effective process
to measure client and end user satisfaction in order to
institute a continual client satisfaction improvement process,
they will be doing their clients, end users and NOC and Service
Desk staff a disservice.
The only way to realize improvement in any endeavor is to
measure performance. Just as important as it is to measure
performance of the NOC and Service Desk against SLA and
other key performance metrics in order to establish a baseline
and work towards improvement, it is even more important to
measure client satisfaction.
It does the outsourced service provider or internal service
manager absolutely no good whatsoever to believe they have
the best processes and procedures for service delivery in
place, but have no way to measure their clients or end users
satisfaction, and risk losing them for unknown reasons.
The best way to gauge a decision makers satisfaction is face
to face during regular strategic meetings. It is important to set
aside time specifically for measuring the clients satisfaction,
preferably at the beginning of these meetings. The outsourced
service provider or internal service manager will want to know
226
229
230
231
232
238
Resources
Careerbuilder.com
www.careerbuilder.com
Dice.com
www.dice.com
239
Hotjobs.com
www.hotjobs.com
Monster.com
www.monster.com
240
241
profiling, but we have used DISC profiles to help in teambuilding efforts. If you havent read Jim Collins excellent book
Good to Great, do yourself a favor and pick up a copy. One
of the key concepts in Good to Great is that of not only
getting the right people on the bus, but getting the right
people in the right seats on the bus. DISC behavioral profiles
help us achieve both of these objectives.
Based upon answering a series of twenty-four questions, each
with the directive to choose what a candidate is most like
and least like, the DISC profile will generate a voluminous
report describing the subjects behavior with incredible
accuracy. Here is a representative example of the types of
questions a subject is asked to answer in a DISC profile:
Each question has two answers choose one answer that
indicates which you are Most Like, and one answer that
indicates which you are Least Like. Each question requires two
choices:
242
Most Like
Least Like
Gentle, kindly
Persuasive, convincing
x
x
Cooperative, agreeable
Stubborn, unyielding
Sweet, pleasing
243
Charming, delightful
It seems almost unbelievable that merely completing twentyfour questions like this can create a comprehensive behavioral
profile that we have come to rely on in each and every one of
our hiring decisions. And Ive got to admit that when we have
gone ahead and made a hiring decision in spite of some red
flags uncovered by a DISC profile, weve always come to regret
it.
Heres a sample portion of a fictitious DISC profile:
Elizabeth prefers being a team player, and wants each player
to contribute along with her. Many people see her as a selfstarter dedicated to achieving results. She can be blunt and
critical of people who do not meet her standards. She may
have difficulty dealing with others who are slower in thought
and action. Elizabeth has the ability to question people's basic
assumptions about things. She prides herself on her creativity,
incisiveness and cleverness. She can be incisive, analytical and
argumentative at times. She is aggressive and confident. She
tends to have a "short fuse" and can display anger or
displeasure when she feels that people are taking advantage
of her. Elizabeth is forward-looking, aggressive and
competitive. His vision for results is one of her positive
244
Thinks big
Forward-looking and future-oriented
Presents the facts without emotion
Places high value on time
Usually makes decisions with the bottom line in mind
246
Innovative
Always looking for logical solutions
Initiates activity
Challenge-oriented
Ideal environment:
This section identifies the ideal work environment based on
Elizabeth's basic style. People with limited flexibility will find
themselves uncomfortable working in any job not described in
this section. People with flexibility use intelligence to modify
their behavior and can be comfortable in many environments.
Use this section to identify specific duties and responsibilities
that Elizabeth enjoys and also those that create frustration.
Perceptions:
247
Pioneering
Assertive
Competitive
Confident
Positive
Winner
Others perception:
Under moderate pressure, tension, stress or fatigue, others
may see her as being:
Demanding
Nervy
Egotistical
Aggressive
248
249
Adapted style:
Elizabeth sees her present work environment requiring her to
exhibit the behavior listed on this page. If the following
statements DO NOT sound job related, explore the reasons
why she is adapting this behavior.
250
Keys to motivating:
Elizabeth wants:
251
Keys to managing:
Elizabeth needs:
I hope by now you can see how extremely valuable this tool is,
and why we choose to include it as a requirement during our
hiring process.
So how exactly do we use the DISC profile? Well, we will
review all of the resumes that come in for a particular job
posting, and then determine who our top candidates are.
After this, we will conduct a quick phone interview with each
candidate, and the ones that make it to the next cut will be
emailed a link to take our DISC behavioral profile online. We
then review the resultant report, and decide who to call in for
in-person interviews.
For technical staff candidates, in addition to the standard DISC
behavioral profile, we will also have them take a specialized
version of the DISC profile, called the Personal Talent Skills
254
Internal:
256
Name: Elizabeth
World View
This is how Elizabeth sees the world around her. This view
measures her clarity and understanding of people, tasks and
systems. It could also be looked at in terms of feeling, doing
and thinking from an external standpoint. The statements
below are based primarily on the 3 dimensions on the left side
of the dimensional balance page and are in a random order.
Self View
This is how Elizabeth sees herself. This view measures her
clarity and understanding of herself, her roles in life and her
direction for the future. The internal dimensions are a
reflection of her from both personal and professional
viewpoints. The statements below are based primarily on the
3 dimensions on the right side of the dimensional balance
page and are in a random order.
259
260
261
262
Getting Results
263
264
267
268
Networking:
http://www.petri.co.il/mcse_system_administrator_ne
tworking_interview_questions.htm
Active Directory:
http://www.petri.co.il/mcse_system_administrator_ac
tive_directory_interview_questions.htm
Microsoft Exchange:
http://www.petri.co.il/mcse-system-administratorexchange-interview-questions.htm
PC Support:
http://www.petri.co.il/mcse-system-administrator-pctechnician-interview-questions.htm
272
shows is, what they do for recreation, and ask them about
their immediate family, as well as their parents and their
backgrounds; to get an idea of their stability and support
system, and attempt to uncover any stressors that may affect
performance on the job. This is all carried out in a friendly,
conversational, get to know me manner, where I will share
personal information with the candidate myself, a la Hannibal
Lecter in Silence of the Lambs quid pro quo, Clarisse.
If the candidate stands a good chance of joining the team, its
important to begin building a relationship early on. If we really
want to win over a candidate, we need to show them the
human side of our organization, as well as the career
opportunity. Assuming the second interview goes well, we
now have a green light to formalize an offer to the successful
candidate. During the first interview, items such as
compensation and duties and responsibilities would naturally
have been discussed, as well as a projected start date of
employment, should the candidate be awarded the position.
Its now time to formalize our offer to the successful
candidate by means of an offer letter.
278
279
280
283
Date: _____________
By: __________________________
Employee
Once the employee signs the Offer Letter, they will have
formally agreed to the terms and conditions of our
employment as described. An EXHIBIT A would follow this
agreement, stipulating the employees job description, duties
and compensation. Lets review an example EXHIBIT A:
Exhibit A
EMPLOYMENT AGREEMENT
This Employment Agreement (this "Agreement") is made
effective by and between Company name , of full address to
include zip code(employees name) ("Employee"), of
(employees address).
288
- copyrights
- client lists
- prices
- costs
- discounts
- business affairs
- future plans
- marketing plans and methods
- communications
- meetings
- conversations
- training
- emails
- faxes
- documents
- wage and compensation information
291
- disciplinary actions
- policies
and other vital information items (collectively, "Information")
which are valuable, special and unique assets of Company
name. Employee agrees that Employee will not at any time
or in any manner, either directly or indirectly, divulge,
disclose, or communicate any Information to any third party
without the prior written consent of Company name.
Employee will protect the Information and treat it as strictly
confidential. A violation by Employee of this paragraph shall
be a material violation of this Agreement and will justify legal
and/or equitable relief.
6. UNAUTHORIZED DISCLOSURE OF INFORMATION. If it
appears that Employee has disclosed (or has threatened to
disclose) Information in violation of this Agreement,
Company name shall be entitled to an injunction to restrain
Employee from disclosing, in whole or in part, such
Information, or from providing any services to any party to
whom such Information has been disclosed or may be
disclosed. Company name shall not be prohibited by this
provision from pursuing other remedies, including a claim for
losses and damages.
292
294
Employee:
(Employee Name)
(Employee Street Address)
(Employee City, State ZIP)
Such addresses may be changed from time to time by either
party by providing written notice in the manner set forth
above.
15. ENTIRE AGREEMENT. This Agreement contains the entire
agreement of the parties and there are no other promises or
conditions in any other agreement whether oral or written.
This Agreement supersedes any prior written or oral
agreements between the parties.
16. AMENDMENT. This Agreement may be modified or
amended, if the amendment is made in writing and is signed
by both parties.
17. SEVERABILITY. If any provisions of this Agreement shall be
held to be invalid or unenforceable for any reason, the
remaining provisions shall continue to be valid and
enforceable. If a court finds that any provision of this
296
EMPLOYER:
EMPLOYEE:
By:
_______________________Date: ________________
298
Vehicles
PCs
Laptops
Wireless PC cards
Cell phones/Smart phones/PDAs
Pagers
Security tokens
Key cards/credentials
Test equipment
Inventory
299
Equipment Loan
Statement of Understanding
Company
name:_________________________________________________
_
Description
__________________________________________________
Model Number, Serial Number
Compensation Plans
Throughout the years weve had the opportunity to work with
our partners, one of the topics that seem to be the most
challenging for them is creating an equitable compensation
plan for technical staff. Now, as IT service providers, our
perception of an equitable compensation plan and our
technical staffs perception of an equitable compensation plan
may not always match. A generally accepted industry statistic
regarding compensation is that a technician should generate
two and a half times their W-2 compensation in billable labor
time. This means that a technical person earning $60,000 a
year on their W-2 should be generating $150,000 in billable
labor time per year.
Billable time based on W-2 earnings
W-2 Earnings
Billable Labor
$30,000
$40,000
$50,000
$60,000
$70,000
$80,000
$90,000
$100,000
$75,000
$100,000
$125,000
$150,000
$175,000
$200,000
$225,000
$250,000
302
Median Amount
% Of Total
$44,900
$906
$3,504
$52,608
$1,135
$4,111
$1,741
$458
$6,103
$2,290
$5,638
$65,540
$2,042
$537
$6,103
$2,687
$6,615
$75,839
2.7%
0.7%
9.3%
3.5%
8.6%
69.4%
1.5%
5.4%
- 2.7%
- 0.7%
- 8.0%
- 3.5%
- 8.7%
100%
Source: salary.com
Utilization requirements
Process and policy compliance
Attainment of competencies
Adherence to SLAs
Customer service
Median Amount
% Of Total
$34,910
$475
$2,707
$42,063
$764
$3,276
68.2%
1.2%
5.3%
$1,345
$354
$6,103
$1,769
$4,355
$52,017
$1,627
$428
$6,103
$2,141
$5,271
$61,674
2.6% 2.6%
0.7% 0.7%
11.7% - 9.9%
3.4% 3.5%
8.4% 8.5%
100%
Source: salary.com
305
Median Amount
% Of Total
Base Salary
Bonuses
Social Security
401k/403b
Disability
Healthcare
Pension
Time Off
Total
$84,146
$6,923
$6,967
$3,461
$911
$6,103
$4,553
$11,208
$124,272
67.7%
5.6%
5.6%
2.8%
0.7%
4.9%
3.7%
9.0%
100%
Source: salary.com
306
NOC Manager
Benefit
Median Amount
% Of Total
Base Salary
Bonuses
Social Security
401k/403b
Disability
Healthcare
Pension
Time Off
Total
$95,508
$4,250
$7,708
$3,849
$1,008
$6,103
$5,038
$12,401
$136,844
70.5%
3.1%
5.6%
2.8%
0.7%
4.5%
3.7%
9.1%
100%
Source: salary.com
307
309
310
All others
312
Role-Specific Training
NOC staff
In this context, the NOC staff participates in the outsourced
service providers or internal service managers incident
313
o Release Management
o Service Level Management
o Availability Management
o Capacity Management
o Service Continuity Management
o Security Management
o Communication Management
Remote Monitoring and Management
o Installing agents
o Configuring thresholds
o Configuring alerts
o Developing scripts
o Incident Management
o Problem Management
o Configuration Management
o Change Management
o Risk Management
o Release Management
o Service level management
o Availability Management
o Capacity Management
o Service Continuity Management
o Security Management
o Communications Management
Day to day service delivery
o Receiving all incident notifications and service
requests
o Recording all incidents and service requests
o Classifying all incidents and service requests
315
316
Service Dispatchers
In this context, the service dispatcher participates in the
outsourced service providers or internal service managers
incident management and resolution process, and assigns
resources to and schedules all services. The service dispatcher
may also be included in the providers escalation process and
be alerted by their PSA solution should service requests
become in danger of falling out of SLA.
318
319
NOC Managers
In this context, the NOC manager is ultimately responsible for
maintaining the outsourced service providers or internal
service managers NOC staffing levels, training and
certification requirements, incident management and
resolution processes and client satisfaction by strict SLA
management, among other responsibilities. NOC managers
will utilize the providers chosen software management tools,
processes and procedures to manage service delivery.
In addition to the general training requirements for all
technical staff previously mentioned, at a minimum, all Service
Desk managers will need specific training in these areas:
o Incident Management
o Problem Management
o Configuration Management
o Change Management
o Risk Management
o Release Management
o Service Level Management
o Availability Management
o Capacity Management
o Service Continuity Management
o Security Management
o Communication Management
Remote Monitoring and Management
o Installing agents
o Configuring thresholds
o Configuring alerts
o Developing scripts
o Incident Management
o Problem Management
o Configuration Management
o Change Management
o Risk Management
o Release Management
o Service level management
o Availability Management
o Capacity Management
o Service Continuity Management
o Security Management
o Communications Management
321
324
325
Financial performance
NOC performance
Service Desk performance
326
327
While the relay team finishes the race with a total time of two
minutes and thirty seconds, because the individual split time
for each runner is not being measured, it is impossible to
determine how fast or slow each runner ran their portion of
the race. This prevents the coach from knowing how to
improve each individual runners performance.
The same holds true with outsourced service providers or
internal service managers that cannot determine the
performance of their individual services in terms of cost,
revenue and net profit. The first step in gaining visibility into
these areas is to separate the individual revenue streams,
their costs and gross margins. Only after this has been done
can more meaningful analysis begin.
When evaluating financial performance, special attention
should be paid to the differential between the cost of goods
sold (COGS) and gross margin (GM) for each product or service
sold or delivered; along with their individual contribution to
gross revenue, to determine performance and profitability. In
addition, a careful review of sales, general & administrative
expenses (SG&A), will help identify opportunities to reduce
costs in these areas.
Once the outsourced service providers or internal service
managers financial chart of accounts has been normalized in
this fashion, they can develop strategies to continually
328
329
330
333
334
339
340
What to Keep
When outsourcing components of the NOC and Service Desk
and transferring the role of the single point of contact to a 3rdparty provider, the outsourced service provider or internal
service manager would be well advised to monitor and
manage the Professional Services Automation solution to
insure all service requests are prioritized, assigned and
escalated by the 3rd-party provider in adherence with SLAs.
343
Integration
The more tightly integrated the 3rd-party NOC and Service
Desk providers systems and solutions are with the outsourced
344
346
347
348
349
350
_______________________________________________
_______________________________________________
_______________________________________________
351
352
MX Record(s)
A Record(s)
Other
Misc
ISP Info
ISP
Internet type ( DSL/T-1)
Bandwidth
Dynamic or Static
Usable IP Range
Subnet
Gateway
ISP Tech Support Phone Number
ISP Tech Support E-mail
User Account
Password
Misc
353
354
Domain name
Server LAN IP
Servers OS
Servers Role
Hard Disk Size
Number of hard drives
Fault Tolerance
FireWall
Hardware/Software
Make/ Model
LAN IP Address
WAN IP Address
User Account
Password
Remote Management (Enabled/Disabled)
Ping ( on /off)
VPN(s)
355
Open Ports
NATing Outside/Inside
LAN info
LAN Subnet
Servers IP
Gateway
Anti-Spam
Anti-Spam Solution
Version
User Account
Password
Backup
Backup Software and Version
356
Backup Schedule
Backup Device (Type & Model)
Number of back up tapes
Remote Backup/Vendor Name
User Account
Password
AntiVirus/ Anti-Spyware
Virus Protection Software
Version
User Account
Password
Spy Aware Protection Software
Version
User Account
Password
357
User Accounts
User Name
Password
358
Workstation Inventory
Computer
name
User
CPU
359
Memory
Hard drive
Network Inventory
Device Name
360
IP Address
Share Name
Physical Location
Point of Sale
Software or Hardware
Vendor
Version
Compatibility
361
IP address
362
10.
Term of Agreement
11.
I.
II.
III.
Taxes
It is understood that any Federal, State or Local Taxes
applicable shall be added to each invoice for services
or materials rendered under this Agreement. Client
shall pay any such taxes unless a valid exemption
certificate is furnished to Service Provider for the state
of use.
14.
Coverage
Remote Helpdesk and Vendor Management of Clients
IT networks will be provided to the Client by Service
Provider through remote means between the hours of
8:00 am 5:00 pm Monday through Friday, excluding
public holidays. Network Monitoring Services will be
provided 24/7/365. All services qualifying under these
365
Limitation of Liability
In no event shall Service Provider be held liable for
indirect, special, incidental or consequential damages
arising out of service provided hereunder, including
but not limited to loss of profits or revenue, loss of use
of equipment, lost data, costs of substitute equipment,
or other costs.
15.
Hardware/System Support
Service Provider shall provide support of all hardware
and systems specified in Appendix B, provided that all
Hardware is covered under a currently active Vendor
Support Contract; or replaceable parts be readily
available, and all Software be Genuine, Currently
Licensed and Vendor-Supported. Should any hardware or
systems fail to meet these provisions, they will be
excluded from this Service Agreement. Should 3rd Party
Vendor Support Charges be required in order to resolve
any issues, these will be passed on to the Client after first
receiving the Clients authorization to incur them.
367
Current,
Licensed
Antivirus
368
Excluded Services
15)
16)
17)
18)
19)
20)
18.
Miscellaneous
This Agreement shall be governed by the laws of the
State of __________. It constitutes the entire
Agreement between Client and Service Provider for
monitoring/maintenance/service of all equipment
listed in Appendix B. Its terms and conditions shall
371
19.
Accepted by:
Authorized Signature
Service Provider
372
Date
Authorized Signature
Client
373
Date
374
Support Tiers
375
379
380
381
382
manage all of your Vendors, and allow you the ability to focus
on running your business.
You will be contacted shortly by a Customer Service
Representative who will gather the information we will need
in order to begin providing this valuable Service to you, and to
schedule a visit from our Technical Team so that we can begin
configuring your Network for Managed Services.
Thank you again for allowing us the opportunity to earn your
business. In a short time, Im sure youll agree that youre
adding tremendous value to your Organization through our
Managed Services.
Sincerely,
385
386
387
389
392
394
Troubleshooting network, equipment and servicerelated problems with remote control technologies
Analyzing remote monitoring reports to identify
capacity and performance issues and remediate them
Accurate documentation of all activities conducted
The ability to manage, maintain, troubleshoot and
support our users networks, equipment, software and
services
The ability to learn quickly and adapt to changing
requirements
399
403
404
407
408
409
6.
7.
8.
9.
10.
11.
12.
411
412
Additional Questions*
415
Scenario Questions*
417