12.07.2015 Views

The Best NOC and Service Desk Operations BOOK EVER! - N-able ...

The Best NOC and Service Desk Operations BOOK EVER! - N-able ...

The Best NOC and Service Desk Operations BOOK EVER! - N-able ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Series<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong><strong>BOOK</strong> <strong>EVER</strong>!For Managed <strong>Service</strong>s…MSP University’sErick SimpsonMCP, SBSC


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsContentsWhat Can You Expect From This Book? .............................. 13<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong> ............ 16Section 1: Infrastructure Design ......................................... 22SERVICE LOCATION REQUIREMENTS - PROVIDER ............................. 23At the Provider’s Location ................................................ 23Environmental Requirements .......................................... 24<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> System Requirements .................. 26<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Hardware Requirements ............. 27<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Operating Systems <strong>and</strong> SoftwareRequirements .................................................................. 28Communication Requirements ....................................... 30Protocols........................................................................... 31Security Requirements ..................................................... 32Connectivity Requirements .............................................. 32Broadb<strong>and</strong> Requirements ................................................ 331


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsProactive Maintenance .................................................. 102Reactive Response <strong>and</strong> Incident Management .............. 104SERVICE DESK SERVICES ........................................................... 106<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> Its Deliver<strong>able</strong>s ............................ 106VENDOR MANAGEMENT SERVICES ............................................. 111<strong>The</strong> Value of Vendor Management ................................ 111REPORTING ............................................................................ 114<strong>The</strong> Value of Reporting ................................................... 114WHAT SHOULD A <strong>NOC</strong> AND SERVICE DESK SUPPORT? ................... 117Support Considerations .................................................. 117SERVICE AGREEMENTS AND SLAS ............................................... 122<strong>Service</strong> Agreement Considerations ................................ 122Section 4: Processes ......................................................... 145INCIDENT AND PROBLEM MANAGEMENT ..................................... 148<strong>The</strong> Difference Between Incident Management <strong>and</strong>Problem Management ................................................... 148CONFIGURATION, CHANGE AND RELEASE MANAGEMENT ............... 1625


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of Contents<strong>The</strong> Differences Between Configuration, Change <strong>and</strong>Release Management..................................................... 162RISK MANAGEMENT ................................................................ 166Risk Versus Reward ........................................................ 166SERVICE LEVEL MANAGEMENT .................................................. 172Delivering <strong>Service</strong>s to Support SLAs ............................... 172SERVICE FINANCIAL MANAGEMENT ............................................ 173Helping End Users <strong>and</strong> Clients Afford Technology<strong>Service</strong>s.. ......................................................................... 173CAPACITY MANAGEMENT ......................................................... 175Right-Sizing Infrastructure <strong>and</strong> <strong>Service</strong>s for Growth ..... 175SERVICE CONTINUITY MANAGEMENT .......................................... 177Recovery from <strong>Service</strong> Interruption ............................... 177AVAILABILITY MANAGEMENT .................................................... 179When Do You Want It? ................................................... 179SECURITY MANAGEMENT ......................................................... 180Is Information Safe? ....................................................... 1806


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsCOMMUNICATION MANAGEMENT ............................................. 182Can You Hear Me Now? ................................................. 182Section 5: Clients .............................................................. 187CLIENT QUALIFICATIONS FOR SERVICE ......................................... 188Setting Minimum Client Qualifications for <strong>Service</strong> ........ 188INFRASTRUCTURE QUALIFICATIONS FOR SERVICE ........................... 193Setting Minimum Infrastructure Qualifications for<strong>Service</strong>…. ........................................................................ 193ON-BOARDING CLIENTS ........................................................... 201<strong>The</strong> Importance of an Effective On-Boarding Process ... 201<strong>The</strong> Business Needs Analysis .......................................... 202<strong>The</strong> Technology Assessment .......................................... 203Required Infrastructure Modifications, Updates <strong>and</strong>Upgrades ........................................................................ 203<strong>The</strong> Provisioning Process ................................................ 204<strong>The</strong> Training Process ...................................................... 209<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Client Support Training .............. 2107


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsClient <strong>and</strong> End User Support Training ............................ 210<strong>Service</strong> Go-Live ............................................................... 211DELIVERING SERVICE................................................................ 213Day to Day <strong>Service</strong> Delivery ........................................... 213<strong>The</strong> <strong>NOC</strong> Staff’s Daily Duties .......................................... 214<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> Staff’s Daily Duties ............................. 216Interacting with Clients <strong>and</strong> End Users .......................... 219What To Say, What Not To Say, <strong>and</strong> How Not To Say It 219CLIENT SATISFACTION .............................................................. 226Measuring Client Satisfaction <strong>and</strong> Improving Retention 226Section 6 – Hiring <strong>and</strong> Training Technical Staff .................. 231WRITING EFFECTIVE EMPLOYMENT ADS FOR TECHNICAL STAFF ........ 232USING DISC BEHAVIORAL PROFILES BEFORE INTERVIEWING CANDIDATES................................................................................………..241THE INTERVIEW PROCESS FOR HIRING TECHNICAL STAFF................. 264THE OFFER LETTER .................................................................. 279THE EMPLOYMENT AGREEMENT ................................................ 2888


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsTHE EQUIPMENT LOAN AGREEMENT ........................................... 299COMPENSATION PLANS ............................................................ 302Help <strong>Desk</strong> Support Jr.-Sr. (<strong>Service</strong> <strong>Desk</strong> Staff)................ 303<strong>Service</strong> Dispatcher Jr.-Sr. ................................................ 305<strong>Service</strong> <strong>Desk</strong> Manager .................................................... 306<strong>NOC</strong> Manager ................................................................. 307TRAINING TECHNICAL STAFF ...................................................... 310Role-Specific Training ..................................................... 313<strong>NOC</strong> staff ........................................................................ 313<strong>Service</strong> <strong>Desk</strong> staff ........................................................... 316<strong>Service</strong> Dispatchers ........................................................ 318<strong>NOC</strong> Managers ............................................................... 320<strong>Service</strong> <strong>Desk</strong> Managers .................................................. 322Section 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Management by theNumbers .......................................................................... 325MEASURING FINANCIAL PERFORMANCE ...................................... 327MEASURING <strong>NOC</strong> PERFORMANCE ............................................. 3309


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsMEASURING SERVICE DESK PERFORMANCE .................................. 334Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>Components…… ............................................................... 340Benefits of Outsourcing .................................................. 340Considerations Prior to Outsourcing .............................. 341What to Outsource ......................................................... 342What to Keep.................................................................. 343Integration ...................................................................... 344Transitioning Clients ....................................................... 34510


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of ContentsSection 9: Forms, Tools <strong>and</strong> Collateral ............................. ..349CERTIFIED NETWORK CHECKLIST ................................................ 349CLIENT INFORMATION ON-BOARDING FORM ............................... 352MANAGED SERVICES AGREEMENT EXAMPLE ................................ 362SAMPLE MANAGED SERVICES WELCOME LETTER .......................... 383INCIDENT MANAGEMENT AND RESOLUTION PROCESS EXAMPLE ....... 386EMPLOYMENT AD FOR A SERVICE DESK ENGINEER ......................... 390EMPLOYMENT AD FOR A <strong>NOC</strong> ENGINEER .................................... 395EMPLOYMENT AD FOR A SERVICE DISPATCHER .............................. 400EMPLOYMENT AD FOR A SERVICE MANAGER ................................ 405HR HIRING CHECKLIST FOR A NEW TECHNICAL PERSON .................. 410HR INTERVIEW QUESTIONS FOR A NEW TECHNICAL PERSON ........... 41211


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!T<strong>able</strong> of Contents12


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Can You Expect From This Book?What Can You Expect From This Book?Among the topics we will explore in this publication are bestpractices for building, maintaining <strong>and</strong> maximizing theefficiencies <strong>and</strong> effectiveness of your <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>operations. This means that our discussion will include thepeople, processes <strong>and</strong> systems required to operate a best-inclass<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>.This book is broken down into logical sections to support thecreation of your <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>, beginning withconsiderations for infrastructure design, hardware, services<strong>and</strong> the tools <strong>and</strong> technology to power your deliver<strong>able</strong>s;which is the next area we will explore, along with yoursupported hardware, applications, services <strong>and</strong> vendors.We will discuss your service agreements <strong>and</strong> SLAs, along withyour <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’s tiering structures, incident <strong>and</strong>problem management procedures <strong>and</strong> escalation processes tomaintain these SLA’s.We will also dive deeply into people – including your staff;your clients <strong>and</strong> their staff, <strong>and</strong> your <strong>and</strong> your clients’ vendors.For the section on your staff, we will discuss effective hiring,13


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Can You Expect From This Book?training, compensating, incenting <strong>and</strong> managing your talent toreward performance that improves your bottom line.Elsewhere, we will explore how best to interact <strong>and</strong>communicate with your clients <strong>and</strong> their vendors, <strong>and</strong> set <strong>and</strong>manage your clients’ expectations, as well as how to get themost out of your own vendor relationships.We will also explore basic client requirements necessary foryou to support them, <strong>and</strong> their environments’ minimumst<strong>and</strong>ards for service, as well as essential pre- <strong>and</strong> post-salesactivities required for successful on-boarding, provisioning ,service go-live <strong>and</strong> ongoing support <strong>and</strong> maintenance.Next, we will concentrate on identifying the key performancemetrics <strong>and</strong> indicators that will be used to baseline yourexisting <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’s performance <strong>and</strong> profitability.<strong>The</strong>se same KPIs will be used to measure improvement inspecific areas over time as you implement the methodologiescontained in this resource.Finally we will explore the topic of outsourcing some or all ofyour <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> operations to third-partyresources, <strong>and</strong> what you should consider when determiningyour strategy in this area. If <strong>and</strong> when you decide toimplement an outsourcing strategy, our discussion will coverintegration strategies with your existing processes, how to14


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Can You Expect From This Book?effectively transition your clients <strong>and</strong> successfully manage allof your outsourced relationships in order to maintain <strong>and</strong>increase client satisfaction over time, <strong>and</strong> scale your servicesmore broadly with less internal staff.15


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong><strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong><strong>Desk</strong><strong>The</strong> role of a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> is to manage <strong>and</strong> maintainavailability of services for their end users or clients <strong>and</strong> tofacilitate the restoration of normal service operation whileminimizing impact to these end users or clients within anagreed-upon SLA. In this capacity the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>may provide the following services to the end user or clientaccording to their SLA:Incident ManagementProblem ManagementConfiguration ManagementChange ManagementRisk ManagementRelease Management<strong>Service</strong> Level ManagementAvailability ManagementCapacity ManagementIT <strong>Service</strong> Continuity ManagementSecurity ManagementCommunication Management16


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong>SecurityMgmtIncidentMgmtProblemMgmtSvcContinuityMgtConfigMgmtCapacityMgmt<strong>NOC</strong>/<strong>Service</strong><strong>Desk</strong>ChangeMgmtAvailMgmtRisk MgmtSvc LevelMgmtReleaseMgmtFigure 1 – <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Roles<strong>The</strong> day-to-day duties of the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> include:Receiving all incident notifications <strong>and</strong> service requestsRecording all incidents <strong>and</strong> service requests17


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong>Classifying all incidents <strong>and</strong> service requestsPrioritizing all incidents <strong>and</strong> service requestsTroubleshooting all incidents <strong>and</strong> service requestsEscalating all incidents <strong>and</strong> service requests asnecessary to maintain SLAsMaintaining consistent communication with all partiesaffected by the incident or service requestPerforming all scheduled maintenance activitiesAlthough many of the roles, processes, procedures, activities<strong>and</strong> responsibilities of a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> theirrespective personnel are more alike than they are dissimilar,there is one important differentiator between these twobusiness units: their focus.In its most literal form, a <strong>NOC</strong>’s duties <strong>and</strong> responsibilities areoriented towards proactively managing <strong>and</strong> maintainingefficient operating states of hardware devices, softwareoperating systems <strong>and</strong> applications <strong>and</strong> insuring the continuityof services; <strong>and</strong> responding to incidents <strong>and</strong> problems thatimpact these. This definition most naturally lends itself toconducting activities such as remote monitoring <strong>and</strong> patch<strong>and</strong> change management for devices, software <strong>and</strong> services,<strong>and</strong> which do not normally require direct interaction with endusers.In contrast, a <strong>Service</strong> <strong>Desk</strong>’s <strong>and</strong> its staff’s duties <strong>and</strong>responsibilities are focused on managing end user incidents18


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong><strong>and</strong> problems. In fact, the <strong>Service</strong> <strong>Desk</strong> is the single point ofcontact (SPOC) for all end user issues, which are identified,documented, prioritized <strong>and</strong> assigned to internal resources fortroubleshooting <strong>and</strong> resolution prior to the performance ofquality assurance activities <strong>and</strong> final closure.However; this does not imply that these two business units donot interact with each other, or that the <strong>NOC</strong> nevercommunicates with an end user. Exceptions do exist here, asin any situation, <strong>and</strong> issues can be escalated freely betweenthese units during maintenance <strong>and</strong> incident <strong>and</strong> problemmanagement activity.In addition, depending upon specific factors, there does notneed to be an official “<strong>NOC</strong>” or “<strong>Service</strong> <strong>Desk</strong>” at all – as longas the service provider’s staff delivers these functions byfollowing best practices processes <strong>and</strong> procedures to maintaintheir SLAs <strong>and</strong> satisfaction with their clients, this may beperfectly accept<strong>able</strong>.Let’s explore this thought further…if we may not need anofficial “<strong>NOC</strong>”, or “<strong>Service</strong> <strong>Desk</strong>”, would we need dedicated<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staff? In some cases, <strong>and</strong> specifically forsmaller service providers – we may not. Again – as long asthere exist resources to perform or manage these functions,these hats may be interchange<strong>able</strong>.19


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong>It is completely feasible <strong>and</strong> realistic to have resourcesperform both <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> functions during thenormal course of service delivery. <strong>The</strong> challenge over timewith this becomes the efficient <strong>and</strong> effective scaling ofcapacity as the service provider’s client base grows. <strong>The</strong>re willcome a tipping point where it makes sense for the serviceprovider to dedicate specific resources to particular jobfunctions, or outsource some of these functions in order toscale, increase efficiencies <strong>and</strong> maintain client satisfaction.It is also a common practice among smaller serviceorganizations for individual resources to conduct all incident<strong>and</strong> problem management activities through several levels ofescalation. What this means is that a resource may continueto work a specific issue as it makes its way from Tier 1 throughTier 2 escalations <strong>and</strong> beyond, based upon the client’s SLA <strong>and</strong>the <strong>NOC</strong>’s or <strong>Service</strong> <strong>Desk</strong>’s corresponding tiering <strong>and</strong>escalation procedures. Again, there may come a tipping pointin the evolution of the service provider’s business where itmakes sense to dedicate specific resources to individual tiers,but this may be a long time coming, since industry statisticsreflect that ninety percent of all end user service requests areclosed in Tier 1, with an additional seven percent in Tier 2 <strong>and</strong>the balance in Tier 3.This means that dedicating specific resources to tiers beyondTier 1 must be justified by the sheer number of Tier 2 <strong>and</strong> Tier20


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Difference Between a <strong>NOC</strong> <strong>and</strong> a <strong>Service</strong> <strong>Desk</strong>3 requests being received by the <strong>Service</strong> <strong>Desk</strong>, <strong>and</strong> explainswhy the dedication of specific resources to each of these tiersis more readily found in enterprise-level corporate servicedesks, or industry manufacturer, vendor <strong>and</strong> distributorsupport offerings.21


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 1: Infrastructure DesignSection 1: Infrastructure Design<strong>The</strong> outsourced service provider or internal service manager inthe enterprise will need to insure that their infrastructuremeets the minimum requirements necessary to delivereffective <strong>and</strong> efficient <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services withintheir SLAs. While some deliver<strong>able</strong>s will have their own uniqueinfrastructure requirements, in most cases, all services willgenerally share common requirements at both the provider’s<strong>and</strong> clients’ or end users’ locations.This section will explore these minimum requirements in areasof environmental, systems, communication <strong>and</strong> connectivityrequirements.22


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Provider<strong>Service</strong> Location Requirements - ProviderAt the Provider’s LocationWhether the location for delivering <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>services is a remote outsourced service provider’s location,geographically displaced corporate branch office or the thirdfloor in your corporate building, the basic infrastructurerequirements needed to deliver these services effectively areidentical, <strong>and</strong> will normally include the following:Environmental requirementso <strong>NOC</strong>/<strong>Service</strong> <strong>Desk</strong>o Data CenterSystem requirementso Hardwareo Operating systems <strong>and</strong> softwareo <strong>Service</strong>sCommunication requirementso Protocolso SecurityConnectivity requirementso Broadb<strong>and</strong>o Remote accessBusiness Continuityo Backup/DR Plano <strong>Service</strong> Availability23


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderEnvironmentalSystemCommunicationsConnectivityBusinessContinuity• <strong>NOC</strong>/<strong>Service</strong> <strong>Desk</strong>• Data Center• Hardware• OS/Software• <strong>Service</strong>s• Protocols• Security• Broadb<strong>and</strong>• Remote Access• Backup/DR Plan• SVC AvailabilityFigure 2 – <strong>Service</strong> Delivery Requirements at the Provider’s LocationEnvironmental Requirements<strong>NOC</strong>/<strong>Service</strong> <strong>Desk</strong><strong>The</strong> outsourced service provider or internal service manager willnormally conduct <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> operations from acentralized location staffed with support personnel. <strong>The</strong> capacityplanning, design, implementation <strong>and</strong> staffing of this facility forthe effective delivery of these services require carefulconsideration for not only its current service deliveryrequirements, but future growth. <strong>The</strong>refore, the business-criticalfunctions <strong>and</strong> requirements of the facility necessitate thefollowing:Physical securityAdequate physical space planning, allowing for futuregrowth24


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderScal<strong>able</strong>, highly avail<strong>able</strong> redundant networkinfrastructureContinuous, redundant fail-over powerHighly avail<strong>able</strong>, redundant voice <strong>and</strong> broadb<strong>and</strong>carrier servicesClimate controlBackup, disaster recovery <strong>and</strong> business continuity plan25


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderPhysical SecurityAdequate Physical SpaceHighly Avail<strong>able</strong> NetworkRedundant PowerRedundant Voice/Broadb<strong>and</strong>Climate ControlBackup/DR/Business ContinuityFigure 3 – Infrastructure requirements at the provider’s location<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> System Requirements26


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderSystem requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> servicedelivery are defined as those minimum hardware, services,operating system <strong>and</strong> software applications, <strong>and</strong>configurations <strong>and</strong> patch <strong>and</strong> update levels necessary forproper system, services <strong>and</strong> application operation <strong>and</strong>efficient service delivery. Depending upon the specificdeliver<strong>able</strong> <strong>and</strong> its associated SLA, these requirements mayvary widely between outsourced service providers <strong>and</strong>internal service managers.<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Hardware Requirements<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> hardware devices <strong>and</strong> components willneed to meet certain minimum requirements to support theirroles throughout the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service deliverylifecycle. Hardware housed at the outsourced service provider’sor the internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> mustmeet certain physical requirements to fulfill its role in the servicedelivery process, <strong>and</strong> these may consist of the following:A specific CPU type <strong>and</strong> speedA minimum amount of physical RAMA specific amount of free HDD spaceA specific BIOS type <strong>and</strong> levelSpecific physical connectivity typesSpecific local <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methods27


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderSpecific configurationSpecific WAN/LAN/DMZ LocationInteroperability with other local or remote devicesHardware redundancyCPU RAM HDDBIOSPhysicalConnectivityConnectivityMethodProtocols <strong>and</strong>PortsSecurityConfigurationLocation Interoperability RedundancyFigure 4 – Hardware requirements at the provider’s location<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Operating Systems <strong>and</strong> SoftwareRequirements28


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderJust as there are minimum requirements for hardware housedat the outsourced service provider’s or internal servicemanager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> to properly support its roleduring <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service delivery, the same is truefor operating systems <strong>and</strong> software, which must also meetcertain requirements to fulfill its role in the service deliveryprocess, <strong>and</strong> these may consist of the following:A specific operating system type, version <strong>and</strong> patchlevelA specific software application type, version <strong>and</strong> patchlevelSpecific configurationLocal <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methodsInteroperability <strong>and</strong> ability to communicate with otherlocal or remote systems, services, functions, databases<strong>and</strong> applications<strong>Service</strong> availability <strong>and</strong> redundancyData backup, restoration <strong>and</strong> business continuity role<strong>and</strong> requirement29


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderOS Type Application Type ConfigurationConnectivityMethodProtocols <strong>and</strong>PortsSecurityInteroperability Availability Backup/RestoreFigure 5 – Operating system <strong>and</strong> software requirements at the provider’slocationCommunication RequirementsCommunication requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>service delivery are defined as those data <strong>and</strong> voice network,b<strong>and</strong>width <strong>and</strong> protocol requirements necessary to receive<strong>and</strong> aggregate performance data <strong>and</strong> alerts from managedlocations; as well as deliver remote management <strong>and</strong>maintenance to endpoints at these locations. This remotemanagement <strong>and</strong> maintenance can occur securely over widearea data networks, while communications <strong>and</strong> updates by30


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Provider<strong>and</strong> between the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> the end user orclient can be delivered over these same data or voicenetworks. Robust remote monitoring <strong>and</strong> management,trouble ticketing <strong>and</strong> phone systems are required to provideminimum required communications capabilities in order todeliver <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services efficiently.Utilizing unified communications <strong>and</strong> next-generation callcenter solutions providing the ability to record all interactionswith end users or clients, vendors <strong>and</strong> 3 rd party supportpersonnel allow valu<strong>able</strong> call accounting, monitoring <strong>and</strong>customer service benefits to the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>.ProtocolsProtocols utilized by the outsourced service provider’s or theinternal service manager’s <strong>NOC</strong>’s remote monitoring <strong>and</strong>management solutions to collect performance data <strong>and</strong> alertsfor events, services <strong>and</strong> applications include:Windows Management Instrumentation (WMI)Simple Network Management Protocol (SNMP)SyslogNetwork Basic Input/Output System (NetBIOS)Internet Control Message Protocol (ICMP)Extensible Markup Language (XML)31


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderSecurity RequirementsTransmission of the aggregated performance data <strong>and</strong> alertsgenerated within disparate end user or client networks fromremote monitoring <strong>and</strong> management solutions to theoutsourced service provider’s or the internal servicemanager’s <strong>NOC</strong> <strong>and</strong>/or Datacenter is normally accomplishedthrough secure protocols, <strong>and</strong> may include:Virtual Private Networks (VPNs)Secure Sockets Layer (SSL)Transport Layer Security (TLS)Hypertext Transfer Protocol over Secure Socket Layer(HTTPS)Secure File Transfer Protocol (SFTP)Connectivity RequirementsIn this context, connectivity requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> service delivery are defined as those services, devices<strong>and</strong> processes that allow the transfer of performance data <strong>and</strong>alerts from the remote monitoring <strong>and</strong> management solutionat the end user’s or client’s location to the outsourced serviceprovider’s or the internal service manager’s <strong>NOC</strong> <strong>and</strong>/orDatacenter, <strong>and</strong> provide remote access, control <strong>and</strong> desktop32


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Providersharing capabilities to the outsourced service provider or theinternal service manager <strong>and</strong> include network connections,equipment <strong>and</strong> services such as:BridgesRoutersSwitchesGatewaysFirewallsBroadb<strong>and</strong> servicesSecure network protocolsBroadb<strong>and</strong> RequirementsIn order for successful delivery of <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>services, fast, reli<strong>able</strong> broadb<strong>and</strong> carrier service at both theend users or client’s location <strong>and</strong> the outsourced serviceprovider’s or the internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> are required to support both remote monitoring <strong>and</strong>management services from disparate end user or clientnetworks, as well as to provide effective remote accesscapabilities for efficient maintenance services.Remote Access <strong>and</strong> Control Requirements<strong>The</strong> capability to remotely access endpoints in end user orclient networks to share desktops <strong>and</strong> deliver <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> services is the cornerstone of a successful remotemanagement <strong>and</strong> maintenance deliver<strong>able</strong>. By delivering33


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Providerservices remotely, the outsourced service provider or internalservice manager increases response <strong>and</strong> resolution times <strong>and</strong>is <strong>able</strong> to support more clients. Remote access to clientnetworks can be facilitated via many remote monitoring <strong>and</strong>management tools <strong>and</strong> numerous 3 rd -party software solutionsas well as through:Virtual Private Networks (VPNs)Hypertext Transfer Protocol over Secure Socket Layer(HTTPS)Secure File Transfer Protocol (SFTP)Secure Telnet /Secure Shell (SSH)Microsoft Windows Terminal <strong>Service</strong>sMicrosoft Windows Remote <strong>Desk</strong>top Protocol (RDP)3 rd -party remote control solutionsDisaster Preparedness <strong>and</strong> Business Continuity RequirementsIn order to insure the high availability of <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> <strong>NOC</strong>operations, the outsourced service provider or the internalservice manager must develop <strong>and</strong> implement strategies toinsure business continuity in the event of service interruptionor disaster. This Business Continuity Plan must assume a worstcase scenario of total inaccessibility to the <strong>Service</strong> <strong>Desk</strong> or<strong>NOC</strong> <strong>and</strong> initially provide all of the recovery steps necessary tosupport the <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> <strong>NOC</strong>’s critical business functions.34


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - ProviderBased upon the severity <strong>and</strong> extent of the service interruptionor disaster, the plan must also provide for the timelyrestoration of other less critical business functions over time.<strong>The</strong> plan must account for people, communications,hardware, operating systems <strong>and</strong> line of business applications,data, services, facilities to operate from <strong>and</strong> security.In order to create the Business Continuity Plan, theoutsourced service provider or internal service manager mustdetermine the following:1. Scopea. Areas to be covered by the Business ContinuityPlan2. Objectivesa. What results are expected, <strong>and</strong> courses ofaction the Business Continuity team will follow3. Assumptionsa. What is taken for granted <strong>and</strong> assumed to betrueDuring the Business Continuity Plan requirements phase, theoutsourced service provider or internal service manager mustconduct a Business Impact Analysis to identify those businessdepartments, functions, processes <strong>and</strong> systems that are mostvulner<strong>able</strong> to threat <strong>and</strong> are the most time-sensitive functionsof the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>.35


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Provider<strong>The</strong> results of this analysis will help the outsourced serviceprovider or internal service manager properly prioritize <strong>and</strong>schedule the recovery of interrupted <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>systems, communications, data, processes <strong>and</strong> functions.Once this has been determined, a Recovery Coordinator <strong>and</strong>Recovery Team Leaders can be appointed, who will manageoverall <strong>and</strong> specific operational unit Business Continuity Planactivities during an interruption or disaster. <strong>The</strong> next step inBusiness Continuity Plan development is to document theworkflows for each business unit in addition to the <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> affected by the disruption such as IT, HR, sales,etc., to utilize as a roadmap in their re-creation whennecessary. <strong>The</strong>se units, along with their recovery/restorationprocesses will differ depending upon whether the disruption isexperienced by the outsourced service provider or internalservice manager.All systems <strong>and</strong> applications must be identified <strong>and</strong>documented in the Business Continuity Plan as well as vitalrecords <strong>and</strong> the absolute minimum requirements for <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> Operation to continue.Next the outsourced service provider or internal servicemanager must identify if alternate means of operationcurrently exist, perhaps through hosted solutions in the cloudthat can be accessed from other locations, for instance.Primary <strong>and</strong> secondary application support personnel contacts<strong>and</strong> vendors need to be identified next. Finally, how business36


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Providerunits will function during recovery <strong>and</strong> the resourcesnecessary for recovery will need to be documented byprioritized time frame.<strong>The</strong> goal of the Business Continuity Plan is to allow theoutsourced service provider or internal service manager theability to quickly restore <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> functionality inthe event of disruption, <strong>and</strong> is a necessary requirement inorder to maintain agreed-upon SLAs for end users <strong>and</strong> clients.This section barely skims the surface of this complex topic.37


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – Datacenter<strong>Service</strong> Location Requirements - DatacenterAt the Provider’s DatacenterBecause data centers are designed as highly secure, disasterhardenedfacilities with backup <strong>and</strong> redundant power, datacommunications <strong>and</strong> environmental controls, they are judgedto be the best solution to insure business continuity forequipment housed <strong>and</strong> services hosted there. <strong>The</strong> Datacenteris the facility used by the outsourced service provider or theinternal service manager to house data <strong>and</strong> voice hardwaresuch as servers, routers, switches, firewalls, gateways <strong>and</strong>communications equipment, as well as operating systems <strong>and</strong>software applications critical to maintaining highly-avail<strong>able</strong>services <strong>and</strong> effective service delivery processes to end usersor clients. Due to the high costs associated with building <strong>and</strong>operating a Datacenter, many service providers <strong>and</strong> enterpriseservice managers lease space in existing 3 rd -party Datacentersto avail themselves of these facilities <strong>and</strong> their services at asignificantly reduced initial cost. Requirements of a Datacenterinclude:Physical securityScal<strong>able</strong>, redundant network infrastructureRedundant environmental controlsContinuous, redundant distributed powerFire detection <strong>and</strong> prevention systemsRedundant voice <strong>and</strong> broadb<strong>and</strong> carrier services38


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - DatacenterBackup, disaster recovery <strong>and</strong> business continuity planPhysical SecurityRedundant NetworkRedundant Environmental ControlsRedundant PowerFire Prevention/SuppressionRedundant Voice/Broadb<strong>and</strong>Backup/DR/Business ContinuityFigure 6 – Infrastructure requirements at the DatacenterDatacenter System Requirements39


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - DatacenterDatacenter system requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>service delivery are defined as those minimum hardware,services, operating system <strong>and</strong> software applications, <strong>and</strong>configurations <strong>and</strong> patch <strong>and</strong> update levels necessary forproper hosted system, services <strong>and</strong> application operation <strong>and</strong>efficient hosted service delivery. Depending upon the specificdeliver<strong>able</strong> <strong>and</strong> its associated SLA, these requirements mayvary widely between outsourced service providers <strong>and</strong>internal service managers.Datacenter Hardware RequirementsDatacenter hardware devices <strong>and</strong> components will need tomeet certain minimum requirements to support their rolesthroughout the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service deliverylifecycle. Highly avail<strong>able</strong> hardware housed at the outsourcedservice provider’s or the internal service manager’sDatacenter must meet certain physical requirementsincluding:A specific CPU type <strong>and</strong> speedA minimum amount of physical RAMA specific amount of free HDD spaceA specific BIOS type <strong>and</strong> levelSpecific physical connectivity typesSpecific local <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methods40


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - DatacenterSpecific configurationSpecific WAN/LAN/DMZ LocationInteroperability with other local or remote devicesHardware redundancyCPU RAM HDDBIOSPhysicalConnectivityConnectivityMethodProtocols <strong>and</strong>PortsSecurityConfigurationLocation Interoperability RedundancyFigure 7 – Hardware requirements at the DatacenterDatacenter Operating Systems <strong>and</strong> Software Requirements41


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - DatacenterJust as there are minimum requirements for hardware housedat the outsourced service provider’s or internal servicemanager’s Datacenter to properly support its role during <strong>NOC</strong><strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service delivery, the same is true foroperating systems <strong>and</strong> software, any of which may be hostedat the Datacenter, whose specific requirements may consist ofthe following:A specific operating system type, version <strong>and</strong> patchlevelA specific software application type, version <strong>and</strong> patchlevelSpecific configurationLocal <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methodsInteroperability <strong>and</strong> ability to communicate with otherlocal or remote systems, services, functions, databases<strong>and</strong> applications<strong>Service</strong> availability <strong>and</strong> redundancyData backup, restoration <strong>and</strong> business continuity role<strong>and</strong> requirement42


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - DatacenterOS TypeApplicationTypeConfigurationConnectivityMethodProtocols <strong>and</strong>PortsSecurityInteroperability Availability Backup/RestoreFigure 8 – Operating system <strong>and</strong> software requirements at theDatacenterDatacenter Communication RequirementsIn this scenario, communication requirements for anoutsourced service provider or internal service manager’sDatacenter to support <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service deliveryare defined as those network, b<strong>and</strong>width <strong>and</strong> protocolrequirements necessary to support the receipt, transmittal<strong>and</strong> aggregation of performance data <strong>and</strong> alerts from <strong>and</strong>between managed locations, the Datacenter <strong>and</strong> the <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong>; as well as to support delivery of remote43


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Datacentermanagement <strong>and</strong> maintenance to Datacenter <strong>and</strong> end user<strong>and</strong> client endpoints.Datacenter Security RequirementsTransmission of data between the outsourced serviceprovider’s or internal service manager’s Datacenter, <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> is normally accomplished through secureprotocols, <strong>and</strong> may include:Virtual Private Networks (VPNs)Secure Sockets Layer (SSL)Transport Layer Security (TLS)Hypertext Transfer Protocol over Secure Socket Layer(HTTPS)Secure File Transfer Protocol (SFTP)In addition, hardened physical security measures governingentrance to <strong>and</strong> egress from the Datacenter <strong>and</strong> access to theoutsourced service provider’s or internal service manager’sequipment <strong>and</strong> their <strong>and</strong> their end user’s or client’s data mustbe implemented, monitored <strong>and</strong> managed.Datacenter Connectivity RequirementsIn this context, Datacenter connectivity requirements for <strong>NOC</strong><strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service delivery are defined as thoseservices, devices <strong>and</strong> processes that allow connectivity <strong>and</strong>communications from the Datacenter to managed end user orclient locations <strong>and</strong> the outsourced service provider’s or the44


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements - Datacenterinternal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>, <strong>and</strong> provideremote access, management <strong>and</strong> control of the hosteddevices, operating systems, software applications <strong>and</strong> servicesto the outsourced service provider or the internal servicemanager <strong>and</strong> include redundant network connectivity,equipment <strong>and</strong> services such as:BridgesRoutersSwitchesGatewaysFirewallsBroadb<strong>and</strong> servicesSecure network protocols45


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – Outsourced 3 rd Party Provider<strong>Service</strong> Location Requirements – Outsourced 3rdParty Provider’s LocationAt the Outsourced 3rd Party ProviderMore <strong>and</strong> more 3 rd party back-office <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>providers are entering the market with offerings that eitherimprove the outsourced service provider’s or internal servicemanager’s existing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> operations, supplantportions of their deliver<strong>able</strong>s or replace them completely.<strong>The</strong>se outsourcers provide private-labeled <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> services to IT service providers as well as corporate ITdepartments <strong>and</strong> assume the roles of these departments on acontract basis; delivering services as the IT service provider orcorporate IT department so well that end users or clients maynot be aware of the outsourced relationship between theparties.Should the outsourced service provider or internal servicemanager choose to engage with one or more of theseoutsourced 3 rd party providers, they would be wise tounderst<strong>and</strong> these outsourcers’ existing infrastructure designsin areas including environmental, systems, communications<strong>and</strong> connectivity in order to evaluate their suitability inmaintaining the outsourced service provider’s or internalservice manager’s downstream SLAs to their end users orclients.46


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – Outsourced 3 rd Party Provider<strong>The</strong>se infrastructure requirements should closely align withthose maintained by the outsourced service provider orinternal service manager in areas of redundancy, availability,communications, connectivity <strong>and</strong> business continuity:Environmental requirementso <strong>NOC</strong>/<strong>Service</strong> <strong>Desk</strong>o Data CenterSystem requirementso Hardwareo Operating systems <strong>and</strong> softwareo <strong>Service</strong>sCommunication requirementso Protocolso SecurityConnectivity requirementso Broadb<strong>and</strong>o Remote accessBusiness Continuityo Backup/DR Plano SVC Availability47


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – Outsourced 3 rd Party ProviderEnvironmentalSystemCommunicationsConnectivityBusinessContinuity• <strong>NOC</strong>/<strong>Service</strong> <strong>Desk</strong>• Data Center• Hardware• OS/Software• <strong>Service</strong>s• Protocols• Security• Broadb<strong>and</strong>• Remote Access• Backup/DR Plan• SVC AvailabilityFigure 9 – <strong>Service</strong> Delivery Requirements at the Outsourced 3 rd -Party Provider’sLocationAdditional requirements to consider when engaging with a 3 rdparty outsourced <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> are discussed in Section8 – Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Components.48


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/Client<strong>Service</strong> Location Requirements – End User/ClientAt the End User’s or Client’s LocationInfrastructure requirements needed at the end user’s orclient’s location for successful <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> servicedelivery will normally include the following:Environmental requirementso Customer locationSystem requirementso Hardwareo Operating systems <strong>and</strong> softwareo <strong>Service</strong>sCommunication requirementso Protocolso SecurityConnectivity requirementso Broadb<strong>and</strong>o Remote accessEnvironmentalSystemCommunicationsConnectivity•End User or ClientLocation•Hardware•OS/Software•<strong>Service</strong>s•Protocols•Security•Broadb<strong>and</strong>•Remote AccessFigure 10 – <strong>Service</strong> Delivery Requirements at the End Client’s Location49


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientEnvironmental RequirementsClient Location<strong>The</strong> outsourced service provider or internal service managerwill normally install remote monitoring <strong>and</strong> managementagents on individual, dedicated or shared hardware at the enduser’s or client’s location as required by their chosen RMM(remote monitoring <strong>and</strong> management) solution. <strong>The</strong>refore,the business-critical functions of these solutions necessitatethe following environmental requirements at these locations:Physical security of the dedicated or shared hosthardwareContinuous, redundant powerHighly avail<strong>able</strong> voice <strong>and</strong> broadb<strong>and</strong> carrier servicesSecure redundant means of remote as well as physicalaccessClimate controlBackup, Disaster Recovery <strong>and</strong> Business ContinuityPlan for outsourced provider’s or internal servicemanager’s remote monitoring <strong>and</strong> managementhardware50


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientPhysical SecurityRedundant PowerRedundant Voice/Broadb<strong>and</strong>Remote AccessibilityClimate ControlBackup/DR/Business ContinuityFigure 11 – Environmental Requirements at End User or Client LocationSystem Requirements51


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientSystem requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> servicedelivery are defined as those minimum hardware, services,operating system <strong>and</strong> software applications, configurations<strong>and</strong> patch <strong>and</strong> update levels necessary for proper system <strong>and</strong>application operation to allow the effective delivery ofservices. Depending upon the specific deliver<strong>able</strong> <strong>and</strong> itsassociated SLA, these requirements may vary widely betweenoutsourced service providers <strong>and</strong> internal service managers.Hardware RequirementsHardware devices <strong>and</strong> components at the end user’s orclient’s location will need to meet certain minimumrequirements as dictated by the outsourced service provideror internal service manager’s RMM solution. Based upon itsspecific function <strong>and</strong> application in the service deliveryprocess, physical requirements of the hardware may includethe following:A specific CPU type <strong>and</strong> speedA minimum amount of physical RAMA specific amount of free HDD spaceA specific BIOS type <strong>and</strong> levelSpecific physical connectivity typesSpecific local <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsPhysical securitySpecific configuration52


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientSpecific WAN/LAN/DMZ LocationInteroperability with other local or remote devicesHardware redundancyCPU RAM HDDBIOSPhysicalConnectivityConnectivityMethodProtocols <strong>and</strong>PortsSecurityConfigurationLocation Interoperability RedundancyFigure 12 – Hardware Requirements at End User or Client LocationOperating Systems <strong>and</strong> Software RequirementsJust as there are minimum requirements for hardware toproperly support its role during <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> servicedelivery, operating systems <strong>and</strong> software running onhardware at the end user’s or client’s location must also meet53


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/Clientspecific criteria, <strong>and</strong> these requirements may consist of thefollowing:A specific operating system type, version <strong>and</strong> patchlevelA specific Software application type, version <strong>and</strong> patchlevelSpecific configurationLocal <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methodsInteroperability <strong>and</strong> ability to communicate with otherlocal or remote systems, services, functions, databases<strong>and</strong> applications<strong>Service</strong> availability <strong>and</strong> redundancyData backup, restore <strong>and</strong> business continuity process54


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientOS TypeApplicationTypeConfigurationConnectivityMethodProtocols <strong>and</strong>PortsSecurityInteroperability Availability Backup/RestoreFigure 13 – Operating System <strong>and</strong> Software Requirements at End User orClient LocationCommunication RequirementsCommunication requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>service delivery are defined as those network <strong>and</strong> protocolrequirements necessary to receive <strong>and</strong> aggregateperformance data <strong>and</strong> alerts from end user <strong>and</strong> clientlocations, as well as to allow delivery of remote management<strong>and</strong> maintenance to endpoints at these locations. This remotemanagement <strong>and</strong> maintenance can occur securely over widearea data networks, while communications <strong>and</strong> updates fromthe outsourced service provider or internal service manager to55


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/Clientthe end user or client can be delivered over either data orvoice networks.ProtocolsProtocols utilized by remote monitoring <strong>and</strong> managementsolutions to collect performance data <strong>and</strong> alerts for events,services <strong>and</strong> applications include:Windows Management Instrumentation (WMI)Simple Network Management Protocol (SNMP)SyslogNetwork Basic Input/Output System (NetBIOS)Internet Control Message Protocol (ICMP)Extensible Markup Language (XML)Security RequirementsTransmission of the aggregated performance data <strong>and</strong> alertsgenerated within disparate end user or client networks fromremote monitoring <strong>and</strong> management solutions to theoutsourced service provider’s or the internal servicemanager’s <strong>NOC</strong> <strong>and</strong>/or Datacenter is normally accomplishedthrough secure protocols, <strong>and</strong> may include:Virtual Private Networks (VPNs)Secure Sockets Layer (SSL)Transport Layer Security (TLS)Hypertext Transfer Protocol over Secure Socket Layer(HTTPS)56


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientSecure File Transfer Protocol (SFTP)Connectivity RequirementsIn this context, connectivity requirements for <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> service delivery are defined as those services, devices<strong>and</strong> processes that allow the transfer of performance data <strong>and</strong>alerts from the remote monitoring <strong>and</strong> management solutionat the end user’s or client’s location to the outsourced serviceprovider’s or the internal service manager’s <strong>NOC</strong> <strong>and</strong>/orDatacenter, <strong>and</strong> provide remote access, control <strong>and</strong> desktopsharing capabilities to the outsourced service provider or theinternal service manager <strong>and</strong> include network connections,equipment <strong>and</strong> services such as:BridgesRoutersSwitchesGatewaysFirewallsBroadb<strong>and</strong> servicesSecure network protocolsBroadb<strong>and</strong> RequirementsIn order for successful delivery of <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>services, fast, reli<strong>able</strong> broadb<strong>and</strong> carrier service at the endusers or client’s location is required to support both remotemonitoring <strong>and</strong> management services from disparate end user57


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/Clientor client networks, as well as to provide effective remoteaccess capabilities for efficient maintenance services by theoutsourced service provider or internal service manager.Remote Access <strong>and</strong> Control Requirements<strong>The</strong> capability to remotely access endpoints in end user orclient networks to share desktops <strong>and</strong> deliver <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> services is the cornerstone of a successful remotemanagement <strong>and</strong> maintenance deliver<strong>able</strong>. By deliveringservices remotely, the outsourced service provider or internalservice manager increases response <strong>and</strong> resolution times <strong>and</strong>is <strong>able</strong> to support more clients. Remote access to clientnetworks can be facilitated via many remote monitoring <strong>and</strong>management tools <strong>and</strong> numerous 3 rd -party software solutionsas well as through:Virtual Private Networks (VPNs)Hypertext Transfer Protocol over Secure Socket Layer(HTTPS)Secure File Transfer Protocol (SFTP)Secure Telnet /Secure Shell (SSH)Microsoft Windows Terminal <strong>Service</strong>sMicrosoft Windows Remote <strong>Desk</strong>top Protocol (RDP)Backup, Disaster Preparedness <strong>and</strong> Business ContinuityRequirements58


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Location Requirements – End User/ClientIn order to insure the high availability of <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> <strong>NOC</strong>operations, the outsourced service provider or the internalservice manager must develop <strong>and</strong> implement strategies toinsure the rapid restoration of dedicated remote monitoring<strong>and</strong> management hardware in the event of failure.Basic requirements include having a backup of the remotemonitoring <strong>and</strong> management device hardware’s configuration<strong>and</strong> a replacement on h<strong>and</strong>, as well as the ability to replacethe physical device to maintain established SLAs.59


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 2: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> TechnologySection 2: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong>TechnologyFor purposes of our discussion, we will focus on four key toolsfor outsourced service providers <strong>and</strong> internal servicemanagers to consider in powering their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong>s:A remote monitoring <strong>and</strong> management (RMM)solutionA trouble-ticketing or Professional <strong>Service</strong>sAutomation (PSA) SolutionA remote access or control solutionA Voice communications solutionChoosing <strong>and</strong> implementing the appropriate tools will help theoutsourced service provider or internal service managerreduce costs through st<strong>and</strong>ardization <strong>and</strong> increasedefficiencies <strong>and</strong> improve end user or client satisfaction bydelivering proactive maintenance <strong>and</strong> consistent, audit<strong>able</strong>service delivery. <strong>The</strong> right tools will help realize theseoutcomes for the following reasons:60


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 2: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> TechnologyIn order to maximize net profits, outsourced serviceproviders <strong>and</strong> internal service managers must develop<strong>and</strong> implement effective policies <strong>and</strong> procedures toimprove their efficiencies in service delivery, <strong>and</strong> lookto these tools as a starting point, leveraging their builtintemplates, workflows <strong>and</strong> functionalityIn order to st<strong>and</strong>ardize <strong>and</strong> document incident <strong>and</strong>problem management <strong>and</strong> resolution, outsourcedservice providers <strong>and</strong> internal service managers usetheir tools’ <strong>Service</strong> <strong>Desk</strong> functionality to improve <strong>and</strong>document their service delivery activity to end users<strong>and</strong> clientsIn order to show value to the end user or client,outsourced service providers <strong>and</strong> internal servicemanagers rely on their tools’ abilities to generatemeaningful reports which can be utilized not only forservice validation but; for the outsourced serviceprovider, also to identify revenue-generatingopportunities, such as when a device or service’smonitored threshold is consistently exceeded,signaling an upgrade or up-sell opportunityIn order to be alerted as quickly as possible topotential problems in end user or client environments,outsourced service providers <strong>and</strong> internal servicemanagers establish proactive alerting <strong>and</strong> escalation ofalerts in order to maximize their response time,61


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 2: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologyproviding them the ability to respond proactively toprevent or minimize service interruptionIn order to speed response <strong>and</strong> resolution times,outsourced service providers <strong>and</strong> internal servicemanagers leverage these tools to remotely access <strong>and</strong>control end user or client devices, desktops <strong>and</strong>laptopsIn order to improve staff utilization, outsourced serviceproviders <strong>and</strong> internal service managers schedule <strong>and</strong>automate the delivery of common maintenanceactivities such as operating system, applicationsoftware, antivirus <strong>and</strong> antispyware patching <strong>and</strong>updating through the use of these tools, freeing theirstaff to work on higher priority or greater revenuegeneratingactivitiesBy administering maintenance <strong>and</strong> end user supportservices remotely, outsourced service providers <strong>and</strong>internal service managers further increase theirefficiencies <strong>and</strong> staff utilization, <strong>and</strong> improve end useror client response <strong>and</strong> resolution time, raising clientsatisfactionBy providing unified messaging, CRM integration,custom call routing, recording <strong>and</strong> accountingcapabilities, next generation voice communications62


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 2: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologysolutions improve the service delivery experience <strong>and</strong>increase satisfaction for end users <strong>and</strong> clientsFigure 14 – <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tool Benefits63


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management ToolsRemote Monitoring <strong>and</strong> Management Tools<strong>The</strong> Remote Monitoring <strong>and</strong> Management Tool<strong>The</strong> ability for the outsourced service provider or internalservice manager to proactively monitor critical devices <strong>and</strong>services is a fundamental necessity for the capability tomaintain <strong>and</strong> increase service uptime. <strong>The</strong> most effectivenetwork monitoring solutions allow the outsourced serviceprovider or internal service manager to install a softwareagent on individual, dedicated or shared hardware devicessuch as a server or desktop in a client’s environment <strong>and</strong>initially obtain data on network-connected devices such as:Hardware asset, role <strong>and</strong> inventory informationCollect hardware warranty informationOperating system, application software <strong>and</strong> licensing<strong>and</strong> patch level informationDevice IP addressing informationPhysical system information (memory, disk, NIC, etc.)Virtual system management (VMWare, Hyper-V, etc.)Running processesUp/down device statusMobile devicesAfter a predetermined period of time, the remote monitoring<strong>and</strong> management tool will be <strong>able</strong> to gather data <strong>and</strong> reporton items such as the following:64


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management ToolsSyslogsEvent LogsSystem UptimeSNMP<strong>Service</strong>sWhile all real-time network monitoring tools share somecommonality, others provide more granular, meaningfulreporting <strong>and</strong> alerting on equipment, such as:Output a topological map of the environmentDetailed inventory to the module levelReal-time <strong>and</strong> historical CPU, memory <strong>and</strong> interfacestatisticsReal-time <strong>and</strong> historical disk drive performance <strong>and</strong>avail<strong>able</strong> capacityVM host <strong>and</strong> guest monitoringLicense key monitoringApplication compliance monitoringVPN monitoringVoIP application monitoringVoice trunk <strong>and</strong> DSP utilization<strong>The</strong> ability to back up <strong>and</strong> restore specific deviceconfigurationsSystem warranty monitoring65


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management ToolsEquipment end-of-life <strong>and</strong> end-of-sale monitoringFigure 15 – Remote Monitoring <strong>and</strong> Management Tool Benefits66


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management Tools<strong>The</strong> remote monitoring <strong>and</strong> management tool’s capability toallow the outsourced service provider or internal servicemanager to configure pre-set alert thresholds for criticaldevices <strong>and</strong> services <strong>and</strong> run automated scripts to selfremediateproblems prior to escalation is a key to maximizingservice uptime for end users or clients <strong>and</strong> maintaining SLAs.Commonly monitored devices <strong>and</strong> services include:ServersIP PhonesRoutersAccess PointsSwitchesPCsFirewallsPrintersVM hosts <strong>and</strong> guestsIn addition to hardware devices, critical services can also bemonitored, alerted on <strong>and</strong> escalated. Commonly monitoredservices include:Broadb<strong>and</strong> <strong>Service</strong>sAntivirus <strong>Service</strong>sEmail <strong>Service</strong>sVPNsWeb <strong>Service</strong>sB<strong>and</strong>widthSQL <strong>Service</strong>sVoIP QOSBackup <strong>Service</strong>s67


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management ToolsNot only hardware <strong>and</strong> services can be monitored, but criticalline-of-business applications are also cap<strong>able</strong> of beingmonitored <strong>and</strong> alerted on. Remote monitoring <strong>and</strong>management tools normally utilize the following protocols toperform their function:WMISyslogSNMPMany remote monitoring <strong>and</strong> management tools integratewith numerous manufacturers’ SNMP ManagementInformation Bases (MIB) for their network hardware,providing the ability to quickly identify devices, operatingsystems <strong>and</strong> software applications <strong>and</strong> begin monitoring <strong>and</strong>managing them with ready-made templates containing themanufacturers’ recommended operating thresholds. <strong>The</strong>secan be imported as service templates that can be reconfigured<strong>and</strong> deployed across multiple customers. Having the ability todevelop <strong>and</strong> deploy custom services using an SDK can alsoprovide additional flexibility in the delivery of customizedservices. <strong>The</strong> outsourced service provider or internal servicemanager can configure the remote monitoring <strong>and</strong>management tool to trigger alerts when these thresholds are68


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management Toolsreached, as well as modify the alerts to trigger upon reachingcustomized operating thresholds.Another added benefit to many remote monitoring <strong>and</strong>management tools is their ability to perform scheduled,scripted actions such as delivering patches <strong>and</strong> updates tooperating systems <strong>and</strong> software applications <strong>and</strong> conductingdevice optimization operations such as disk defragmentation,deletion of temporary files <strong>and</strong> more for servers, desktops <strong>and</strong>laptops. For many of these tools, if an activity can be scripted,it can be scheduled to run unattended during off-hours,providing the outsourced service provider or internal servicemanager tremendous labor savings by offloading thesemundane, time-consuming <strong>and</strong> labor-intensive activities fromtheir costly human resources to their remote monitoring <strong>and</strong>management tool.In addition, the ability to automatically restart failed servicescan also be configured in many of these remote monitoring<strong>and</strong> management tools, speeding restoration of criticalservices <strong>and</strong> minimizing downtime – all without humanintervention. And along with alerts, all activity conducted bythese tools is captured <strong>and</strong> avail<strong>able</strong> for reporting, creating anaudit trail that can be reviewed at any time, further reducingthe need to manually remote in to end user or client69


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management Toolsenvironments to ascertain whether patches were deployedsuccessfully or backup jobs ran without error.What to look for in a Remote Monitoring <strong>and</strong> ManagementTool<strong>The</strong> outsourced service provider or internal service managertoday has the benefit of a wide variety of Remote Monitoring<strong>and</strong> Management tools to choose from, <strong>and</strong> several factorswill weigh in their final purchase decision, including:Suitability for their particular service delivery model,needs <strong>and</strong> supported hardware <strong>and</strong> servicesCost <strong>and</strong> ROIImplementation, training <strong>and</strong> deployment time<strong>The</strong> ability to provide meaningful reporting<strong>The</strong> quality of vendor support<strong>The</strong> ability to, <strong>and</strong> ease of integration with, their troubleticketing or Professional <strong>Service</strong>s Automation solution<strong>The</strong> ability to use the application from mobile devices<strong>The</strong> outsourced service provider or internal service managerwhose service delivery model focuses on supporting Microsoftoperating systems <strong>and</strong> software <strong>and</strong> IBM-compatiblehardware benefit from the widest selection of remote70


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management Toolsmonitoring <strong>and</strong> management tools. Those whose servicedelivery models include support for operating systems such asApple, Linux, Unix <strong>and</strong> Novell, <strong>and</strong> other 3 rd -party software<strong>and</strong> hardware will find their choices for remote monitoring<strong>and</strong> management tools more limited.Many remote monitoring <strong>and</strong> management tool vendorsinclude hosted, or “pay as you go” pricing models, loweringthe barrier to entry for the outsourced service provider orinternal service manager, as well as other, more traditionalpricing models. Hosted remote monitoring <strong>and</strong> managementtool solutions also reduce implementation <strong>and</strong> deploymenttime, as the need for the outsourced service provider orinternal service manager to procure, build <strong>and</strong> configure hostserver hardware is eliminated.<strong>The</strong> ability for the remote monitoring <strong>and</strong> management toolto document alerts, errors <strong>and</strong> informational data such aswarranty information through a robust reporting engine isnecessary when validating the outsourced service provider’sor internal service manager’s services to end users or clients,<strong>and</strong> crucial when justifying budget requests for service orequipment upgrades <strong>and</strong> during capacity planning.As a result of remote monitoring <strong>and</strong> management toolvendors’ efforts to gain market share, overall vendor support71


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management Toolshas improved, with additional services such as businessprocess transformation to help assist with the packaging ,pricing, marketing <strong>and</strong> selling of the managed services beingoffered, in addition to product training. Outsourced serviceproviders <strong>and</strong> internal service managers should make certainto choose a vendor that provides support during their hours ofservice delivery. Depending upon the vendor <strong>and</strong> outsourcedservice provider’s or internal service manager’s geographiclocations, time zone factors should be considered. Of note isthe fact that some vendors even offer a hybrid model toen<strong>able</strong> 24x7 coverage acting as a seamless extension to yourorganization for your customers.A critical function that the remote monitoring <strong>and</strong>management tool must provide is tight integration with theoutsourced service provider’s or internal service manager’strouble ticketing or Professional <strong>Service</strong>s Automation solution.<strong>The</strong> remote monitoring <strong>and</strong> management tool must be <strong>able</strong> tocommunicate alerts to the trouble ticketing or Professional<strong>Service</strong>s Automation solution <strong>and</strong> open a service request,documenting the alert, <strong>and</strong> enabling the trouble ticketing orProfessional <strong>Service</strong>s Automation solution to assign theappropriate priority <strong>and</strong> SLA to the service request, <strong>and</strong>escalate the incident as appropriate.72


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Monitoring <strong>and</strong> Management ToolsFigure 16 – Remote Monitoring <strong>and</strong> Management <strong>and</strong> PSA ToolIntegration Example73


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation ToolsTrouble Ticketing <strong>and</strong> Professional <strong>Service</strong>sAutomation Tools<strong>The</strong> Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s AutomationToolChoosing <strong>and</strong> implementing a <strong>Service</strong> <strong>Desk</strong> Trouble Ticketingsystem in the outsourced service provider’s or internal servicemanager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> is the next step in improvingefficiencies by enabling the implementation of consistent,measur<strong>able</strong> workflow processes <strong>and</strong> reporting capabilitiesacross these business units.On the most fundamental level, basic <strong>Service</strong> <strong>Desk</strong> TroubleTicketing systems may include the following capabilities:A service request or trouble ticketing componentA scheduling & dispatching componentA time tracking componentA configuration & change management componentA knowledge base componentA resource management componentA reporting componentFor some outsourced service providers <strong>and</strong> many internalservice managers these Trouble Ticketing systems’ basiccapabilities may be sufficient to meet their service deliveryneeds. Should the outsourced service provider or internal74


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation Toolsservice manager require additional capabilities including tightintegration with Remote Monitoring <strong>and</strong> Management tools<strong>and</strong> consolidated reporting between their Remote Monitoring<strong>and</strong> Management <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> activities, a Professional<strong>Service</strong>s Automation solution might be a better choice.Effective Professional <strong>Service</strong>s Automation solutions provideadded benefits over basic Trouble Ticketing systems, <strong>and</strong>these benefits may include:A CRM systemA service request or trouble ticketing componentA project management componentA scheduling & dispatching componentA time tracking componentAn expense tracking componentAn inventory control componentAn asset management componentA configuration & change management componentA service agreement & SLA management componentA knowledge base componentA resource management componentQuoting & invoicing integration with accountingsystemsA sales funnel component75


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation ToolsA marketing campaign management componentTight two-way integration with N-central through APIsRobust, customiz<strong>able</strong> consolidated reportingCommunity <strong>and</strong> user group interaction <strong>and</strong> supportIn addition, a Professional <strong>Service</strong>s Automation solutionimproves efficiencies by implementing consistent workflowprocesses <strong>and</strong> communication <strong>and</strong> reporting capabilitiesacross multiple business units which may include:<strong>Service</strong> <strong>Desk</strong><strong>NOC</strong>Professional <strong>Service</strong>sMarketingSalesPurchasingInventoryAccountingAs a Professional <strong>Service</strong>s Automation solution not onlysupports but extends the capabilities of traditional TroubleTicketing systems, moving forward we will focus on <strong>and</strong>reference Professional <strong>Service</strong>s Automation solutions as theypertain specifically to our <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>-focuseddiscussions.76


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation Tools<strong>The</strong> Professional <strong>Service</strong>s Automation solution’s CRMfunctionality allows the outsourced service provider orinternal service manager the ability to automate their <strong>NOC</strong><strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’s workflows <strong>and</strong> record <strong>and</strong> report on enduser or client-facing processes such as sales, marketing,projects <strong>and</strong> other services. Applied correctly, this processbasedmechanism helps maintain SLAs, boosts clientsatisfaction, shortens sales cycles, simplifies incident <strong>and</strong>project management, facilitates escalation <strong>and</strong> improvesproblem identification <strong>and</strong> resolution time.Other <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> functions benefiting from aProfessional <strong>Service</strong>s Automation solution include effectiveresource management through efficient scheduling <strong>and</strong>dispatching, time tracking <strong>and</strong> expense management – withkey metrics including utilization <strong>and</strong> profitability by resource,deliver<strong>able</strong> <strong>and</strong> end user or client easily tracked <strong>and</strong> reportedon.<strong>The</strong> ability for the Professional <strong>Service</strong>s Automation solutionto manage end user or client assets <strong>and</strong> configurations furtherincreases the outsourced service provider’s or internal servicemanager’s efficiencies <strong>and</strong> speeds problem resolution. And,when paired with change management, the outsourcedservice provider or internal service manager can insure that77


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation Toolsst<strong>and</strong>ardized methods <strong>and</strong> procedures are followed to h<strong>and</strong>leall changes to an end user’s or client’s infrastructure,minimizing the negative impact of any change-related activity.In order to effectively deliver incident management <strong>and</strong>resolution services, the outsourced service provider orinternal service manager will leverage the Professional<strong>Service</strong>s Automation solution’s service request, or troubleticketing component, <strong>and</strong> build their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>deliver<strong>able</strong>s around an effective, st<strong>and</strong>ards-based incidentmanagement process; incorporating incident identification,prioritization <strong>and</strong> escalation for timely resolution – allgoverned by strict SLAs.<strong>The</strong> ability for the outsourced service provider’s or internalservice manager’s Remote Monitoring <strong>and</strong> Management toolto integrate with the Professional <strong>Service</strong>s Automationsolution’s service request component is critical for maximizingefficiencies <strong>and</strong> maintaining SLAs, as alerts are passed fromthe Remote Monitoring <strong>and</strong> Management tool to theProfessional <strong>Service</strong>s Automation solution to automate thecreation, prioritization <strong>and</strong> escalation of service requests. Asincidents are closed, the Professional <strong>Service</strong>s Automationsolution updates its internal search<strong>able</strong> knowledge base witheach resolution, allowing the outsourced service provider’s orinternal service manager’s staff the ability to quickly query78


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation Toolstheir own internal database during future incidentmanagement activity - a true benefit, especially when dealingwith specific line-of-business applications or unique hardware<strong>and</strong> software configurations.Integration with an outsourced service provider’s or internalservice manager’s quoting <strong>and</strong> accounting solutions furtherextends the value of the Professional <strong>Service</strong>s Automationsolution, reducing redundant data entry, increasingefficiencies <strong>and</strong> speeding turnaround time for end user orclient quotes <strong>and</strong> invoices.<strong>The</strong> outsourced service provider’s or internal servicemanager’s ancillary processes also benefit from theProfessional <strong>Service</strong>s Automation solution’s ability to createcustomized workflows based upon specific solution salesprocesses <strong>and</strong> cycles, tracking each milestone during the salesprocess <strong>and</strong> managing the sales funnel as applic<strong>able</strong>. As withthe service request component, the sales component enforcesa strict sales process, st<strong>and</strong>ardizing each step in the sales cycle<strong>and</strong> providing meaningful data through reporting, whichallows the outsourced service provider or internal servicemanager to forecast potential revenue accurately, or modifysales processes in order to achieve their desired outcome.79


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation ToolsIn many cases, implementing a Professional <strong>Service</strong>sAutomation solution into an outsourced service provider’spractice or internal service manager’s operation <strong>and</strong> enforcingmanagement of each business unit by the processes <strong>and</strong>workflows established will be difficult <strong>and</strong> challenging;however, in order to transition to not only a proactive servicedelivery model, but also a proactive business operationsmodel, it may be the most efficient <strong>and</strong> effective answer.80


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation ToolsFigure 17 – Professional <strong>Service</strong>s Automation Solution BenefitsWhat to look for in a Professional <strong>Service</strong>s AutomationSolution81


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Trouble Ticketing <strong>and</strong> Professional <strong>Service</strong>s Automation ToolsAs in an outsourced service provider’s or internal servicemanager’s decision to purchase a Remote Monitoring <strong>and</strong>Management tool, similar factors weigh in the Professional<strong>Service</strong>s Automation solution’s purchase decision:Suitability for the outsourced service provider’s orinternal service manager’s particular service deliverymodelCost <strong>and</strong> ROIImplementation, training <strong>and</strong> deployment time<strong>The</strong> ability to provide meaningful reporting<strong>The</strong> quality of vendor support<strong>The</strong> ability to, <strong>and</strong> ease of integration with, theirRemote Monitoring <strong>and</strong> Management toolLike many Remote Monitoring <strong>and</strong> Management toolvendors, many Professional <strong>Service</strong>s Automation solutionvendors also offer “pay as you go” pricing models,lowering the barrier to entry for outsourced serviceproviders <strong>and</strong> internal service managers, as well as other,more traditional pricing models. And as with hostedRemote Monitoring <strong>and</strong> Management tools, hostedProfessional <strong>Service</strong>s Automation solutions also reduceimplementation <strong>and</strong> deployment time.82


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Access <strong>and</strong> Control ToolsRemote Access <strong>and</strong> Control Tools<strong>The</strong> Remote Access <strong>and</strong> Control ToolAnother necessary tool in delivering effective <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> services is the outsourced service provider’s or internalservice manager’s Remote Access <strong>and</strong> Control solution, orsolutions, as there are two specific scenarios addressed bythese tools:Remotely accessing equipmentRemotely sharing a desktop session with an end useror client<strong>The</strong>se scenarios each require a different capability <strong>and</strong>approach by the Remote Access <strong>and</strong> Control solution. In thecase of remotely accessing equipment, the outsourced serviceprovider or internal service manager can use already-existingmethods, such as Secure Telnet or SSH, or VPN with RDC fornewer Microsoft Windows server <strong>and</strong> desktop operatingsystems. But in situations that require interaction with an enduser or client remotely, the outsourced service provider’s orinternal service manager’s <strong>Service</strong> <strong>Desk</strong> will need the ability toshare the user’s desktop, take control of the user’s keyboard<strong>and</strong> mouse, <strong>and</strong> interact with them in real-time for effective<strong>and</strong> timely incident identification <strong>and</strong> resolution.83


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Access <strong>and</strong> Control ToolsIt is appropriate to note that many Remote Monitoring <strong>and</strong>Management tools have remote access <strong>and</strong> controlcapabilities built in for certain devices <strong>and</strong> operating systems.What to look for in a Remote Access <strong>and</strong> Control ToolAn outsourced service provider or internal service managertoday has the benefit of a wide variety of Remote Access <strong>and</strong>Control tools to choose from, <strong>and</strong> as with any purchasingdecision of this type, factors that will weigh in their finaldecision include:Suitability for their particular service delivery model<strong>and</strong> supported hardware, operating systems, softwareapplications <strong>and</strong> servicesCost <strong>and</strong> ROIImplementation, training <strong>and</strong> deployment time<strong>The</strong> availability <strong>and</strong> quality of vendor supportOutsourced service providers or internal service managerswhose service delivery models focus on supporting Microsoftoperating systems <strong>and</strong> software, <strong>and</strong> IBM-compatiblehardware benefit from the widest variety of Remote Access<strong>and</strong> Control tools. Those whose service delivery modelsinclude support for Apple, Linux, Unix or Novell operatingsystems will find their choices for Remote Access <strong>and</strong> Controltools much more limited.84


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Access <strong>and</strong> Control ToolsAs with Remote Monitoring <strong>and</strong> Management tools <strong>and</strong>Professional <strong>Service</strong>s Automation solutions, many remotecontrol tool vendors include hosted <strong>and</strong> “pay as you go”pricing models, as well as other, more traditional pricingmodels. Many of the Remote Access <strong>and</strong> Control toolsavail<strong>able</strong> to the outsourced service provider or internal servicemanager are easy to implement, simple to deploy <strong>and</strong> do notrequire extensive training to utilize effectively. EffectiveRemote Access <strong>and</strong> Control Tools should provide the followingfunctionality:Secure connectivity to the target device<strong>The</strong> ability to take complete control of the targetdeviceFast performance<strong>The</strong> ability to perform file transfers between source<strong>and</strong> target devices<strong>The</strong> ability to print from the target device to the hostdevice’s printers<strong>The</strong> ability to switch focus between the target deviceto the source device, allowing the end user to view thesource device’s desktop (for training <strong>and</strong> otherpurposes)<strong>The</strong> ability to rapidly deploy, or make avail<strong>able</strong> anynecessary Agents to the target device85


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Access <strong>and</strong> Control ToolsA Web-based architecture to allow functionality fromany source device in any locationAny solution that allows access to an internal network shouldbe secure, minimizing the end user’s or client’s externalfootprint. <strong>The</strong> Remote Access <strong>and</strong> Control tool should providethis security natively, in order to be considered a vi<strong>able</strong> choicefor the outsourced service provider or internal servicemanager, allowing the most flexible support options.<strong>The</strong> ability to completely control the target device by theoutsourced service provider or internal service manager’s staffgreatly increases their capacity to quickly <strong>and</strong> effectivelytroubleshoot end user or client issues remotely, increasingutilization, efficiency <strong>and</strong> client satisfaction.<strong>The</strong> Remote Access <strong>and</strong> Control tool’s performance is criticalduring remote incident resolution – the faster the response,the better for both the outsourced service provider or internalservice manager <strong>and</strong> the end user or client.<strong>The</strong> ability to transfer data between devices is also arequirement, as the replacement of operating system orsoftware application files is a common necessity duringincident troubleshooting <strong>and</strong> resolution, as is the deploymentof patches <strong>and</strong> updates to the target device from time to time.86


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Remote Access <strong>and</strong> Control ToolsPrinting files accessed from the target device to the sourcewithout the necessity to install <strong>and</strong> configure printer driversalso benefits the outsourced service provider or internalservice manager’s staff during incident resolution.Rapid deployment of Remote Access <strong>and</strong> Control Agents, orthe ability to host these Agents on the outsourced serviceprovider or internal service manager’s website or supportportal provides maximum speed <strong>and</strong> availability for remoteaccess <strong>and</strong> control support to the end user or client, <strong>and</strong> theability to provide this support from any web browser at anylocation provides maximum flexibility in addressing end useror client issues.Figure 18 – Remote Access <strong>and</strong> Control Example87


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Voice Communications SolutionsVoice Communications Solutions<strong>The</strong> Voice Communications Solution<strong>The</strong> outsourced service provider or internal service managermust equip their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> with a robust voicecommunications solution in order to effectively deliver <strong>NOC</strong><strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services to their end users or clients. <strong>The</strong>availability <strong>and</strong> proper operation of this system is equally, ifnot more important, than any of the other tools <strong>and</strong>technologies employed by the outsourced service provider orinternal service manager in the delivery of services.For maximum benefit to the outsourced service provider orinternal service manager <strong>and</strong> to improve satisfaction of theirend users or clients, it is imperative for the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> to:Reduce blockage (busy signals)Improve response timeIncrease first call resolutionShorten average call timeReduce queue hold timesShrink ab<strong>and</strong>on ratesIn order to facilitate these goals, the chosen voicecommunications solution should support the followingminimum features:88


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Voice Communications SolutionsScalabilityAutomatic call distribution (ACD) or customiz<strong>able</strong> callrouting (CCR)Interactive voice response (IVR)Call monitoringCall recordingCall accounting (Reporting)Obviously, the ability to scale as the outsourced serviceprovider’s or internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>grows is important, as is automated call distribution, whichallows calls to be routed based upon any number of criteriaincluding resource availability, time of day, urgency, client,etc.<strong>The</strong> interactive voice response capability of the voicecommunications solution allows the creation of intuitivemenus to manage calls effectively <strong>and</strong> efficiently, <strong>and</strong> get thecaller to the right queue for service through voice or keypadresponse to the auto attendant’s voice prompts.<strong>The</strong> ability to monitor <strong>and</strong> record interactions between endusers or clients <strong>and</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staff allows theoutsourced service provider or internal service manager toinsure quality of service, facilitate training <strong>and</strong> maintain a89


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Voice Communications Solutionsdigital record that can be archived should the necessity ariseto produce it at a later date.<strong>The</strong> call accounting feature is also important in that it allowsthe outsourced service provider or internal service manager toanalyze call volume <strong>and</strong> activity through any number of filters,including queue, resource, time of day, day of week, durationof call <strong>and</strong> more. This information is invalu<strong>able</strong> in staffing <strong>and</strong>scheduling activities – as well as identifying training needs.Additional voice communications solution features that canfurther benefit the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> include:Unified communications capabilityVoIP supportIntegration with Professional <strong>Service</strong>s Automationsolutions<strong>The</strong> ability to support unified communications will allow theoutsourced service provider or internal service manager themost flexibility in managing <strong>and</strong> maintaining visibility to allinbound <strong>and</strong> outbound voice communications by providing anadditional level of communications capability to their staff –especially in smaller organizations where staff responsibilitiesmay take them away from the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong>.90


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Voice Communications SolutionsVoIP integration provides benefits including the ability to usesoftphone software applications on desktops <strong>and</strong> laptops,allowing support to be delivered <strong>and</strong> calls managed anywherean internet connection is avail<strong>able</strong>, in addition to enablingsupport delivery from geographically displaced locations orhome offices simply by plugging in an inexpensive VoIPh<strong>and</strong>set to a broadb<strong>and</strong> connection <strong>and</strong> maintaining the samequality <strong>and</strong> level of support as if the resource were sitting inthe <strong>NOC</strong> or at the <strong>Service</strong> <strong>Desk</strong>.Finally, integration with the outsourced service provider’sProfessional <strong>Service</strong>s Automation solution will en<strong>able</strong>advanced CRM functionality including screen pop-upsidentifying the caller, their organization <strong>and</strong> other importantinformation, as well as launching their company profile <strong>and</strong>logging the call, hopefully allowing the <strong>Service</strong> <strong>Desk</strong> to:Improve response timeIncrease first call resolutionShorten average call time91


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Voice Communications SolutionsImproveResponseTimeIncrease1 st CallResolutionShortenAvg. CallTimesReduceHold TimesReduceBlockageVoiceSolutionShrinkAb<strong>and</strong>onRatesFigure 19 – Voice Communication Solution Goals92


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Integrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> TechnologiesIntegrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong>Technologies<strong>The</strong> Value of Integration<strong>The</strong> more tightly integrated the outsourced service provider’sor internal service managers’ <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> tools <strong>and</strong>technologies are, the more effective they will be in scaling,maximizing service efficiencies, reducing costs, increasingclient satisfaction <strong>and</strong> improving net profits.In the same regard, failing to integrate these tools, along withtheir independent workflows <strong>and</strong> processes, will increaseinefficiencies <strong>and</strong> prolong the time it takes to deliver services,requiring more manual labor-intensive activity to conduct<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> functions <strong>and</strong> consolidate reportingacross disparate systems <strong>and</strong> solutions. This slows analysis ofkey performance metrics <strong>and</strong> indicators, negatively impactingoverall operational oversight.<strong>The</strong> obvious best answer for the outsourced service provideror internal service manager is so select a suite of solutionsthat can be integrated to deliver a superior set of benefits incombination than would otherwise be possible.With this underst<strong>and</strong>ing, the outsourced service provider orinternal service manager will utilize their Remote Monitoring<strong>and</strong> Management tools’ <strong>and</strong> Professional <strong>Service</strong>s Automation<strong>and</strong> Voice Communications solutions’ integration capabilities93


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Integrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologiesto automate <strong>and</strong> reduce the manual labor necessary tomanage automated alerts for monitored devices, operatingsystems, applications <strong>and</strong> services, as well as user-generatedservice requests as much as possible.In addition to call recording <strong>and</strong> reporting benefits, whenconducting any required voice communications with end usersor clients, staff efficiencies <strong>and</strong> response times can beimproved by utilizing “click to dial” functionality avail<strong>able</strong>through integration of the outsourced service provider’s orinternal service manager’s Voice Communications solution<strong>and</strong> their Professional <strong>Service</strong>s Automation’s CRM module,alleviating the need to manually look up the correct contactnumbers <strong>and</strong> physically dial them.And when the necessity arises to conduct a remote access orcontrol session during incident management, the ability toutilize the outsourced service provider’s or internal servicemanager’s Remote Monitoring <strong>and</strong> Management tool’s builtinRemote Access <strong>and</strong> Control functionality speeds incidentresponse <strong>and</strong> resolution times.A potential outcome for this type of tight integration mayresemble the following:1. An alert is raised by the Remote Monitoring <strong>and</strong>Management tool based upon a monitored device94


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Integrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologiesreporting an error or becoming unreach<strong>able</strong>, or as aresult of a monitored service outage2. <strong>The</strong> Remote Monitoring <strong>and</strong> Management tool opens aservice request in the Professional <strong>Service</strong>sAutomation solution’s <strong>Service</strong> <strong>Desk</strong> module <strong>and</strong>provides the granular data necessary for incidentmanagement <strong>and</strong> reporting to commence3. <strong>The</strong> Professional <strong>Service</strong>s Automation solution queriesits internal database <strong>and</strong> appends additional keyinformation to the service request such as informationabout the device <strong>and</strong> its configuration, the error, timeof the alert, end user or client location <strong>and</strong> contactinformation <strong>and</strong> contract or SLA information <strong>and</strong> othernecessary data to support incident management4. Based upon the type of alert, the Professional <strong>Service</strong>sAutomation solution designates a priority to theservice request, <strong>and</strong> an escalation process to maintainSLA, <strong>and</strong> assigns it to a support queue or a specificresource5. <strong>The</strong> Professional <strong>Service</strong>s Automation solutionmessages all affected parties of the nature of the alert<strong>and</strong> sets the end user’s or client’s expectations forincident management6. <strong>The</strong> service request is addressed successfully by theoutsourced service provider’s or internal service95


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Integrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologiesmanager’s <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> staff; by utilizing theirRemote Monitoring <strong>and</strong> Management tool’s RemoteAccess <strong>and</strong> Control function, <strong>and</strong> documenting theirincident resolution activities, <strong>and</strong> the service request iseventually closed after appropriate QA activity isconducted7. If the need to communicate directly with the affectedend user or client is required, the integration betweenthe Professional <strong>Service</strong>s Automation solution’s CRMcomponent <strong>and</strong> the outsourced service provider’s orinternal service manager’s Voice Communicationssolution can be leveraged through onscreen click-todialfunctionality, with call documenting, timestamping<strong>and</strong> recording of each support call <strong>and</strong>appending it to the service request happeningautomatically8. <strong>The</strong> Professional <strong>Service</strong>s Automation solutioncommunicates the resolution status of the servicerequest to the Remote Monitoring <strong>and</strong> Managementtool, which then cancels the alert9. <strong>The</strong> outsourced service provider or internal servicemanager can now run consolidated reports <strong>and</strong>analytics against this <strong>and</strong> all incidents, aggregatingdata from the Remote Monitoring <strong>and</strong> Management96


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Integrating <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technologiestool <strong>and</strong> the Voice Communications <strong>and</strong> Professional<strong>Service</strong>s Automation solutionsAlert Raised ByRMM ToolRMM Tool Opens<strong>Service</strong> Requestin PSA SolutionPSA SolutionDocuments<strong>Service</strong> RequestPSA SolutionAssigns Priority,Escalation, QueuePSA SolutionMessagesAffected PartiesIncidentManagementActivity OccursPSA SolutionMessagesAffected PartiesPSA SolutionCancels Alert InRMM ToolConsolidatedReporting AndAnalytics OccursFigure 20 – <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Tools <strong>and</strong> Technology IntegrationSupporting Incident Management <strong>and</strong> Reporting97


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 3 – <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Deliver<strong>able</strong>sSection 3: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>Deliver<strong>able</strong>sIn this section we will explore a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’sdeliver<strong>able</strong>s, along with end user or client-facing requirementsnecessary for effective service delivery. <strong>The</strong>se considerationsinclude managing:HardwareUsersOperating SystemsLocationsSoftware ApplicationsVendors<strong>Service</strong>sAgreements/SLAs<strong>Service</strong>sUsersApplicationsLocationsOSVendorsHardware<strong>NOC</strong>/SVC<strong>Desk</strong>SLAsFigure 21 – <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Focus98


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>s<strong>NOC</strong> <strong>Service</strong>s<strong>The</strong> <strong>NOC</strong> <strong>and</strong> Its Deliver<strong>able</strong>sIn order to insure high availability of hardware, operatingsystems, software applications <strong>and</strong> services undermanagement, the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> must continuously monitor theiroperating states <strong>and</strong> implement an alerting <strong>and</strong> responseprocess to address incidents when these operating statesdeviate from established parameters.In addition to continuously monitoring <strong>and</strong> reactivelyresponding to alerts from managed endpoints <strong>and</strong> services,the <strong>NOC</strong> delivers proactive maintenance services such aspatching <strong>and</strong> updating operating systems, softwareapplications <strong>and</strong> device configurations, <strong>and</strong> optimizing theoperational states of host devices <strong>and</strong> systems throughactivities such as deletion of temporary files, diskdefragmentation, Active Directory, DNS, DHCP <strong>and</strong> Event Logmanagement <strong>and</strong> pruning.Remote Monitoring <strong>and</strong> ManagementIn order to maintain managed systems per service <strong>and</strong>maintenance agreements <strong>and</strong> their SLAs, the outsourcedservice provider or internal service manager must conductcontinuous monitoring of these systems <strong>and</strong> services. This isfacilitated through the Remote Monitoring <strong>and</strong> Management99


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>stool’s capabilities. <strong>The</strong>re are specific actions that need to becarried out prior to official “turn up”, or “go-live” ofmonitoring services for a new end user or client location.<strong>The</strong>se may include:Setting up the end user’s or client’s account in theRemote Monitoring <strong>and</strong> Management tool <strong>and</strong>Professional <strong>Service</strong>s Automation solutionIf the Remote Monitoring <strong>and</strong> Management tool isappliance-based, configuring <strong>and</strong> deploying theappliance per manufacturer or vendorrecommendations for secure communications to <strong>and</strong>from the end user or client location <strong>and</strong> theoutsourced service provider’s or internal servicemanager’s <strong>NOC</strong>, Datacenter or <strong>Service</strong> <strong>Desk</strong>If the Remote Monitoring <strong>and</strong> Management tool isagent-based, configuring <strong>and</strong> deploying agents asrequired to monitor managed devices, operatingsystems, software applications <strong>and</strong> services permanufacturer or vendor recommendations <strong>and</strong>enabling secure Remote Access <strong>and</strong> Control <strong>and</strong>communications to <strong>and</strong> from the end user or clientlocation <strong>and</strong> the outsourced service provider’s orinternal service manager’s <strong>NOC</strong>, Datacenter or <strong>Service</strong><strong>Desk</strong>100


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>sIf applic<strong>able</strong>, initializing a discovery routine by theRemote Monitoring <strong>and</strong> Management tool to identifyall network-connected devices <strong>and</strong> their roles in theenvironmentAssociating the applic<strong>able</strong> Remote Monitoring <strong>and</strong>Management tool’s default monitoring templates fromits template library to all identified devices, operatingsystems, software applications <strong>and</strong> servicesDeveloping base monitoring templates <strong>and</strong> assigningthem to all devices, operating systems, softwareapplications <strong>and</strong> services which the RemoteMonitoring <strong>and</strong> Management tool did not identify ordoes not have a default template forTesting <strong>and</strong> confirming proper two-waycommunications <strong>and</strong> alerting to <strong>and</strong> from manageddevices, operating systems, software applications <strong>and</strong>services at the end user or client location <strong>and</strong> theoutsourced service provider’s or internal servicemanager’s <strong>NOC</strong>, Datacenter or <strong>Service</strong> <strong>Desk</strong>Configuring, testing <strong>and</strong> confirming proper operationof the Remote Monitoring <strong>and</strong> Management tool’sRemote Access <strong>and</strong> Control function for manageddevices <strong>and</strong> operating systemsConfiguring, testing <strong>and</strong> confirming proper two-wayintegration with the Professional <strong>Service</strong> Automation101


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>sSolution; with raised alerts resulting in properlyformatted service request generation including enduser, device <strong>and</strong> client identification information, aswell as correct status updating <strong>and</strong> alert cancellationoccurring in the Remote Monitoring <strong>and</strong> Managementtool upon service request resolution in the Professional<strong>Service</strong>s Automation solutionConfiguring, testing <strong>and</strong> confirming proper scripting<strong>and</strong> deployment of unattended operating system <strong>and</strong>supported software application patches <strong>and</strong> updatesConfiguring, testing <strong>and</strong> confirming proper scripting<strong>and</strong> execution of unattended device <strong>and</strong> operatingsystem optimization activities such as deletion oftemporary files <strong>and</strong> disk defragmentationConfiguring, testing <strong>and</strong> confirming proper reportgeneration <strong>and</strong> automated report deliveryIntegrating Remote Monitoring <strong>and</strong> Management toolreporting into Professional <strong>Service</strong>s Automationsolution <strong>and</strong> testingTweaking <strong>and</strong> tuning thresholds, alerting <strong>and</strong> reportingduring an initial analysis period to insure outcomesmeet expectationsProactive Maintenance102


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>sOnce the end user’s or client’s environment has been properlyprepared to receive <strong>NOC</strong> services in this manner <strong>and</strong> basedupon the associated SLA, the outsourced service provider orinternal service manager will create a proactive maintenanceschedule for the managed devices, operating systems,software applications <strong>and</strong> services at the end user or clientlocation. This schedule will govern the maintenance activitiesto be delivered by the <strong>NOC</strong> staff, <strong>and</strong> may include:Keeping operating system <strong>and</strong> software applicationservice packs, patches <strong>and</strong> hotfixes currentOptimizing operating systems, software applications,backups <strong>and</strong> hardwareRebooting servers <strong>and</strong> critical devicesInstalling software updates <strong>and</strong> upgradesOptimizing logical directory structures <strong>and</strong> keeping ActiveDirectory Schemas <strong>and</strong> DNS configurations current<strong>The</strong> outsourced service provider or internal service managerwill leverage the Remote Monitoring <strong>and</strong> Management tool’sability to perform as much of this scheduled maintenanceactivity as possible during off-hours, report on outcomes <strong>and</strong>alert on failures, <strong>and</strong> provide the benefit of st<strong>and</strong>ardizingthese activities across the end user or client base <strong>and</strong> freeingvalu<strong>able</strong> human resources for other activities.103


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>sIn addition to delivering scheduled maintenance activities, the<strong>NOC</strong> will review the Remote Monitoring <strong>and</strong> Managementtool’s monitoring reports daily to analyze the operating stateof managed devices, operating systems, software applications<strong>and</strong> services to identify service degradation or potential failurein advance of its occurrence in order to take proactivepreventative measures.Reactive Response <strong>and</strong> Incident Management<strong>The</strong> <strong>NOC</strong> will also respond to the Remote Monitoring <strong>and</strong>Management tool’s alerts; indicating a device, operatingsystem, software application or service is functioning outsideof recommended parameters, <strong>and</strong> begin incidentmanagement activity reactively in these situations.Some commonly monitored events by the <strong>NOC</strong> through theRemote Monitoring <strong>and</strong> Management tool may include:BackupsConnectivityCloud/Email/Web/SQL/FTP <strong>Service</strong>sWindows <strong>Service</strong>s/EventsDevice Memory Utilization/PerformanceDevice Processor Utilization/PerformanceDevice Hard Drive Utilization/PerformanceRouter/Firewall Logs104


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>NOC</strong> <strong>Service</strong>sAntivirus AlertsNetwork Security/Unusual Traffic/AttacksVoIP QOSVPNsUser Sessions/Authentication105


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>s<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>s<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> Its Deliver<strong>able</strong>sIn order to insure high availability of end user’s or client’sinformation technology-supported business processes,activities <strong>and</strong> workflows, the outsourced service provider’s orinternal service manager’s <strong>Service</strong> <strong>Desk</strong> must be equipped toaddress incidents when these processes, activities <strong>and</strong>workflows are degraded or interrupted.Focused primarily on end user issues, the <strong>Service</strong> <strong>Desk</strong>functions as the single point of contact for end users orclients, <strong>and</strong> facilitates the restoration of normal serviceoperation while minimizing impact to the user <strong>and</strong> deliveringservices within agreed-upon SLA’s. In this capacity the <strong>Service</strong><strong>Desk</strong> works directly with the end user or client, as well as withthe <strong>NOC</strong> as needed to fulfill its responsibilities.SPOCIMRSLA• Single Point of Contact for End Users• Incident Management & Resolution• Maintain <strong>Service</strong> Level AgreementsFigure 22 – <strong>Service</strong> <strong>Desk</strong> Responsibilities106


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>sIn order to achieve its objectives, the <strong>Service</strong> <strong>Desk</strong> will conductthe following end user or client-facing activities:Receive all incident notifications – this can be throughany means established by the outsourced serviceprovider or internal service manager - phone, fax,portal or emailRecord all incidents – this is accomplished through theProfessional <strong>Service</strong>s Automation solution’s <strong>Service</strong><strong>Desk</strong> componentClassify all incidents – correctly document the natureof the incident, including affected users, systems,devices <strong>and</strong> servicesPrioritize all incidents – proper prioritization isessential to effective escalationRoute all incidents – based upon factors such asclassification <strong>and</strong> priority, the incident is assigned tothe appropriate queue or resource for incidentmanagement <strong>and</strong> resolutionTroubleshoot all incidents – perform establishedtroubleshooting <strong>and</strong> incident management activityaccording to manufacturer’s <strong>and</strong> vendor’s bestpractices <strong>and</strong> outsourced service provider’s or internalservice manager’s established proceduresEscalate all incidents as necessary – proper internal<strong>and</strong> external escalation insures adherence toestablished SLAs, including escalation to 3 rd -partyvendors for support107


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>s Dispatch resources as needed – if included in the enduser’s or client’s agreement <strong>and</strong> SLA, the <strong>Service</strong> <strong>Desk</strong>will perform dispatch functions <strong>and</strong> schedule onsitevisits by internal or external physical resourcesincluding 3 rd -party vendors per its establishedescalation process Maintain consistent communication with all parties –including end users, their managers <strong>and</strong> higher, onsiteresources including 3 rd -party vendors, <strong>and</strong> internal<strong>Service</strong> <strong>Desk</strong> management hierarchy Perform all scheduled activities – including but notlimited to moves/adds/changes, maintenance,documentation <strong>and</strong> reportingIn order to maintain an effective <strong>Service</strong> <strong>Desk</strong>, internalobjectives need to be clear, end user <strong>and</strong> client requirements<strong>and</strong> SLAs documented <strong>and</strong> understood; incident management,escalation <strong>and</strong> dispatch processes st<strong>and</strong>ardized <strong>and</strong> followed,<strong>and</strong> training for <strong>Service</strong> <strong>Desk</strong> staff as well as end users <strong>and</strong>clients needs to be conducted regularly. <strong>Service</strong> <strong>Desk</strong>deliver<strong>able</strong>s need to be clearly defined <strong>and</strong> service levelsmonitored regularly <strong>and</strong> modified as needed. Additionally,clearly defined response, resolution <strong>and</strong> escalation times mustbe incorporated into an SLA <strong>and</strong> communicated to <strong>Service</strong><strong>Desk</strong> staff as well as to end users <strong>and</strong> clients.108


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>s<strong>The</strong>re are specific actions that need to be carried out prior toofficial “turn up”, or “go-live” of <strong>Service</strong> <strong>Desk</strong> services for anew end user or client location.<strong>The</strong>se may include:Setting up the end user’s or client’s account in theProfessional <strong>Service</strong>s Automation solution <strong>and</strong> RemoteMonitoring <strong>and</strong> Management toolConfiguring, testing <strong>and</strong> confirming end user’s orclient’s ability to generate properly formatted servicerequests with all required information via email <strong>and</strong>the Professional <strong>Service</strong>s Automation solution’s <strong>Service</strong><strong>Desk</strong> portalAfter the Remote Monitoring <strong>and</strong> Management toolhas been deployed <strong>and</strong> configured, testing <strong>and</strong>confirming the proper operation of its Remote Access<strong>and</strong> Control function for managed devices <strong>and</strong>operating systemsConfiguring, testing <strong>and</strong> confirming proper two-wayintegration with the Remote Monitoring <strong>and</strong>Management tool; with raised alerts resulting inproperly formatted service request generationincluding end user, device <strong>and</strong> client identificationinformation included, as well as correct statusupdating <strong>and</strong> alert cancellation occurring in the109


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> <strong>Desk</strong> <strong>Service</strong>sRemote Monitoring <strong>and</strong> Management tool uponservice request resolution in the Professional <strong>Service</strong>sAutomation solutionIntegrating Remote Monitoring <strong>and</strong> Management toolreporting into Professional <strong>Service</strong>s Automationsolution <strong>and</strong> testingConfiguring, testing <strong>and</strong> confirming proper reportgeneration <strong>and</strong> automated report delivery110


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Vendor Management <strong>Service</strong>sVendor Management <strong>Service</strong>s<strong>The</strong> Value of Vendor ManagementVendor management is the process whereby the outsourcedservice provider’s or internal service manager’s <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> manages all interactions with the end user’s orclient’s infrastructure vendors. This offloads that responsibilityfrom the end user or client <strong>and</strong> allows them to focus onrunning their business. This service adds tremendous value tothe relationship between the end user or client <strong>and</strong> theoutsourced service provider or internal service manager; as nomatter whether through an automatically-generated alert, orvia the end user or client generating a service request directly,any incident requiring 3 rd -party vendor support for issuesaffecting their infrastructure is managed by the <strong>NOC</strong> or<strong>Service</strong> <strong>Desk</strong>.All vendor management activity, including activity conductedby infrastructure vendors during incident resolution, isdocumented in the Professional <strong>Service</strong>s Automation solutionby the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> per the outsourced serviceprovider’s or internal service manager’s st<strong>and</strong>ard incidentmanagement processes <strong>and</strong> procedures.This service saves the end user or client the time <strong>and</strong> potentialfrustration of dealing with numerous vendors <strong>and</strong> also allowsthe outsourced service provider or internal service manager to111


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Vendor Management <strong>Service</strong>sproactively manage all infrastructure vendor activity. <strong>The</strong> <strong>NOC</strong><strong>and</strong> <strong>Service</strong> <strong>Desk</strong> works with these vendors directly to eitherquickly resolve issues or schedule on-site vendor visits - bothhave been found to tremendously improve efficiencies <strong>and</strong>incident response <strong>and</strong> resolution times, hence improvingclient satisfaction.End user or client infrastructure vendors that the outsourcedservices provider or internal service manager agree to managemay include:Telco/Long Distance/Teleconferencing vendorsBroadb<strong>and</strong> vendorsFax/Copier/Printer vendorsWeb/Application Development/Database vendorsLine of Business Software vendorsHosting/Co-Location vendorsEquipment vendorsPoint of Sale vendorsPhone/VoIP System vendorsPhone/VoIP <strong>Service</strong> vendorsCellular/Smartphone/PDA <strong>Service</strong> vendorsStructured Cabling vendorsIn order to provide Vendor Management services effectively,the outsourced service provider or internal service managermust provide all infrastructure vendors under management aLetter of Agency (LOA) signed by the end user or client, which112


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Vendor Management <strong>Service</strong>sgrants them the authority to act on their behalf, allowingthem the ability to open service requests <strong>and</strong> schedulemaintenance <strong>and</strong> repair services as necessary.113


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!ReportingReporting<strong>The</strong> Value of Reporting<strong>The</strong> outsourced service provider or internal service managerwill integrate the Remote Monitoring <strong>and</strong> Management tool’sreporting function with the Voice Communication’s <strong>and</strong>Professional <strong>Service</strong>s Automation solution’s to generate rich,customized consolidated reports for internal <strong>and</strong> external (orend user or client-facing) purposes.<strong>The</strong> outsourced service provider or internal service managerwill utilize specifically customized reports internally to analyzekey metrics to evaluate <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> performance<strong>and</strong> modify internal processes <strong>and</strong> procedures to improveoutcomes.Externally, the outsourced service provider or internal servicemanager will utilize specifically customized reports with endusers or clients to validate the successful delivery of serviceswithin SLA <strong>and</strong> according to existing service agreements; aswell as to identify opportunities to improve the availability orperformance of existing devices, operating systems, softwareapplications <strong>and</strong> services through activities outside of thescope of the existing agreement or SLA. <strong>The</strong>se activities mayinvolve replacement or reconfiguration, which may or may notbe conducted by the outsourced service provider or internal114


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Reportingservice manager or their staff, but instead by an outsidevendor or other provider.Report areas commonly avail<strong>able</strong> through a RemoteMonitoring <strong>and</strong> Management tool <strong>and</strong> Voice Communications<strong>and</strong> Professional <strong>Service</strong>s Automation solutions may include:Device, operating system, software application <strong>and</strong>service performance reportingDevice, operating system, software application <strong>and</strong>service maintenance reportingAlert <strong>and</strong> service request reportingCall-specific accounting reportingEnd user, client, <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> resourceperformance reportingSLA performance reportingOther customiz<strong>able</strong> KPI reportingWhen properly integrated <strong>and</strong> customized to providemeaningful data, these reports are a key tool utilized by theoutsourced service provider or internal service manager toimprove the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’s performance <strong>and</strong>efficiencies, yielding greater net profits, as well as increasingend user or client satisfaction.When creating end user or client-facing reports, it is a goodidea to develop two versions – a very high-level executive115


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Reportingsummary, <strong>and</strong> a more detailed report. In many cases, endusers or clients will prefer the executive summary report overthe detailed report. Always have the detailed report avail<strong>able</strong>when conducting strategic meetings with the end user orclient, as you may wish to refer to it to dig deeper on specifictopics during the conversation.When developing your executive summary report template,make certain to include as many visual elements to representthe data as possible. <strong>The</strong> more charts, graphs <strong>and</strong> visualelements <strong>and</strong> less text, the better.116


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?Support ConsiderationsWhile an internal service manager <strong>and</strong> their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> staff; whose responsibilities are to support an internalcorporate IT infrastructure, may have little or no influence onestablishing minimum requirements for the devices, operatingsystems, software applications <strong>and</strong> services they maintain inorder to receive services, outsourced service providers may bemore fortunate.Whenever possible, the outsourced service provider orinternal service manager should strive to establish <strong>and</strong>maintain minimum st<strong>and</strong>ards for service qualification. Thishelps st<strong>and</strong>ardize on hardware, operating systems, softwareapplications <strong>and</strong> services, allowing the outsourced serviceprovider or internal service manager to require their <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> staff to maintain proficiencies, skill sets <strong>and</strong>certifications on a controlled number of supported items,rather than a growing, ever-changing variety of systems <strong>and</strong>services. <strong>The</strong> benefits of this philosophy should be obvious,<strong>and</strong> include:More efficient <strong>and</strong> effective maintenance <strong>and</strong> incidentresolutionFaster on-boarding of new end users or clients117


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?Speedier training <strong>and</strong> knowledge transfer by <strong>and</strong>between new <strong>and</strong> existing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staffEasier end user or client infrastructure setup <strong>and</strong>configuration of Remote Monitoring <strong>and</strong> Managementtools <strong>and</strong> Professional <strong>Service</strong>s Automation solutionsSt<strong>and</strong>ardized performance metrics <strong>and</strong> reportingAs a result of these <strong>and</strong> other benefits, end user or clientsatisfaction is increased, <strong>and</strong> the outsourced service provider’sor internal service manager’s <strong>and</strong> their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>staff’s jobs are made much easier.Some minimum st<strong>and</strong>ards required for an outsourced serviceprovider or internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>to provide services for hardware, operating systems, softwareapplications <strong>and</strong> services at end user or client locations mayinclude:Specific vendor-supported server, desktop <strong>and</strong> laptophardware <strong>and</strong> BIOS versionsSpecific vendor-supported routers, access points,switches <strong>and</strong> firewallsSpecific vendor-supported voice hardware <strong>and</strong> BIOSversionsSpecific vendor-supported cellular, Smartphone <strong>and</strong>PDA hardware <strong>and</strong> operating system versions118


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?Hardware warranties for specific hardwareSpecific vendor-supported operating systems <strong>and</strong>patch levelsSpecific vendor-supported line of business softwareapplications, versions <strong>and</strong> patch levelsSpecific vendor-supported antivirus, anti-spam <strong>and</strong>anti-spyware solutions, versions <strong>and</strong> patch levelsSpecific vendor-supported backup solutions, versions<strong>and</strong> patch levelsRemote data storageSpecific network security protocols <strong>and</strong> access controlsSpecific broadb<strong>and</strong> requirementsOther specific 3 rd -party vendor relationshipsIn addition to qualifying the terms under which support will beprovided by the outsourced service provider or internalservice manager to the end user or client, it is equallyimportant to establish the services that will be considered outof scope <strong>and</strong> specifically excluded from <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>deliver<strong>able</strong>s <strong>and</strong> SLAs. Some examples of out of scope servicesmay include:Servicing parts, equipment or software not covered byvendor/manufacturer warranty or support<strong>The</strong> cost of any parts, equipment, or shipping charges119


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?<strong>The</strong> cost of any software, licensing, or softwarerenewal or upgrade fees<strong>The</strong> cost of any 3 rd -party vendor or manufacturersupport or incident fees required to deliver service<strong>The</strong> cost to bring the end user’s or client’senvironment up to minimum st<strong>and</strong>ards required forservicesFailure due to acts of God, building modifications,power failures or other adverse environmentalconditions or factors outside of the control of theoutsourced service provider or internal servicemanager<strong>Service</strong> <strong>and</strong> repair made necessary by the alteration ormodification of equipment, operating systems,software applications or services other than thatauthorized by the outsourced service provider’s orinternal service manager’s <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> staff;including alterations, software installations ormodifications of any kind made by end users, the clientor their vendors, or anyone other than the outsourcedservice provider’s or internal service manager’s <strong>NOC</strong> or<strong>Service</strong> <strong>Desk</strong> staffMaintenance of software applications unlessspecifically included in service agreement <strong>and</strong> SLAProgramming (modification of software code) <strong>and</strong>program (software) unless specifically included inservice agreement <strong>and</strong> SLATraining services of any kind120


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What Should a <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Support?It is important that any <strong>and</strong> all qualifiers for service such asthese be clearly understood by the end user or client prior toengagement <strong>and</strong> on-boarding by the outsourced serviceprovider or internal service manager. This will reducemisunderst<strong>and</strong>ings <strong>and</strong> instead improve client satisfactionduring service delivery.121


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs<strong>Service</strong> Agreements <strong>and</strong> SLAs<strong>Service</strong> Agreement Considerations<strong>The</strong> outsourced service provider’s or internal servicemanager’s <strong>Service</strong> Level Agreement (SLA) is the agreementthat binds their level of service between their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> deliver<strong>able</strong>s <strong>and</strong> their end users or clients, <strong>and</strong> recordsthe common underst<strong>and</strong>ing regarding:<strong>Service</strong>sPrioritiesResponsibilitiesGuaranteesAvailability<strong>Service</strong>abilityPerformanceOperationResponseResolutionAgreements are commonly written to include SLAs inspecific sections, along with service definitions, <strong>and</strong> mayinclude:Definition of servicesTerm of agreementFees <strong>and</strong> payment schedule122


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsTaxesCoverage hoursExclusionsPerformance measurementIncident management process <strong>and</strong> response timeLimitation of liability<strong>Service</strong> requirementsCovered equipment <strong>and</strong>/or services<strong>The</strong> following is an example of an outsourced serviceprovider’s Managed <strong>Service</strong>s Agreement <strong>and</strong> SLA.Managed <strong>Service</strong>s Agreement <strong>and</strong> SLA ExampleThis sample Managed <strong>Service</strong>s Agreement <strong>and</strong> SLA is includedfor instructional <strong>and</strong> informational purposes only, <strong>and</strong> is notrecommended, nor warranted for use.Always have legal counsel review any <strong>and</strong> all agreements ordocuments that you utilize in your IT practice or business unit,or distribute to your end users or clients prior to doing so.Local laws <strong>and</strong> liabilities can never be fully covered by any typeof generic document, including this sample Managed <strong>Service</strong>sAgreement <strong>and</strong> SLA.123


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsManaged <strong>Service</strong>s Agreement <strong>and</strong> SLA1. Term of AgreementThis Agreement between_______________________________, herein referred toas Client, <strong>and</strong> _______________________________,hereinafter referred to as <strong>Service</strong> Provider, is effectiveupon the date signed, shall remain in force for a period ofthree years, <strong>and</strong> be reviewed annually to address anynecessary adjustments or modifications. Shouldadjustments or modifications be required that increasethe monthly fees paid for the services rendered underthis Agreement, these increases will not exceed ______%of the value of the existing monthly fees due under thisAgreement. <strong>The</strong> <strong>Service</strong> Agreement automaticallyrenews for a subsequent three year term beginning onthe day immediately following the end of the Initial Term,unless either party gives the other ninety (90) days priorwritten notice of its intent not to renew this Agreement.a) This Agreement may be terminated by the Client124


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsupon ninety (90) days’ written notice if the <strong>Service</strong>Provider:I. Fails to fulfill in any material respect itsobligations under this Agreement <strong>and</strong>does not cure such failure within thirty(30) days’ of receipt of such writtennotice.II.III.Breaches any material term or conditionof this Agreement <strong>and</strong> fails to remedysuch breach within thirty (30) days’ ofreceipt of such written notice.Terminates or suspends its businessoperations, unless it is succeeded by apermitted assignee under thisAgreement.b) This Agreement may be terminated by the<strong>Service</strong> Provider upon ninety (90) days writtennotice to the Client.c) If either party terminates this Agreement, <strong>Service</strong>Provider will assist Client in the orderlytermination of services, including timely transfer125


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsof the services to another designated provider.Client agrees to pay <strong>Service</strong> Provider the actualcosts of rendering such assistance.2. Fees <strong>and</strong> Payment ScheduleFees will be $_______________ per month, invoiced toClient on a monthly basis, <strong>and</strong> will become due <strong>and</strong>pay<strong>able</strong> on the first day of each month. <strong>Service</strong>s will besuspended if payment is not received within 5 daysfollowing date due. Refer to Appendix B for servicescovered by the monthly fee under the terms of thisAgreement.It is understood that any <strong>and</strong> all services requested byClient that fall outside of the terms of this Agreementwill be considered Projects, <strong>and</strong> will be quoted <strong>and</strong>billed as separate, individual <strong>Service</strong>s.3. TaxesIt is understood that any Federal, State or Local Taxesapplic<strong>able</strong> shall be added to each invoice for servicesor materials rendered under this Agreement. Clientshall pay any such taxes unless a valid exemption126


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAscertificate is furnished to <strong>Service</strong> Provider for the stateof use.4. CoverageRemote Helpdesk <strong>and</strong> Vendor Management of Client’sIT networks will be provided to the Client by <strong>Service</strong>Provider through remote means between the hours of8:00 am – 5:00 pm Monday through Friday, excludingpublic holidays. Network Monitoring <strong>Service</strong>s will beprovided 24/7/365. All services qualifying under theseconditions, as well as <strong>Service</strong>s that fall outside thisscope will fall under the provisions of Appendix B.Hardware costs of any kind are not covered under theterms of this Agreement.Support <strong>and</strong> Escalation<strong>Service</strong> Provider will respond to Client’s Trouble Ticketsunder the provisions of Appendix A, <strong>and</strong> with best effortafter hours or on holidays. Trouble Tickets must beopened by Client’s designated I.T. Contact Person, byemail to our Help <strong>Desk</strong>, or by phone if email isunavail<strong>able</strong>. Each call will be assigned a Trouble Ticketnumber for tracking. Our escalation process is detailedin Appendix A.<strong>Service</strong> outside Normal Working Hours127


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsEmergency services performed outside of the hours of8:00 am – 5:00 pm Monday through Friday, excludingpublic holidays, shall be subject to provisions ofAppendix B.<strong>Service</strong> Calls Where No Trouble is foundIf Client requests onsite service <strong>and</strong> no problem isfound or reproduced, Client shall be billed at thecurrent applic<strong>able</strong> rates as indicated in Appendix B.Limitation of LiabilityIn no event shall <strong>Service</strong> Provider be held li<strong>able</strong> forindirect, special, incidental or consequential damagesarising out of service provided hereunder, includingbut not limited to loss of profits or revenue, loss of useof equipment, lost data, costs of substitute equipment,or other costs.5. Additional Maintenance <strong>Service</strong>sHardware/System Support128


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs<strong>Service</strong> Provider shall provide support of all hardware<strong>and</strong> systems specified in Appendix B, provided that allHardware is covered under a currently active vendorsupport contract; or replace<strong>able</strong> parts be readilyavail<strong>able</strong>, <strong>and</strong> all Software be Genuine, CurrentlyLicensed <strong>and</strong> Vendor-Supported. Should any hardware orsystems fail to meet these provisions, they will beexcluded from this <strong>Service</strong> Agreement. Should 3 rd Partyvendor support charges be required in order to resolveany issues, these will be passed on to the Client after firstreceiving the Client’s authorization to incur them.Virus Recovery for current, licensed Antivirus protectedsystemsDamages caused by, <strong>and</strong> recovery from, virus infectionnot detected <strong>and</strong> quarantined by the latest Antivirusdefinitions are covered under the terms of thisAgreement. This <strong>Service</strong> is limited to those systemsprotected with a currently licensed, vendor-supportedAntivirus solution.Monitoring <strong>Service</strong>s<strong>Service</strong> Provider will provide ongoing monitoring <strong>and</strong>security services of all critical devices as indicated inAppendix B. <strong>Service</strong> Provider will provide monthly129


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsreports as well as document critical alerts, scans <strong>and</strong>event resolutions to Client. Should a problem bediscovered during monitoring, <strong>Service</strong> Provider shallmake every attempt to rectify the condition in a timelymanner through remote means.6. Suitability of Existing EnvironmentMinimum St<strong>and</strong>ards Required for <strong>Service</strong>sIn order for Client’s existing environment to qualify for<strong>Service</strong> Provider’s Managed <strong>Service</strong>s, the followingrequirements must be met:1. All Servers with Microsoft Windows OperatingSystems must be running Windows 2008 Serveror later, <strong>and</strong> have all of the latest Microsoft<strong>Service</strong> Packs <strong>and</strong> Critical Updates installed.2. All <strong>Desk</strong>top PC’s <strong>and</strong> notebooks/laptops withMicrosoft Windows operating systems must berunning Windows 7 or later, <strong>and</strong> have all of thelatest Microsoft service packs <strong>and</strong> criticalupdates installed.130


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs3. All Server <strong>and</strong> <strong>Desk</strong>top Software must begenuine, licensed <strong>and</strong> vendor-supported.4. <strong>The</strong> environment must have a currentlylicensed, up-to-date <strong>and</strong> vendor-supportedserver-based antivirus solution protecting allservers, desktops, notebooks/laptops, <strong>and</strong>email.5. <strong>The</strong> environment must have a currently licensed,vendor-supported server-based backup solution.6. <strong>The</strong> environment must have a currentlylicensed, vendor-supported hardware firewallbetween the internal network <strong>and</strong> the Internet.7. Any Wireless data traffic in the environmentmust be secured with a minimum of 128bitdata encryption.Costs required to bring Client’s environment up tothese Minimum St<strong>and</strong>ards are not included in thisAgreement.7. Excluded <strong>Service</strong>s<strong>Service</strong> rendered under this Agreement does notinclude:131


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs1) Parts, equipment or software not covered byvendor/manufacturer warranty or support.2) <strong>The</strong> cost of any parts, equipment, or shippingcharges of any kind.3) <strong>The</strong> cost of any software, licensing, or softwarerenewal or upgrade fees of any kind.4) <strong>The</strong> cost of any 3 rd party vendor ormanufacturer support or incident fees of anykind.5) <strong>The</strong> cost to bring Client’s environment up tominimum st<strong>and</strong>ards required for <strong>Service</strong>s.6) Failure due to acts of God, buildingmodifications, power failures or other adverseenvironmental conditions or factors.7) <strong>Service</strong> <strong>and</strong> repair made necessary by thealteration or modification of equipment otherthan that authorized by <strong>Service</strong> Provider,including alterations, software installations ormodifications of equipment made by Client’semployees or anyone other than <strong>Service</strong>Provider.8) Maintenance of Applications softwarepackages, whether acquired from <strong>Service</strong>Provider or any other source unless as specifiedin Appendix B.132


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs9) Programming (modification of software code)<strong>and</strong> program (software) maintenance unless asspecified in Appendix B.10) Training <strong>Service</strong>s of any kind.8. MiscellaneousThis Agreement shall be governed by the laws of theState of __________. It constitutes the entireAgreement between Client <strong>and</strong> <strong>Service</strong> Provider formonitoring/maintenance/service of all equipmentlisted in “Appendix B.” Its terms <strong>and</strong> conditions shallprevail should there be any variance with the terms<strong>and</strong> conditions of any order submitted by Client.<strong>Service</strong> Provider is not responsible for failure to renderservices due to circumstances beyond its controlincluding, but not limited to, acts of God.9. Acceptance of <strong>Service</strong> AgreementThis <strong>Service</strong> Agreement covers only those services <strong>and</strong>equipment listed in “Appendix B.” <strong>Service</strong> Providermust deem any equipment/services Client may want toadd to this Agreement after the effective dateaccept<strong>able</strong>. <strong>The</strong> addition of equipment/services notlisted in “Appendix B” at the signing of this Agreement,133


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsif accept<strong>able</strong> to <strong>Service</strong> Provider, shall result in anadjustment to the Client’s monthly charges.IN WITNESS WHEREOF, the parties hereto have caused this<strong>Service</strong> Agreement to be signed by their duly authorizedrepresentatives as of the date set forth below.Authorized Signature <strong>Service</strong> Provider DateAuthorized Signature Client Date134


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsManaged <strong>Service</strong>s AgreementAppendix AResponse <strong>and</strong> Resolution Times<strong>The</strong> following t<strong>able</strong> shows the targets of response <strong>and</strong>resolution times for each priority level:135


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsSupport Tiers<strong>The</strong> following details <strong>and</strong> describes our Support Tier levels:136


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsManaged <strong>Service</strong>s AgreementAppendix A (cont)<strong>Service</strong> Request Escalation Procedure1. Support Request is Received2. Trouble Ticket is Created3. Issue is Identified <strong>and</strong> documented in Help <strong>Desk</strong>system4. Issue is qualified to determine if it can be resolvedthrough Tier 1 SupportIf issue can be resolved through Tier 1 Support:5. Level 1 Resolution - issue is worked to successfulresolution6. Quality Control –Issue is verified to be resolved toClient’s satisfaction7. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 1 Support:137


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs6. Issue is escalated to Tier 2 Support7. Issue is qualified to determine if it can be resolved byTier 2 SupportIf issue can be resolved through Tier 2 Support:8. Level 2 Resolution - issue is worked to successfulresolution9. Quality Control –Issue is verified to be resolved toClient’s satisfaction10. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 2 Support:9. Issue is escalated to Tier 3 Support10. Issue is qualified to determine if it can be resolvedthrough Tier 3 SupportIf issue can be resolved through Tier 3 Support:11. Level 3 Resolution - issue is worked to successfulresolution138


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs12. Quality Control –Issue is verified to be resolved toClient’s satisfaction13. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 3 Support:12. Issue is escalated to Onsite Support13. Issue is qualified to determine if it can be resolvedthrough Onsite SupportIf issue can be resolved through Onsite Support:14. Onsite Resolution - issue is worked to successfulresolution15. Quality Control –Issue is verified to be resolved toClient’s satisfaction16. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Onsite Support:139


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs17. I.T. Manager Decision Point – request is updated withcomplete details of all activity performed140


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs141


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs142


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAsAppendix “B” Cont.143


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Agreements <strong>and</strong> SLAs144


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 4: ProcessesSection 4: ProcessesIn order for the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>s to deliver uniform,measur<strong>able</strong> services in adherence to established SLAs; <strong>and</strong>provide end users or clients with a consistent, satisfactorysupport experience, they need to develop, implement <strong>and</strong>hold their staff account<strong>able</strong> to effective service deliveryprocesses <strong>and</strong> procedures.In this context, these <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service deliveryprocesses are defined as those processes <strong>and</strong> workflowswhich are necessary in order to allow the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> the ability to effectively deliver scheduled <strong>and</strong>unscheduled services to end users or clients efficiently, <strong>and</strong>include:Responding to alert conditions <strong>and</strong> service requestsFollowing best practices for incident management <strong>and</strong>resolutionDelivering services within established SLA’s<strong>The</strong>se service delivery processes govern the followingscheduled <strong>and</strong> unscheduled events:145


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 4: ProcessesRemote supportOnsite supportIn addition, these service delivery processes include adocumented procedure for addressing any <strong>and</strong> all activityperformed by the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> during servicedelivery, <strong>and</strong> embodies a workflow which easily directs the<strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> resource throughout the service deliveryprocess.Specific processes that the outsourced service provider orinternal service manager will develop <strong>and</strong> implement foreffective <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service delivery may include:End User or Client On-Boarding, Provisioning <strong>and</strong><strong>Service</strong> Turn-Up/Go-LiveIncident ManagementProblem ManagementConfiguration ManagementChange ManagementRelease ManagementRisk Management<strong>Service</strong> Level Management<strong>Service</strong> Financial ManagementCapacity Management146


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 4: Processes<strong>Service</strong> Continuity ManagementAvailability ManagementSecurity ManagementCommunication ManagementReporting ManagementCustomer Satisfaction ManagementWe will cover end user or client on-boarding, provisioning <strong>and</strong>turn-up/go-live in Section 5 – Clients, <strong>and</strong> discuss the rest ofthese processes in the following chapters.147


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem ManagementIncident <strong>and</strong> Problem Management<strong>The</strong> Difference Between Incident Management <strong>and</strong> ProblemManagementAlthough both incidents <strong>and</strong> problems are related, <strong>and</strong> willeach trigger an automated alert or an end user or clientgeneratedservice request, they are different, <strong>and</strong> areresponded to <strong>and</strong> h<strong>and</strong>led differently by the outsourcedservice provider’s or internal service manager’s <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong>.In this context, an incident can be anything that degrades orinterrupts the end user’s or client’s information technologysupportedbusiness processes, activities <strong>and</strong> workflows.<strong>The</strong> purpose of Incident Management is to restore businesscontinuity as quickly as possible.A problem, in contrast, is simply a recurring incident.<strong>The</strong> purpose of Problem Management is to determine the rootcause of recurring incidents.With this underst<strong>and</strong>ing, it makes sense that the manner inwhich the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> responds to, <strong>and</strong> the processesthey employ to resolve these issues may differ.148


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem ManagementITIL (Information Technology Infrastructure Library), acomprehensive set of concepts <strong>and</strong> best practices for IT<strong>Service</strong> Management, separates the incident managementprocess into six unique components:1. Incident detection <strong>and</strong> recording2. Classification <strong>and</strong> initial support3. Analysis <strong>and</strong> diagnosis4. Resolution <strong>and</strong> recovery5. Incident closure6. Incident ownership, monitoring, tracking <strong>and</strong>communicationAfter a service request has been created, documented,prioritized <strong>and</strong> assigned to a queue or resource in theProfessional <strong>Service</strong>s Automation solution; either as the resultof an alert triggered by the Remote Monitoring <strong>and</strong>Management tool or directly generated by an end user orclient, an outsourced service provider’s or internal servicemanager’s Incident Management Process will be followed toaddress the service request.Adhering to the outsourced service provider’s or internalservice manager’s Change Management, ConfigurationManagement <strong>and</strong> Communication Management processes,the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> resource assigned to the service149


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Managementrequest will employ the outsourced service provider’s orinternal service manager’s Incident Management Process,which may resemble the following:1. Support request is received2. <strong>Service</strong> request is created3. Issue is Identified, documented, prioritized <strong>and</strong>assigned in Professional <strong>Service</strong>s Automation solution4. Issue is qualified to determine if it can be resolvedthrough Tier 1 SupportIf issue can be resolved through Tier 1 Support:5. Level 1 Resolution - issue is worked to successfulresolution6. Quality Control - Issue is verified to be resolved to enduser’s or client’s satisfaction7. <strong>Service</strong> request is closed, after complete resolutiondetails have been updated in Professional <strong>Service</strong>sAutomation solutionIf issue cannot be resolved through Tier 1 Support:6. Issue is escalated to Tier 2 Support150


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management7. Issue is qualified to determine if it can be resolved byTier 2 SupportIf issue can be resolved through Tier 2 Support:8. Level 2 Resolution - issue is worked to successfulresolution9. Quality Control - Issue is verified to be resolved to enduser’s or client’s satisfaction10. <strong>Service</strong> request is closed, after complete resolutiondetails have been updated in Professional <strong>Service</strong>sAutomation solutionIf issue cannot be resolved through Tier 2 Support:9. Issue is escalated to Tier 3 Support10. Issue is qualified to determine if it can be resolvedthrough Tier 3 SupportIf issue can be resolved through Tier 3 Support:11. Level 3 Resolution - issue is worked to successfulresolution151


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management12. Quality Control - Issue is verified to be resolved to enduser’s or client’s satisfaction13. <strong>Service</strong> request is closed, after complete resolutiondetails have been updated in Professional <strong>Service</strong>sAutomation solutionIf issue cannot be resolved through Tier 3 Support:11. Issue is escalated to onsite support12. Issue is qualified to determine if it can be resolvedthrough onsite supportIf issue can be resolved through Onsite Support:14. Onsite resolution - issue is worked to successfulresolution15. Quality Control - Issue is verified to be resolved to enduser’s or client’s satisfaction16. <strong>Service</strong> request is closed, after complete resolutiondetails have been updated in Professional <strong>Service</strong>sAutomation solutionIf issue cannot be resolved through Onsite Support:152


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management17. I.T. Manager Decision Point – request is updated withcomplete details of all activity performed1234• Receipt - <strong>Service</strong> request is received• Creation - Trouble ticket is created• Identification - Issue is identified,documented, prioritized <strong>and</strong> assigned• Qualification - Issue is qualified todetermine if it can be resolved in Tier 1If issue can be resolved in Tier 1:153


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management567• IMR- Issue is worked to successfulresolution• QC – Issue is verified to be resolved toclient satisfaction• Close – Issue is closed after completeIMR activities are documented in PSAIf issue cannot be resolved in Tier 1:67• Escalation - Issue is escalated to Tier 2• Qualification - Issue is qualified todetermine if it can be resolved in Tier 2If issue can be resolved through Tier 2 Support:154


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management8910• IMR- Issue is worked to successfulresolution• QC – Issue is verified to be resolved toclient satisfaction• Close – Issue is closed after completeIMR activities are documented in PSAIf issue cannot be resolved through Tier 2 Support:910• Escalation - Issue is escalated to Tier 3• Qualification - Issue is qualified todetermine if it can be resolved in Tier 3155


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem ManagementIf issue can be resolved through Tier 3 Support:111213• IMR- Issue is worked to successfulresolution• QC – Issue is verified to be resolved toclient satisfaction• Close – Issue is closed after completeIMR activities are documented in PSAIf issue cannot be resolved through Tier 3 Support:156


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management1213• Escalation - Issue is escalated to onsitesupport• Qualification - Issue is qualified todetermine if it can be resolved throughonsite supportIf issue can be resolved through Onsite Support:141516• IMR- Issue is worked to successfulresolution• QC – Issue is verified to be resolved toclient satisfaction• Close – Issue is closed after completeIMR activities are documented in PSAIf issue cannot be resolved through Onsite Support:17• IT Manager decision pointFigure 23 – Incident Management Process157


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem ManagementAs discussed, should an incident recur, it becomes classified asa problem, <strong>and</strong> the outsourced service provider’s or internalservice manager’s Problem Management process must beinitiated.<strong>The</strong> function of problem management is to:1. Investigate the root cause of recurring incidents2. Classify the problem as a known error3. Determine possible solutions4. Analyze the impact of the solution5. Implement the remediation solution6. Review post-remediation impactA problem is classified as a known error when its underlyingcause has been identified. This is the result of the analysisconducted <strong>and</strong> is the outcome necessary in order todetermine possible solutions for remediation.Adhering to the outsourced service provider’s or internalservice manager’s Change Management, ConfigurationManagement <strong>and</strong> Communication Management processes,the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> resource assigned to the servicerequest for the problem will employ the outsourced serviceprovider’s or internal service manager’s Problem ManagementProcess, which may resemble the following:158


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management1. Support request is received2. <strong>Service</strong> request is created, or closed service request forinitial incident is re-opened3. Issue is identified <strong>and</strong> documented in Professional<strong>Service</strong>s Automation solution as a Problem4. Issue is analyzed to determine root cause of problem5. Issue is classified as a known error6. <strong>The</strong> impact of possible solutions are evaluated <strong>and</strong> thebest solution is determined7. A request for change is initiated per outsourced serviceprovider’s or internal service manager’s ChangeManagement process8. Change is implemented9. Quality Control - Issue is monitored <strong>and</strong> verified to beresolved to end user’s or client’s satisfaction10. <strong>Service</strong> request is closed, after complete resolutiondetails have been updated in Professional <strong>Service</strong>sAutomation solution159


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management160


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident <strong>and</strong> Problem Management12345678910• Receipt - <strong>Service</strong> request is received• Creation - Trouble ticket is created• Identification - Issue is identified <strong>and</strong>documented• Qualification - Issue is qualified to determine if itcan be resolved in Tier 1• Issue is classified as known error• Impact evaluated <strong>and</strong> solution determined• Request for Change• Change implemented• QC - Issue is verified to be resolved to clientsatisfaction• Close – Issue is closed after complete PMRactivities are documented in PSAFigure 24 – Problem Management Process161


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Configuration, Change <strong>and</strong> Release ManagementConfiguration, Change <strong>and</strong> Release Management<strong>The</strong> Differences Between Configuration, Change <strong>and</strong> ReleaseManagementConfiguration, Change <strong>and</strong> Release Management are threeindividual processes that are also closely related <strong>and</strong> used inconcert with each other in many instances during <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> service delivery.Plainly stated, Configuration Management embodies thoseprocesses that govern the collection, documentation,maintenance <strong>and</strong> updating of configuration data in end useror client IT infrastructures, <strong>and</strong> the management of thatinformation in a Configuration Management Database. ManyProfessional <strong>Service</strong>s Automation solutions support thismanagement capability.<strong>The</strong> purpose of Configuration Management is to insure that allconfiguration data governing hardware, operating system,application software <strong>and</strong> services components of an ITInfrastructure are documented, maintained <strong>and</strong> updated aschanges are made over time.Configuration Management of a typical end user’s or client’s ITinfrastructure may include managing the documentedconfigurations of:162


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Configuration, Change <strong>and</strong> Release ManagementHardware, including servers, desktops, laptops,routers, switches, firewalls, Smartphones, PDAs <strong>and</strong>other devicesOperating systemsApplication software<strong>Service</strong>s including broadb<strong>and</strong>, voice, VoIP, etc.Live <strong>and</strong> printed documentationChange Management represents those st<strong>and</strong>ardizedprocesses that govern all changes made by the <strong>NOC</strong> or <strong>Service</strong><strong>Desk</strong> to end user or client hardware, operating systems,software applications <strong>and</strong> services during service delivery.<strong>The</strong>se activities are also documented in the outsourcedservice provider’s or internal service manager’s Professional<strong>Service</strong>s Automation solution, which may help automate thecreation <strong>and</strong> approval of change requests during proactivemaintenance <strong>and</strong> reactive incident <strong>and</strong> problem managementactivity.<strong>The</strong> purpose of Change Management is to insure that changeis planned properly <strong>and</strong> st<strong>and</strong>ardized processes <strong>and</strong>procedures are utilized to initiate change in an efficientmanner that reduces the impact of change to the end user orclient.163


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Configuration, Change <strong>and</strong> Release ManagementAkin to Configuration Management, Change Management of atypical end user’s or client’s IT infrastructure may includemanaging changes made to:Hardware, including servers, desktops, laptops,routers, switches, firewalls, smartphones, PDAs <strong>and</strong>other devicesOperating systems <strong>and</strong> patches, updates, servicepacks, hotfixes, etc.Application software <strong>and</strong> patches, updates, servicepacks, hotfixes, etc.<strong>Service</strong>s including broadb<strong>and</strong>, voice, VoIP,connectivity, etc.Network <strong>and</strong> other documentationDisaster recovery <strong>and</strong> business continuity plansRelease Management relies heavily on Configuration <strong>and</strong>Change Management, <strong>and</strong> is responsible for theimplementation <strong>and</strong> quality control of all hardware, operatingsystem, software application <strong>and</strong> services; <strong>and</strong> versionupdates, upgrades <strong>and</strong> new releases before they areintroduced into the end user’s or client’s productionenvironment.<strong>The</strong> purpose of Release Management is to insure that theintroduction of new major or minor hardware or software164


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Configuration, Change <strong>and</strong> Release Managementreleases into a production environment is planned properly<strong>and</strong> evaluated in a test environment prior to its rollout tominimize the impact of the introduction to the end user orclient.Release Management in a typical end user’s or client’s ITinfrastructure may include application to:Hardware, including servers, desktops, laptops,routers, switches, firewalls, smartphones, PDAs <strong>and</strong>other devicesOperating systems <strong>and</strong> patches, updates, servicepacks, hotfixes, etc.Application software <strong>and</strong> patches, updates, servicepacks, hotfixes, etc.<strong>Service</strong>s including broadb<strong>and</strong>, voice, VoIP,connectivity, etc.165


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk ManagementRisk ManagementRisk Versus RewardIn this context, Risk Management processes utilized by theoutsourced service provider’s or internal service manager’s<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> embody the identification <strong>and</strong>assessment of potential risks during service delivery, <strong>and</strong> thestrategies utilized to minimize, monitor for <strong>and</strong> control theprobability or impact of negative outcomes to the end user orclient.Strategies for managing risk may include:Identifying the potential for riskCharacterizing potential risksAssessing potential risks to specific activitiesDetermining the result of riskDiscovering or identifying ways to reduce riskCreating a strategy to reduce risk based on prioritizedrisk reduction proceduresRisk Management is a necessary process during normal day today <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> service delivery, <strong>and</strong> must beconducted throughout proactive maintenance, as well asreactive Incident, Problem <strong>and</strong> Change <strong>and</strong> ReleaseManagement activities. <strong>The</strong> mitigation of risk is a keycomponent in minimizing impact to the end user or clientduring these activities.166


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk ManagementLet’s explore an example situation <strong>and</strong> apply RiskManagement to a common end user or client scenario. Let’ssay that a service request has been generated by an end userreporting that they cannot access the Internet. <strong>The</strong>outsourced service provider’s or internal service manager’s<strong>Service</strong> <strong>Desk</strong> resource reviews the information in the servicerequest <strong>and</strong> works directly with the end user through theRemote Monitoring <strong>and</strong> Management tool’s Remote Access<strong>and</strong> Control capabilities to share <strong>and</strong> control their desktop toconduct the following activities:1. Verify network card configuration2. Verify ability to release/renew IP address withincorrect DHCP scope <strong>and</strong> correct DNS entriesThis all looks good, so the next activity conducted may be:3. Ping the internal gateway – response is good4. Ping an external IP address – response is goodThis verifies the ability to reach internal <strong>and</strong> external devicesby IP address, so the next activity might be:5. Ping external URL – response times out6. Ping internal device by host name – response is goodNow we’re getting somewhere. But up to this point evaluationof risk has not identified the necessity to modify the167


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk Managementtroubleshooting process, as it has simply been benign activityconducted during Incident Management to identify the causeof the incident, <strong>and</strong> no change has been implemented otherthan releasing <strong>and</strong> renewing the device’s IP address – anactivity that occurs normally. Next steps may include:7. Verify ability to ping external IP addresses <strong>and</strong> inabilityto ping any external URLs<strong>The</strong> suspicion now becomes an issue with DNS. <strong>The</strong> nextactivity to isolate DNS as the area to focus on may include:8. Configure the device’s network adapter with aninternal static IP <strong>and</strong> external DNS address9. Ping an external IP address – response is good10. Ping an external URL – response is goodSo there appears to be a potential issue with the DNS serveraddresses being leased to this particular device. But why justthis device? <strong>The</strong>re have been no other reports of thisparticular issue from any of the other users in theenvironment. More information reveals that this is the onlyuser in the office using a laptop today with a wirelessconnection. So next steps may include:11. Remotely access the device managing DHCP servicesfor wired <strong>and</strong> wireless devices on the user’s network168


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk Management12. Review the DHCP configuration for the wirelessnetwork <strong>and</strong> compare the DNS server settings againstthose being leased to the wired networkIt is discovered that the DNS server settings between thewired <strong>and</strong> wireless networks do not match.Since this is the first report of this issue, establishing thisservice request as an incident, the <strong>Service</strong> <strong>Desk</strong>’s responsibilityis to restore business continuity for this user as quickly aspossible. <strong>The</strong> first proposed change to reach this goal wouldbe to change the DNS server setting for the wireless networkto match those used for the wired network on the deviceh<strong>and</strong>ing out leases, wouldn’t it?…<strong>and</strong> here is where Configuration Management, ChangeManagement <strong>and</strong> Risk Management meet during the IncidentManagement process:<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> employs Incident Managementduring the process of restoring business continuity forthe end user<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> employs Configuration Managementto determine the configuration of all devices involvedin the Incident Management process<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> will modify device configurationsduring the Incident Management process169


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk Management<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> must evaluate risk prior to requestingor implementing change through the RiskManagement processSo what is the risk that needs to be evaluated in this scenario?Well, in order to modify the DNS server settings on the devicemanaging DHCP services for the wired <strong>and</strong> wireless networksin the user’s environment – the gateway router – a reboot ofthe device will be required…Remember our basic Risk Management strategy? Here it isapplied to this specific example:Identify the potential for risk – oh yes, there isabsolutely a definite potential for riskCharacterize potential risks - majorAssess potential risks to specific activities – the risk isrelated to rebooting the gateway routerDetermine the result of risk – the result will be todisconnect all users from their existing LAN <strong>and</strong> WANsessionsDiscover or identify ways to reduce risk – allow theaffected user to work with static IP <strong>and</strong> DNS addresssettings until a reboot of the gateway router ispossible, determine if the user can use a wiredconnection until the gateway router can be rebooted,170


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Risk Managementdetermine if the user needs WAN or Internet accessuntil the gateway router can be rebootedCreate a strategy to reduce risk based on prioritizedrisk reduction procedures – the best solution may beto have the user patch their laptop into the nearestnetwork drop until the gateway router can berebooted after production hours, as this will notrequire another support session to reset the wirelessnetwork card’s static configuration to dynamic afterthe user is done for the day, a second option would beto use static addressing <strong>and</strong> initiate the additionalsupport session as described, <strong>and</strong> the third optionmight be to have the user work locally until a routerreboot is possibleAssuming the first option is implemented, the user isinstructed by the <strong>Service</strong> <strong>Desk</strong> where to find a network c<strong>able</strong><strong>and</strong> how to patch in to the wired network. <strong>The</strong> <strong>Service</strong> <strong>Desk</strong>manages configuration <strong>and</strong> change for the gateway router perthe outsourced service provider’s or internal servicemanager’s policies <strong>and</strong> procedures, documents all IncidentManagement activity in the Professional <strong>Service</strong>s Automationsolution <strong>and</strong> schedules the gateway router reboot after hours.During the QA process the next day, the affected user iscontacted to verify if their issue has been resolved <strong>and</strong> receiveauthorization to close the service request.171


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Level Management<strong>Service</strong> Level ManagementDelivering <strong>Service</strong>s to Support SLAsIn this context, <strong>Service</strong> Level Management is comprised ofthose processes, procedures <strong>and</strong> activities that manage <strong>and</strong>govern the delivery of <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services to meetagreed-upon SLAs, or <strong>Service</strong> Level Agreements; <strong>and</strong> arefocused on the client – as opposed to <strong>Service</strong> <strong>Desk</strong> serviceswhose focus is the individual end user.In order to conduct effective <strong>Service</strong> Level Management, theoutsourced service provider or internal service manager mustconduct an effective business needs analysis in order toproperly align deliver<strong>able</strong>s with client needs, thencontinuously monitor <strong>and</strong> modify those deliver<strong>able</strong>s to insurethey meet the established SLA with the client.<strong>The</strong> <strong>Service</strong> Level Management process insures that <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> services are delivered according to SLAA properly configured Professional <strong>Service</strong>s Automationsolution alone is not enough to support effective <strong>Service</strong> LevelManagement – the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> resources mustproperly deliver services <strong>and</strong> document all of their activitywithin it according to the provider’s or manager’s establishedservice delivery procedures. Only then can meaningfulreporting be generated to evaluate performance against SLA.172


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Financial Management<strong>Service</strong> Financial ManagementHelping End Users <strong>and</strong> Clients Afford Technology <strong>Service</strong>sIn this context, <strong>Service</strong> Level Management is comprised ofthose processes, procedures <strong>and</strong> activities that the outsourcedservice provider or internal service manager employs toidentify, reduce <strong>and</strong> manage the costs associated with theirdeliver<strong>able</strong>s in order to make them cost-effective for theirclients.<strong>The</strong> <strong>Service</strong> Level Management process is employed toevaluate <strong>and</strong> control IT service delivery costs to insureaffordability for clientsWays to achieve this goal may include:Reducing business costsIncreasing internal efficienciesIn order to reduce business costs, the outsourced serviceprovider or internal service manager may evaluate thefollowing expenses:Capital equipmentVehicle expensesToolsITGeneral office <strong>and</strong> operation expenses173


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Financial ManagementLaborMarketingInsuranceProfessional feesSalesIn order to increase efficiencies, the outsourced serviceprovider or internal service manager may invest in tools <strong>and</strong>technologies such as Remote Monitoring <strong>and</strong> Management,Professional <strong>Service</strong>s Automation <strong>and</strong> Voice Communicationssolutions. When integrated <strong>and</strong> configured properly, this suiteof solutions can automate the delivery of many otherwisetime <strong>and</strong> labor-intensive manual processes, create <strong>and</strong>facilitate an environment of process <strong>and</strong> workflowst<strong>and</strong>ardization <strong>and</strong> improved communications <strong>and</strong> delivermeaningful reporting to help evaluate <strong>and</strong> improveperformance <strong>and</strong> increase service delivery efficiencies.Over time, a constant review of these cost-reducing <strong>and</strong>efficiency-improving activities will continue to help theoutsourced service provider or internal service manager tomanage or drive down costs, allowing these <strong>Service</strong> FinancialManagement processes to benefit clients through the abilityto receive competitively priced services.174


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Capacity ManagementCapacity ManagementRight-Sizing Infrastructure <strong>and</strong> <strong>Service</strong>s for GrowthIn this context, Capacity Management is comprised of thoseprocesses, procedures <strong>and</strong> activities that the outsourcedservice provider or internal service manager employs to insurethat their service capacity is scal<strong>able</strong> to support their owngrowing client base as well as their end users’ or clients’growth.<strong>The</strong> Capacity Management process insures that <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> services are scal<strong>able</strong> to meet internal <strong>and</strong>external performance needs cost-effectively.In order to properly optimally align service deliver<strong>able</strong>capabilities to end user or client business needs economically,the outsourced service provider or internal service managermust:Insure the capacity to meet existing end user or clientSLAsMonitor the performance of deliver<strong>able</strong>s <strong>and</strong> theinfrastructure supporting the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>Monitor the performance of the end user’s or client’sinfrastructureAccurately forecast, plan for <strong>and</strong> implement activitiesto support increasing capacity needs175


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Capacity Management<strong>The</strong> outsourced service provider or internal service managermay evaluate <strong>and</strong> monitor the following internal <strong>and</strong> end useror client-impacting criteria:Application performanceWorkload performanceDem<strong>and</strong> performanceResource performanceHardware performanceIn many cases, the outsourced service provider or internalservice manager will leverage the capabilities of the RemoteMonitoring <strong>and</strong> Management tool to provide meaningfulperformance reports to assist in Capacity Managementprocesses <strong>and</strong> activities.176


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Continuity Management<strong>Service</strong> Continuity ManagementRecovery from <strong>Service</strong> InterruptionIn this context, <strong>Service</strong> Continuity Management is comprisedof those processes, procedures <strong>and</strong> activities that theoutsourced service provider or internal service manageremploys to provide recovery from interruption of IT services<strong>and</strong> restore business process continuity for the end user orclient. Should an interruption in fact occur, <strong>Service</strong> Continuityprocesses will be followed by the outsourced serviceprovider’s or internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>to restore normal IT <strong>and</strong> IT-supported business functions.<strong>Service</strong> Continuity Management is akin to Disaster Recovery<strong>and</strong> a precursor to Disaster Recovery or Business ContinuityPlanning.<strong>The</strong> <strong>Service</strong> Continuity Management process insures that IT<strong>and</strong> IT-related business operations can recover in the event ofinterruption or disaster.In order to insure the high availability of IT <strong>and</strong> IT-relatedbusiness processes, <strong>and</strong> depending upon their SLA, theoutsourced service provider or the internal service managermay develop <strong>and</strong> implement strategies to insure their enduser’s or client’s service continuity in the event of interruptionor disaster. This <strong>Service</strong> Continuity process must incorporateall of the recovery steps necessary to support the restoration177


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>Service</strong> Continuity Managementof critical IT services <strong>and</strong> their supported business functionsfor the end user or client.178


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Availability ManagementAvailability ManagementWhen Do You Want It?In this context, Availability Management is comprised of thoseprocesses, procedures <strong>and</strong> activities that the outsourcedservice provider or internal service manager employs to insureavailability of the end user’s or client’s IT <strong>and</strong> IT-supportedbusiness functions <strong>and</strong> services. Availability Managementrequires continual monitoring, optimizing <strong>and</strong> management ofcritical devices, operating systems, application software <strong>and</strong>services, making a properly configured <strong>and</strong> operating RemoteMonitoring <strong>and</strong> Management tool a must to deliver services<strong>and</strong> insure availability cost-effectively.<strong>The</strong> Availability Management process insures the reliability,availability, serviceability, resilience <strong>and</strong> security of the enduser’s or client’s IT <strong>and</strong> IT-supported services <strong>and</strong> businessfunctions.Effective Availability Management is a requirement for theoutsourced service provider’s or internal service manager’s<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> to maintain end user or client SLAs.179


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Security ManagementSecurity ManagementIs Information Safe?In this context, Security Management is comprised of thoseprocesses, procedures <strong>and</strong> activities that the outsourcedservice provider or internal service manager employs to insurethe confidentiality, integrity <strong>and</strong> availability of their owninternal, as well as their end user’s or client’s information, ordata. This obviously requires securing much more than simplythe information itself, but also the physical hosts of theinformation, the means of accessing the information, thetransport of the information <strong>and</strong> the personnel authorized toaccess the information.<strong>The</strong> Security Management process insures the confidentiality,integrity <strong>and</strong> availability of information.A Security Plan establishes the level of security required tosupport the outsourced service provider’s or internal servicemanager’s internal, as well as end user or client-facing SLAs.Effective Security Management requires the establishment ofa Security Policy which defines:<strong>The</strong> relationship with the outsourced service provider’sor their end user’s or client’s general business policyCoordination with other internal <strong>and</strong> external ITprocesses180


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Security ManagementRules governing access to informationRisk assessment procedures<strong>The</strong> security monitoring policy<strong>The</strong> status reporting process<strong>The</strong> scope of the Security Plan<strong>The</strong> structure, processes <strong>and</strong> procedures of theSecurity Management process<strong>The</strong> resources responsible for administering theSecurity Management process<strong>The</strong> internal <strong>and</strong> external security auditorsOther supporting resources including hardware,software <strong>and</strong> staff – including the outsourced serviceprovider’s or internal service manager’s staff as well asend user’s or client’s staff<strong>The</strong> integrity <strong>and</strong> security of information is a top priority formany business owners <strong>and</strong> organizations. Executing aneffective Security Management process by the outsourcedservice provider or internal service manager will deliver valueto end users or clients above <strong>and</strong> beyond <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> deliver<strong>able</strong>s. On the other h<strong>and</strong>, failing to deliver aneffective Security Management process may harm the enduser or client so severely that it could jeopardize thecontinuity or survivability of their business.181


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Communication ManagementCommunication ManagementCan You Hear Me Now?In this context, Communication Management is comprised ofthose processes, procedures <strong>and</strong> activities that the outsourcedservice provider or internal service manager employs to fostereffective, efficient internal <strong>and</strong> end user or client-facingcommunications.Effective Communication Management is critical inmaintaining internal efficiencies <strong>and</strong> evaluating <strong>and</strong> improvingclient satisfaction – especially for the <strong>Service</strong> <strong>Desk</strong>.In addition, since communication in all of its varied forms issuch a vital component in the creation <strong>and</strong> maintenance of apleasant work environment <strong>and</strong> culture; which is reflected inthe outsourced service provider’s or internal servicemanager’s staff’s interaction with end users or clients, it isbeneficial to help them build awareness, strengtheninterpersonal skills <strong>and</strong> reinforce best practices forcommunications through an established CommunicationManagement process.Communication Management governs the content, delivery,timing <strong>and</strong> means of delivery of all internal <strong>and</strong> externalchannels of communication within <strong>and</strong> without anorganization.182


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Communication ManagementCommunications governed by an outsourced serviceprovider’s or internal service manager’s CommunicationsManagement process may encompass:Verbal communicationso Face to faceo Telephonico VoicemailNonverbal communicationso Facial expressionso Body language/bearingo Style of dressWritten communicationso Emailo Instant Messageo Text Messageo Letterso Faxeso Reportso Minuteso Agendaso Memoso White boardso Pin up/cork boardso Written Phone messages183


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Communication Managemento Pictures/photos/imageso Websiteo NewsletterInterpersonal communications may be conducted by theoutsourced service provider’s or internal service manager’s<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staff with another staff member, agroup, or an end user, client or groups of these, <strong>and</strong> thisinterpersonal communication can be delivered throughwritten, verbal <strong>and</strong> nonverbal means. Thus, the staff membermust be mindful of the following:Who they are communicating witho Roleo Statuso CultureWhat must be, or is being communicatedo Confidential/proprietary informationo Bad newso Good newso Gossipo Instructionso Other<strong>The</strong> delivery mechanism for the communicationo Verbalo Written184


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Communication Management<strong>The</strong> manner in which the communication will bedeliveredo Face to faceo Telephonicallyo Voicemailo Email, IM, text, letter, fax, reportBased upon any combination of these comprising an everydaycommunications scenario, you can quickly appreciate thevalue of establishing rules for the transfer or dissemination ofinformation down to a granular level that may include theformatting <strong>and</strong> verbiage used in written correspondence – <strong>and</strong>even what is appropriate to write on a white board, pin up ona cork board or send as a photo or email attachmentelectronically.This type of cultural awareness embodied in the outsourcedservice provider’s or internal service manager’scommunication protocols will establish the ground rules fortheir staff’s communications behavior <strong>and</strong> suit them wellduring their service delivery activities with end users orclients.In order to insure adherence to these protocols, theoutsourced service provider or internal service manager mustmonitor their staff’s adherence to the communications185


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Communication Managementst<strong>and</strong>ards they have established through the CommunicationManagement process, <strong>and</strong> hold them account<strong>able</strong> to them.186


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 5: ClientsSection 5: ClientsIn order for the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>s to deliver uniform,measur<strong>able</strong> services in adherence to established SLAs; <strong>and</strong>provide end users or clients with a consistent, satisfactorysupport experience, they need to develop, implement <strong>and</strong>hold their staff account<strong>able</strong> to effective qualification, onboarding<strong>and</strong> ongoing service delivery <strong>and</strong> customersatisfaction processes <strong>and</strong> procedures.187


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Qualifications For <strong>Service</strong>Client Qualifications for <strong>Service</strong>Setting Minimum Client Qualifications for <strong>Service</strong>Not all clients will qualify for the outsourced service provider’sor internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services –nor should they.In order for the outsourced service provider or internal servicemanager to deliver services effectively, efficiently <strong>and</strong>profitably, not only do minimum st<strong>and</strong>ards need to beestablished for the IT infrastructure to be managed, but forpotential clients as well.Holding true to these client st<strong>and</strong>ards can mean the differencebetween building strong, growing, mutually beneficialbusiness relationships with clients – or being contractuallyobligated to deliver services to difficult, noisy, slow-payingcustomers that do not value the time, dedication <strong>and</strong> effortrequired to support their infrastructure <strong>and</strong> users.Choosing to support the wrong client will cost the outsourcedservice provider or internal service manager more time <strong>and</strong>money than it is worth – <strong>and</strong> burden them <strong>and</strong> their <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> staff with unnecessary bottlenecks <strong>and</strong>frustration.<strong>Best</strong> in class providers may consider the following whendetermining a potential client’s suitability for services:188


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Qualifications For <strong>Service</strong>Prior history <strong>and</strong> experience with other providers <strong>and</strong>vendorsFinancial suitability, st<strong>and</strong>ing <strong>and</strong> creditworthinessYears in businessStaff attritionClient’s perception <strong>and</strong> value of the servicerelationshipExistence of, or willingness to create an IT budgetAvailability of; <strong>and</strong> direct access to, decision makersWillingness to provide necessary discovery information<strong>and</strong> access to key staff prior to formalizing a serviceagreementWillingness to invest to bring existing IT infrastructureup to minimum st<strong>and</strong>ards required for service<strong>The</strong> client’s history with other vendors; <strong>and</strong> specifically ITproviders, will be a good initial indicator of their perception ofthe value of support services. If they feel that the price to bepaid to maintain their infrastructure <strong>and</strong> support their users isan annoyance <strong>and</strong> necessary evil to maintain their business,<strong>and</strong> they have an unusually active history of hiring <strong>and</strong> firing ITservice providers, as well as a high staff turnover rate – theseare obvious red flags to consider.On the other h<strong>and</strong>, if the client perceives the cost ofsupporting their environment <strong>and</strong> users as an investment that189


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Qualifications For <strong>Service</strong>provides them a competitive advantage in their industry ortarget market, <strong>and</strong> have an existing IT budget; or are willing tocreate one, these are good signs.Unfortunately, in many cases the internal service manager willnot have much influence in qualifying their own clients or endusers prior to delivering service, as their role may be tosupport their own organization’s internal infrastructure <strong>and</strong>users. If this is the case; when faced with difficult end users orinternal decision makers, the service manager must find waysto reverse any negative end user or client perceptionsregarding their IT support services.This can also serve the outsourced service provider whendealing with difficult existing client or end user situations, butthe best way to address this potential reality is to qualifyprospects carefully to avoid engaging with difficult clients inthe first place when possible.Methods of reversing negative end user or client perceptionsmay include:Reviewing <strong>and</strong> revising end user or client-facing servicedelivery processes <strong>and</strong> procedures to improveinterpersonal effectivenessCommunicating more, <strong>and</strong> more effectively with endusers <strong>and</strong> clients190


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Qualifications For <strong>Service</strong>Increasing anonymous customer satisfaction surveys<strong>and</strong> polling to identify areas for improvement – <strong>and</strong>improving themSharing good news with clients <strong>and</strong> end users, such asadherence to SLAs, positive testimonials or comments<strong>and</strong> improved customer service metricsIncreasing face-to-face strategic meetings with thedecision maker <strong>and</strong> discussing historical performance,positive improvements <strong>and</strong> future goals <strong>and</strong> plans toachieve themUnderst<strong>and</strong>ing the decision maker’s monthly,quarterly, <strong>and</strong> year-over-year goals <strong>and</strong> reflectingservice alignment, support <strong>and</strong> value in helping torealize those goalsIn today’s society; where electronic communications fosteredby email, Facebooking, blogging, tweeting <strong>and</strong> texting makes iteasy to reduce verbal communications between individuals,the astute outsourced service provider or internal servicemanager will redouble their staff’s efforts at increasing theirverbal communications with end users <strong>and</strong> clients.Relationships are built <strong>and</strong> improved upon through verbalinterpersonal interaction, not electronic communications, <strong>and</strong>since by their very nature, <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services aredelivered remotely; <strong>and</strong> end users, clients <strong>and</strong> the outsourced191


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Qualifications For <strong>Service</strong>service provider’s or internal service manager’s staff maynever have the opportunity to physically meet each other, it isvitally important to seek out ways to provide as much of ahuman touch as possible, whenever possible.192


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>Infrastructure Qualifications for <strong>Service</strong>Setting Minimum Infrastructure Qualifications for <strong>Service</strong>In order to maximize service delivery efficiencies,effectiveness, customer satisfaction <strong>and</strong> profitability,st<strong>and</strong>ardizing on <strong>and</strong> enforcing baseline environmentalqualifications for the type <strong>and</strong> state of hardware, operatingsystems, applications software <strong>and</strong> services supported willserve the outsourced service provider or internal servicemanager well. Although it may be more challenging for theinternal service manager to enforce some of theserequirements initially, over time it may be possible for them toestablish <strong>and</strong> achieve a baseline st<strong>and</strong>ard within their internalorganization.St<strong>and</strong>ardizing on minimum environmental qualifications inorder to qualify for service allows the outsourced serviceprovider or internal service manager to maintain their staff’straining requirements, certification levels <strong>and</strong> supportspecializations on a specific number of products <strong>and</strong> services.Instead of trying to support everything under the sun; which isimpossible to do, <strong>and</strong> a great way to miss SLAs <strong>and</strong> erodeclient confidence <strong>and</strong> satisfaction as a result, the enforcementof minimum st<strong>and</strong>ards for service; along with theestablishment of supported products <strong>and</strong> services, improvesservice delivery effectiveness <strong>and</strong> customer satisfaction.193


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>Hardware <strong>and</strong> Hardware DevicesIn order to achieve st<strong>and</strong>ardization across hardware devices,the outsourced service provider or internal service managermay consider the following <strong>and</strong> establish specific baselinerequirements based upon the role of the hardware or devicein the infrastructure:Type of hardware (server, router, firewall, switch, pc,laptop, Smartphone, etc.)Br<strong>and</strong> of hardwareA specific CPU type <strong>and</strong> speedA minimum amount of physical RAMA specific amount of free HDD spaceA specific BIOS type <strong>and</strong> levelSpecific physical connectivity typesSpecific local <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsPhysical securityAccess rights <strong>and</strong> securitySpecific configurationSpecific WAN/LAN/DMZ LocationInteroperability with other local or remote devicesHardware redundancyWarranty194


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>Type CPU RAM HDDBIOSPhysicalConnectivityConnectivityMethodProtocols <strong>and</strong>PortsPhysicalSecurityAccess Rights Configuration LocationInteroperabilityRedundancyFigure25 – Minimum Hardware Requirements for <strong>Service</strong>Operating Systems <strong>and</strong> Applications SoftwareIn order to achieve st<strong>and</strong>ardization across operating system<strong>and</strong> application software, the outsourced service provider orinternal service manager may consider the following <strong>and</strong>establish specific baseline requirements based upon the roleof the operating system or application software in theinfrastructure:195


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>A specific operating system type, version <strong>and</strong> patchlevel (server, desktop, Smartphone, etc.)A specific Software application type, version <strong>and</strong> patchlevel (operating system, line of business, officeproductivity, etc.)Specific configurationLocal <strong>and</strong> remote connectivity methodsSupported protocols <strong>and</strong> portsSecurity methodsInteroperability <strong>and</strong> ability to communicate with otherlocal or remote systems, services, functions, databases<strong>and</strong> applications<strong>Service</strong> availability <strong>and</strong> redundancyData backup, restore <strong>and</strong> business continuity processes196


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>OS TypeApplicationTypeConfigurationConnectivityMethodProtocols <strong>and</strong>PortsSecurityInteroperability Availability Backup/RestoreFigure 26 – Minimum Operating System <strong>and</strong> Software Requirements for<strong>Service</strong><strong>Service</strong>sIn order to achieve st<strong>and</strong>ardization across infrastructureservices, the outsourced service provider or internal servicemanager may consider the following <strong>and</strong> establish specificbaseline requirements based upon the role of these services insupporting the infrastructure:Type of service (Telco, broadb<strong>and</strong>, hosting, Co-Lo,remote backup/storage, etc.)Provider197


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>Specific configuration<strong>Service</strong> availability <strong>and</strong> redundancySupport/SLACommunication <strong>and</strong> status reportingSecurity methodsInteroperability <strong>and</strong> ability to communicate with otherlocal or remote systems, services, functions<strong>Service</strong> availability <strong>and</strong> redundancy<strong>Service</strong> backup, restore <strong>and</strong> business continuityprocesses<strong>Service</strong> Type Provider ConfigurationAvailability /RedundancySupport/SLASecurityInteroperability Availability Backup/RestoreFigure 27 – Minimum Operating System <strong>and</strong> Software Requirements for<strong>Service</strong>198


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong>For a Microsoft Windows-centric environment, the outsourcedservice provider or internal service manager may establish thefollowing baseline requirements for service:All Servers with Microsoft Windows Operating Systemsmust be running Windows 2008 Server or later, <strong>and</strong>have all of the latest Microsoft <strong>Service</strong> Packs <strong>and</strong>Critical Updates installedAll <strong>Desk</strong>top PC’s <strong>and</strong> notebooks/laptops with MicrosoftWindows operating systems must be running Windows7 or later, <strong>and</strong> have all of the latest Microsoft servicepacks <strong>and</strong> critical updates installedAll Server <strong>and</strong> <strong>Desk</strong>top Software must be genuine,licensed <strong>and</strong> vendor-supported<strong>The</strong> environment must have a currently licensed, upto-date<strong>and</strong> vendor-supported server-based antivirussolution protecting all servers, desktops,notebooks/laptops, <strong>and</strong> email<strong>The</strong> environment must have a currently licensed, vendorsupportedserver-based backup solution<strong>The</strong> environment must have a currently licensed,vendor-supported hardware firewall between theinternal network <strong>and</strong> the InternetAny Wireless data traffic in the environment must besecured with a minimum of 128bit data encryption199


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Infrastructure Qualifications For <strong>Service</strong><strong>The</strong>se minimum requirements serve as examples only.Ultimately; <strong>and</strong> based on a variety of factors including internalcapabilities, service deliver<strong>able</strong>s <strong>and</strong> target market or client, itwill be up to the outsourced service provider or internalservice manager to determine the minimum environmentalst<strong>and</strong>ards they will require in order to qualify for theirservices.200


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsOn-Boarding Clients<strong>The</strong> Importance of an Effective On-Boarding ProcessOnce the decision has been made to begin service delivery fora new client, the outsourced service provider or internalservice manager must execute an effective, efficient onboardingprocess in order to meet client <strong>and</strong> end userexpectations <strong>and</strong> facilitate future service.A poorly designed <strong>and</strong> executed on-boarding process willquickly erode client <strong>and</strong> end user confidence <strong>and</strong> satisfaction<strong>and</strong> increase service delivery difficulty <strong>and</strong> cost for theoutsourced service provider or internal service manager. Nomatter how you slice it, this is not the way to begin a newclient relationship.A successful on-boarding process begins before the decision ismade to deliver services to the client.Read that again. Now think about this – it is not possible toon-board a client successfully if the outsourced serviceprovider or internal service manager does not collect therequired data in order to set up the client’s account <strong>and</strong>configure the Remote Monitoring <strong>and</strong> Management tool,Professional <strong>Service</strong>s Automation solution, billing <strong>and</strong>communications systems to support them.201


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsSome of this data-gathering occurs during the initial businessneeds analysis meeting with the client, <strong>and</strong> more is collectedduring the technology assessment of their infrastructureduring the pre-sales process. Of course, once the decision hasbeen made to deliver services to the client, more informationis gathered in order to complete the collection of datarequired to properly on-board the client.<strong>The</strong> Business Needs AnalysisEarly in the client relationship; <strong>and</strong> during the pre-salesprocess, the outsourced service provider or internal servicemanager will conduct a business needs analysis with theprospect to gather the initial background information requiredto determine whether their support needs can be met, <strong>and</strong> ifcontinuing to explore the feasibility of building a businessrelationship with them makes sense.During this phase of the relationship, high-level informationwill be collected regarding the prospect’s infrastructureincluding hardware, operating systems, application software,services <strong>and</strong> vendors. In addition, the prospect’s businessprocesses <strong>and</strong> workflows will be discussed <strong>and</strong> understood, aswell as their growth plans <strong>and</strong> business goals, along with theirbottlenecks <strong>and</strong> pain.202


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsThis information, along with office <strong>and</strong> branch office location<strong>and</strong> key staff, role <strong>and</strong> contact information will be gathered inpreparation for the technology assessment that must beconducted, should the decision to move forward be made.<strong>The</strong> Technology Assessment<strong>The</strong> technology assessment is the next step in gathering moregranular data regarding the prospect’s infrastructure in orderto document <strong>and</strong> evaluate the hardware, operating systems,application software <strong>and</strong> services utilized in the environment,as well as their operating state <strong>and</strong> role in supporting theprospect’s business processes.<strong>The</strong> outsourced service provider or internal service managerwill leverage their chosen tools <strong>and</strong> technology; including theRemote Monitoring <strong>and</strong> Management tool, in order toautomate as much of the discovery <strong>and</strong> data-gatheringprocess during the technology assessment phase as possible,<strong>and</strong> evaluate the resultant output to qualify theinfrastructure’s suitability for services.Required Infrastructure Modifications, Updates <strong>and</strong>UpgradesOnce the results of the technology assessment have beencollated, the outsourced service provider or internal servicemanager can compare the data against their established203


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clientsminimum requirements to determine what modifications,updates or upgrades will need to be performed in order toqualify the environment for services.After the required infrastructure modifications, updates <strong>and</strong>upgrades have been completed, client on-boarding cancommence.<strong>The</strong> Provisioning ProcessIn this scenario, the client provisioning process is typicallycharacterized as those processes <strong>and</strong> procedures required toprepare the client, their end users <strong>and</strong> infrastructure toreceive <strong>and</strong> participate in the outsourced service provider’s orinternal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> services, <strong>and</strong>may include collecting all of the data required, <strong>and</strong> conductingthe following activities:Set up the client’s account in the outsourced serviceprovider’s or internal service manager’s RemoteMonitoring <strong>and</strong> Management tool, Professional<strong>Service</strong>s Automation solution, Communication <strong>and</strong>billing solutions, including all required supported userinformationIf the Remote Monitoring <strong>and</strong> Management tool isappliance-based, configure <strong>and</strong> deploy the applianceper manufacturer or vendor recommendations for204


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clientssecure communications to <strong>and</strong> from the end user orclient location <strong>and</strong> the outsourced service provider’sor internal service manager’s <strong>NOC</strong>, Datacenter or<strong>Service</strong> <strong>Desk</strong>If the Remote Monitoring <strong>and</strong> Management tool isagent-based, configure <strong>and</strong> deploy agents as requiredto monitor managed devices, operating systems,software applications <strong>and</strong> services per manufactureror vendor recommendations <strong>and</strong> en<strong>able</strong> secureRemote Access <strong>and</strong> Control <strong>and</strong> communications to<strong>and</strong> from the end user or client location <strong>and</strong> theoutsourced service provider’s or internal servicemanager’s <strong>NOC</strong>, Datacenter or <strong>Service</strong> <strong>Desk</strong>If applic<strong>able</strong>, initialize a discovery routine by theRemote Monitoring <strong>and</strong> Management tool to identifyall network-connected devices <strong>and</strong> their roles in theenvironment, or use other means to capture thisinformation <strong>and</strong> document it in the RMM tool <strong>and</strong>Professional <strong>Service</strong>s Automation solutionAssociate the applic<strong>able</strong> Remote Monitoring <strong>and</strong>Management tool’s default monitoring templates toall managed devices, operating systems, softwareapplications <strong>and</strong> servicesDevelop base monitoring templates <strong>and</strong> assign themto all devices, operating systems, software205


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clientsapplications <strong>and</strong> services which the RemoteMonitoring <strong>and</strong> Management tool did not identify ordoes not have a default template forConfigure, test <strong>and</strong> confirm end user’s or client’sability to generate properly formatted service requestswith all required information via email <strong>and</strong> theProfessional <strong>Service</strong>s Automation solution’s <strong>Service</strong><strong>Desk</strong> portalTest <strong>and</strong> confirm proper two-way communications <strong>and</strong>alerting to <strong>and</strong> from managed devices, operatingsystems, software applications <strong>and</strong> services at the enduser or client location <strong>and</strong> the outsourced serviceprovider’s or internal service manager’s <strong>NOC</strong>,Datacenter or <strong>Service</strong> <strong>Desk</strong>Configure, test <strong>and</strong> confirm proper operation of theRemote Monitoring <strong>and</strong> Management tool’s RemoteAccess <strong>and</strong> Control function for managed devices <strong>and</strong>operating systemsConfigure, test <strong>and</strong> confirm proper two-wayintegration with the Remote Monitoring <strong>and</strong>Management tool; with raised alerts resulting inproperly formatted service request generationincluding end user, device <strong>and</strong> client identificationinformation included, as well as correct statusupdating <strong>and</strong> alert cancellation occurring in the206


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsRemote Monitoring <strong>and</strong> Management tool uponservice request resolution in the Professional <strong>Service</strong>sAutomation solutionConfigure, test <strong>and</strong> confirm proper scripting <strong>and</strong>deployment of unattended operating system <strong>and</strong>supported software application patches <strong>and</strong> updatesby the RMM toolConfigure, test <strong>and</strong> confirm proper scripting <strong>and</strong>execution of unattended device <strong>and</strong> operating systemoptimization activities such as deletion of temporaryfiles <strong>and</strong> disk defragmentation by RMM toolCustomize client reports in Professional <strong>Service</strong>sAutomation solution <strong>and</strong> testConfigure, test <strong>and</strong> confirm proper report generation<strong>and</strong> automated report delivery by the PSA solutionKey infrastructure information required by the outsourcedservice provider or internal service manager for provisioningmay include:Client contact informationServer(s) information (type, make/model, role,warranty, support, OS, version, configuration, etc.)Server application information (type, role, warranty,support, version, configuration, licensing, etc.)207


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsServer services configuration information (IIS, DNS,DHCP, file & print, line of business, etc.)Internal Active Directory information (AD Domain,administrator account, users <strong>and</strong> computers, etc.)Network shares, security <strong>and</strong> distribution groups, etc.Line of business application information (type, role,warranty, support, version, configuration, licensing,etc.)LAN <strong>and</strong> WAN information (devices, configuration,addressing, protocols, security, etc.)External Domain Registration information (provider,account, domain name, registrar, DNS, expiration, etc.)ISP information (provider, account, configuration,expiration, etc.)Web <strong>and</strong> email hosting information (provider, account,configuration, expiration, etc.)Router, Switch, Firewall information (type,make/model, configuration, addressing, support,warranty, etc.)Anti-virus, Anti-spam <strong>and</strong> Anti-spyware information(type, vendor, role, warranty, support, version,configuration, licensing, etc.)Backup, Disaster Recovery <strong>and</strong> Business Continuityinformation (configuration, processes, etc.)208


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding ClientsWorkstation, laptop <strong>and</strong> Smartphone information(type, role, warranty, support, version, configuration,etc.)Application <strong>and</strong> productivity software information(type, role, warranty, support, version, configuration,etc.)Printer, POS <strong>and</strong> peripheral information (networkscanners, faxes, document imaging solutions, creditcard terminals, etc.)Other network-attached device information (type,product, service, role, account, warranty, support, etc.)Vendor information (type, product, service, role,account, warranty, support, etc.)This information <strong>and</strong> more must be collected <strong>and</strong> archived inthe outsourced service provider’s or internal servicemanager’s Professional <strong>Service</strong>s Automation solution in orderto provide the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> all of the informationnecessary to deliver services to the client in one managedlocation.<strong>The</strong> Training ProcessPrior to service turn-up or go-live, the outsourced serviceprovider or internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>staff, as well as the new client <strong>and</strong> their end users need to betrained.209


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clients<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Client Support TrainingPrior to service turn-up or go-live, the outsourced serviceprovider’s or internal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>teams must become familiar with the new client’sinfrastructure <strong>and</strong> its specific support requirements, alongwith any required modifications to established supportprocesses for this particular client or their end users, such ascommunication, escalation or status reporting processes.Client <strong>and</strong> End User Support TrainingPrior to service turn-up or go-live, the outsourced serviceprovider or internal service manager will typically conduct atraining or multiple training sessions to indoctrinate the client<strong>and</strong> their end users on their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’s processes<strong>and</strong> procedures for service delivery, <strong>and</strong> set the appropriateexpectations in regards to response <strong>and</strong> incidentmanagement. Topics that may be covered during client <strong>and</strong>end user training may include:How to open a service request (email, portal, phone,etc.)<strong>Service</strong> <strong>Desk</strong> processes (incident, problem,configuration, change, risk, communication, release,service level, availability, capacity, service continuity,security, communication management, etc.)210


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clients<strong>Service</strong> <strong>Desk</strong> response <strong>and</strong> incident managementspecificprocesses (issue identification, documentation,prioritization, assignment, remediation, escalation,completion, QA, closure, communication, etc.)Support tiers<strong>Service</strong> Level AgreementCustomer <strong>Service</strong>Reporting<strong>Service</strong> Go-LiveAfter the outsourced service provider or internal servicemanager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> has completed their clientspecifictraining <strong>and</strong> the client <strong>and</strong> their end users havereceived their support training, a service turn-up, or go-livedate can be established. This is the date that all systems,processes, services, <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staff <strong>and</strong> the client<strong>and</strong> their infrastructure <strong>and</strong> end users will be designated asready to participate in <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> maintenance <strong>and</strong>support services.<strong>The</strong> first thirty days after go-live with a new client will be themost critical for the outsourced service provider or internalservice manager <strong>and</strong> their staff, as this is the time when theend users will be the most critical, <strong>and</strong> need to be won over bythe new support relationship <strong>and</strong> its service deliveryprocesses. If there are too many hiccups during this sensitive211


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!On-Boarding Clientsperiod, it may be difficult to recover the relationship. This iswhy it is imperative that the entire on-boarding process runsmoothly, all processes are tested <strong>and</strong> validated, all requiredinformation is collected <strong>and</strong> documented in the Professional<strong>Service</strong>s Automation solution <strong>and</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> staff<strong>and</strong> the client <strong>and</strong> their end users complete their individualon-boarding training prior to the decision to go live with theoutsourced service provider’s or internal service manager’ssupport services.212


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Delivering <strong>Service</strong>Day to Day <strong>Service</strong> DeliveryAlthough many of the roles, processes, procedures, activities<strong>and</strong> responsibilities of an outsourced service provider’s orinternal service manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>and</strong> theirrespective personnel are more alike than they are dissimilar,once again, the differentiator between the two is the focus oftheir responsibilities.Although the <strong>NOC</strong>’s duties <strong>and</strong> responsibilities are orientedtowards proactively managing <strong>and</strong> maintaining efficientoperating states of hardware devices, software operatingsystems <strong>and</strong> applications <strong>and</strong> insuring the continuity ofservices; <strong>and</strong> the <strong>Service</strong> <strong>Desk</strong>’s <strong>and</strong> its staff’s duties <strong>and</strong>responsibilities are focused on managing end user incidents<strong>and</strong> problems, they both respond to incidents <strong>and</strong> problemsthat impact these by following established service deliveryprocesses.Based on best practices for proactive <strong>and</strong> reactivemaintenance <strong>and</strong> service delivery, at a high level, the generalframework governing these processes is shared by both the<strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>, with differences surfacing based uponspecific tasks. <strong>The</strong> following sections will reflect this similarityat a high level.213


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong><strong>The</strong> <strong>NOC</strong> Staff’s Daily Duties<strong>The</strong> <strong>NOC</strong> staff’s daily duties are determined by the outsourcedservice provider’s, or internal service manager’s <strong>NOC</strong>manager, whose responsibility includes the management ofthe <strong>NOC</strong>, <strong>and</strong> the proper identification, prioritization <strong>and</strong>assignment of all alerts/service requests <strong>and</strong> proactivemaintenance duties to the appropriate queue, tier orresource.In this context, <strong>and</strong> since the outsourced service provider’s orinternal service manager’s Remote Monitoring <strong>and</strong>Management tool’s alerts generate service requests in theProfessional <strong>Service</strong>s Automation solution, the <strong>NOC</strong> staff’stypical day may resemble the following:Log in to the outsourced service provider’s or internalservice manager’s Professional <strong>Service</strong>s AutomationsolutionReview all newly-assigned service requests to him/herReview any service requests previously assigned <strong>and</strong>still open to insure they are not in danger of fallingoutside of SLA (service dispatcher <strong>and</strong>/or <strong>NOC</strong>manager should be alerted to this status automaticallyby the PSA solution before it occurs)Work service requests in order of priorityo Accept service request <strong>and</strong> time stampo Review service request214


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>o Consult information documented in PSAsolution as needed in order to perform incidentmanagemento Qualify issue to determine if it can be resolvedthrough tier 1 support within SLAo Work issue to successful resolutiono Verify issue to be resolvedo Document complete incident resolution detailsin PSA solution, mark status complete <strong>and</strong> timestampo <strong>Service</strong> request is placed in 24 hour QA statusfor monitoringo <strong>Service</strong> request is closed once issue isdetermined to be resolved If service request cannot be resolved through tier 1support, or is in danger of falling outside of SLA:o <strong>Service</strong> Request is escalated to Tier 2 <strong>and</strong>successive tiers of support in accordance withoutsourced service provider’s or internalservice manager’s service delivery processAll proactive maintenance activity is also scheduled,assigned <strong>and</strong> managed in the outsourced serviceprovider’s or internal service manager’s Professional<strong>Service</strong>s Automation solution. Additional duties carried outby <strong>NOC</strong> staff may include:Review of monitoring reports to identify issues ortrends that may impact service or business process215


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>continuity for clients or end users in order toaddress them in advance of potential interruption;or for capacity planning purposesScript or manually deliver required hardware,operating system, application software or serviceupdates, patches <strong>and</strong> hotfixesAssist in new client on-boarding activitiesCustomize, produce <strong>and</strong> deliver performancereports to internal <strong>NOC</strong> managementModify <strong>and</strong> tune alerting <strong>and</strong> thresholds onmonitored devices, operating systems, applicationsoftware <strong>and</strong> services in order to improveeffectiveness <strong>and</strong> efficiencyManage, maintain <strong>and</strong> update internal <strong>and</strong> client<strong>and</strong> end user infrastructure documentation,processes <strong>and</strong> procedures in PSA solution<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> Staff’s Daily Duties<strong>The</strong> <strong>Service</strong> <strong>Desk</strong> staff’s daily duties are determined by theoutsourced service provider’s, or internal service manager’s<strong>Service</strong> <strong>Desk</strong> manager, whose responsibility includes themanagement of the <strong>Service</strong> <strong>Desk</strong>, <strong>and</strong> the proper prioritization<strong>and</strong> assignment of all service requests to the appropriate tier.<strong>The</strong> scheduling of all service work is ultimately theresponsibility of the <strong>Service</strong> <strong>Desk</strong> manager, but this <strong>and</strong> otherfunctions may be performed by a service dispatcher. It is the216


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong><strong>Service</strong> <strong>Desk</strong> manager’s ultimate responsibility to make certainthe <strong>Service</strong> <strong>Desk</strong> maintains their SLAs.In this context, a <strong>Service</strong> <strong>Desk</strong> staff’s typical day may resemblethe following:Log in to the outsourced service provider’s or internalservice manager’s Professional <strong>Service</strong>s AutomationsolutionReview all newly-assigned service requests to him/herReview any service requests previously assigned <strong>and</strong>still open to insure they are not in danger of fallingoutside of SLA (service dispatcher <strong>and</strong>/or <strong>Service</strong> <strong>Desk</strong>manager should be alerted to this status automaticallyby the PSA solution before it occurs)Work service requests in order of priorityo Accept service request <strong>and</strong> time stampo Review service requesto Contact client or end user as needed to gatherany additional information necessary in orderto begin incident managemento Consult information documented in PSAsolution as needed in order to perform incidentmanagemento Qualify issue to determine if it can be resolvedthrough tier 1 support within SLAo Work issue to successful resolutiono Verify issue to be resolved to end user’ssatisfaction217


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>o Document complete incident resolution detailsin PSA solution, mark status complete <strong>and</strong> timestampo <strong>Service</strong> request is placed in 24 hour QA status,after which the end user is contacted to verifythe issue has been resolved to their satisfaction<strong>and</strong> asked if the service request can be closedo <strong>Service</strong> request is closed If service request cannot be resolved through tier 1support, or is in danger of falling outside of SLA:o <strong>Service</strong> Request is escalated to Tier 2 <strong>and</strong>successive tiers of support in accordance withoutsourced service provider’s or internalservice manager’s service delivery processAs with <strong>NOC</strong> staff, <strong>Service</strong> <strong>Desk</strong> staff will also haveadditional duties to carry out, which may include:Review of <strong>Service</strong> <strong>Desk</strong> reports to identify end useror equipment issues or trends that may impactcustomer satisfaction or service or businessprocess continuity for clients or end users in orderto proactively address themAssist in new client on-boarding activitiesCustomize, produce <strong>and</strong> deliver performancereports to internal <strong>Service</strong> <strong>Desk</strong> managementManage, maintain <strong>and</strong> update internal <strong>and</strong> client<strong>and</strong> end user infrastructure documentation,processes <strong>and</strong> procedures in PSA solution218


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Interacting with Clients <strong>and</strong> End UsersAgain, because of the reality that <strong>Service</strong> <strong>Desk</strong> services aretypically delivered remotely; <strong>and</strong> end users, clients <strong>and</strong> theoutsourced service provider’s or internal service manager’sstaff may never have the opportunity to physically meet eachother, it is critical for the outsourced service provider’s orinternal service manager’s staff to excel at interpersonalcommunications in all forms with clients, <strong>and</strong> especially verbalcommunications with them over the phone.Adhering to the outsourced service provider’s or internalservice manager’s established communication protocols willassist in reflecting a professional, courteous, efficient imagefor end users <strong>and</strong> clients, fostering trust, loyalty <strong>and</strong> customersatisfaction over time. <strong>The</strong> following are some additional tipsfor <strong>Service</strong> <strong>Desk</strong> staff to consider when communicatingverbally with end users or clients.What To Say, What Not To Say, <strong>and</strong> How Not To Say ItBeing human like the rest of us, the outsourced serviceprovider’s or internal service manager’s staff will findthemselves in situations when speaking with a client or enduser where they might say too much, or say the wrong thing,219


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>or say the right thing in the wrong way, or say the right thing,but in doing so contradict something that the client or enduser had been told previously by someone else. In any ofthese scenarios, a top-of-mind awareness <strong>and</strong> fear ofaccidentally doing any of these things during conversationswith clients or end users is required by all <strong>Service</strong> <strong>Desk</strong> staff.Here are some things to keep in mind:Be courteous <strong>and</strong> professional <strong>and</strong> ask questionspertaining to the issue at h<strong>and</strong> – steer clear of idlechit-chat <strong>and</strong> volunteering too much personalinformation like what the <strong>Service</strong> <strong>Desk</strong> staff did overthe weekend, last night, or inquiring the same of theclient or end user. This will help keep the relationshipin the proper perspectiveRefrain from volunteering potential causes of theissue, or “thinking out loud” – when the issue turnsout not to be caused by the <strong>Service</strong> <strong>Desk</strong> staff’soverheard suspicions, it may erode the perception oftheir competence by the client or end userDo not have internal discussions with other staffmembers on an open line – even though one <strong>Service</strong><strong>Desk</strong> staff is h<strong>and</strong>ling their call professionally <strong>and</strong>following communication protocol, others may fail todo so in open conversation220


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Use the hold or mute button constantly – this is thesafest way to insure the client or end user is preventedfrom hearing the wrong thing, <strong>and</strong> allows the <strong>Service</strong><strong>Desk</strong> staff to focus on resolving the incident as quicklyas possible without distraction. Using mute allows the<strong>Service</strong> <strong>Desk</strong> staff to monitor the line, should the clientor end user wish to volunteer any useful information,or check statusBlank the end user’s desktop during remote controlsessions whenever possible – this practice helpsreduce questions during the troubleshooting process,<strong>and</strong> the potential perception by the client or end userthat the <strong>Service</strong> <strong>Desk</strong> staff isn’t competent becausethey are investigating so many different things duringthe troubleshooting sessionDon’t tell the client or end user what you did – themore information is shared with the client or end user,the more of that information can be misinterpreted,misunderstood, or again, contradict what they weretold by someone else. Here is a great example of howto h<strong>and</strong>le a call with an end user following all of thesebullet points:Example <strong>Service</strong> Request Call:221


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong><strong>Service</strong> <strong>Desk</strong> staff: Hi, Mary – this is Bob from the <strong>Service</strong><strong>Desk</strong>. I’m calling you to follow up on the service request youopened regarding “X” – is this a good time for me totroubleshoot that with you?Mary: Hi Bob, yes this is a good time.<strong>Service</strong> <strong>Desk</strong> staff: Great, my underst<strong>and</strong>ing from reading theservice request notes is that ……………………. Is that correct?Mary: Yes Bob – that’s what is happening.<strong>Service</strong> <strong>Desk</strong> staff: Okay, do you mind if I start a remotedesktop sharing session with you, so I can begintroubleshooting?Mary: Sure Bob, go right ahead.<strong>Service</strong> <strong>Desk</strong> staff: Okay, Mary – I’m going to put you on mutewhile the session initiates, <strong>and</strong> pick back up when I’mconnected. Will that be okay?Mary: No problem, Bob.<strong>Service</strong> <strong>Desk</strong> staff places end user on mute while session isinitiated<strong>Service</strong> <strong>Desk</strong> staff: Okay, Mary – I’m in. Would it be ok if I takea look at a few things in order to help narrow down the cause222


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>of the issue? I’ll need to blank your screen while I do so – isthat also ok?Mary: Sure, do whatever you need, Bob.<strong>Service</strong> <strong>Desk</strong> staff: Thanks, Mary. I’m also going to place youon mute for about five minutes while I troubleshoot. Wouldthat be ok? You can feel free to take a short break or grab acoffee or water…can I see you back in five?Mary: Ok<strong>Service</strong> <strong>Desk</strong> staff performs incident managementAfter five minutes:<strong>Service</strong> <strong>Desk</strong> staff: Hi Mary – I can hear that you’re back – areyou with me?Mary: Yes Bob, I’m here.<strong>Service</strong> <strong>Desk</strong> staff: Great. I think I may have discovered thecause of the issue, <strong>and</strong> I’ve made a few changes that I thinkwill resolve it. Is it ok with you if I place this service request ina QA status for 24 hours, <strong>and</strong> our team follows up with youtomorrow to make sure it’s resolved before we close thisservice request?223


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Mary: Sure, Bob. Thank you for your help. What was theproblem? What did you do?<strong>Service</strong> <strong>Desk</strong> staff: You’re welcome, Mary – it was mypleasure. Until I’m 100% confident that the issue is resolved, Iprefer to keep from stating with absolute certainty what thecause was <strong>and</strong> the fix – you know, I could be wrong! (jokingly)How about we wait for the QA process so I can be sure, <strong>and</strong> ifyou’re still interested, we’ll be happy to share the technicaldetails with you. Is that ok?Mary: Oh sure, Bob, it’s really not that important.<strong>Service</strong> <strong>Desk</strong> staff: Ok then, Mary, I’ll document our supportsession in the notes here <strong>and</strong> place this request in our QAqueue for 24 hours. If the issue should happen to crop upagain, please let us know, ok?Mary: Sure will. Thanks again.<strong>Service</strong> <strong>Desk</strong> staff: My pleasure. Have a great day.Can you appreciate how smoothly this support session went?I’ll bet you were wondering just how in the world a <strong>Service</strong><strong>Desk</strong> staff could effectively deliver a support session byblanking the user’s desktop (of course this won’t be possible inall cases), placing the end user on mute for most of it, <strong>and</strong>224


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>then not sharing what the cause of the issue was, or evenbetter – what they did to resolve it.Now, if the issue does recur, <strong>and</strong> a different <strong>Service</strong> <strong>Desk</strong> staffis assigned to work on it, there is no potential for the end userto complicate the session with misheard or misinterpreteddata from the first support session. And because the servicerequest wasn’t closed, but instead placed in a QA status, withthe end user’s expectations set appropriately, the <strong>Service</strong><strong>Desk</strong> staff has avoided the “you didn’t fix it the first time” or“this is the second (or third) time I’ve opened a request for thesame thing” perception, as the issue was never consideredresolved <strong>and</strong> the request was never closed.225


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> <strong>BOOK</strong> <strong>EVER</strong>!Client SatisfactionMeasuring Client Satisfaction <strong>and</strong> Improving RetentionIf the outsourced service provider or internal service managerdoes not develop <strong>and</strong> execute a consistent, effective processto measure client <strong>and</strong> end user satisfaction in order toinstitute a continual client satisfaction improvement process,they will be doing their clients, end users <strong>and</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> staff a disservice.<strong>The</strong> only way to realize improvement in any endeavor is tomeasure performance. Just as important as it is to measureperformance of the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> against SLA <strong>and</strong>other key performance metrics in order to establish a baseline<strong>and</strong> work towards improvement, it is even more important tomeasure client satisfaction.It does the outsourced service provider or internal servicemanager absolutely no good whatsoever to believe they havethe best processes <strong>and</strong> procedures for service delivery inplace, but have no way to measure their client’s or end user’ssatisfaction, <strong>and</strong> risk losing them for unknown reasons.<strong>The</strong> best way to gauge a decision maker’s satisfaction is faceto face during regular strategic meetings. It is important to setaside time specifically for measuring the client’s satisfaction,preferably at the beginning of these meetings. <strong>The</strong> outsourcedservice provider or internal service manager will want to know226


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>the client’s feedback on their performance, <strong>and</strong> may askquestions such as:“On a scale of one to five, what is your overallsatisfaction level with our services?”“Can you share with me why you rated us that way,<strong>and</strong> what we can do to improve your overallsatisfaction?” Or “Are there specific areas that we canimprove on to raise your overall satisfaction level withour services?”“How would you rate your satisfaction level with ourcustomer service?”“How would you rate the overall quality of ourstrategic business relationship?”“How would you rate your level of satisfaction withthe value of our services?”“How likely would it be for you to recommend ourservices to another organization or businessacquaintance?”<strong>The</strong> best way to gauge end user satisfaction may be throughanonymous survey, <strong>and</strong> if possible, delivered via phone by anoutside 3 rd -party organization. End users tend to elaboratemore when answering survey questions verbally, as thesurveyor can drill deeper into the answers offered by the enduser respondent.227


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Other ways to gauge end user satisfaction are throughelectronic surveys, which can also be completed anonymously.Some Professional <strong>Service</strong>s Automation solutions supportsurvey creation natively <strong>and</strong> en<strong>able</strong> both automatic <strong>and</strong>scheduled survey delivery <strong>and</strong> response reporting. Caution – ifa st<strong>and</strong>ard service request survey is delivered in an automatedfashion after every service request closure, end users willeventually cease responding to them. This is why it isimportant to create <strong>and</strong> deliver surveys purposefully <strong>and</strong>periodically to receive the greatest response, <strong>and</strong> vary thequestions from survey to survey to maintain interest in therespondent.Surveys delivered in this fashion must be clear <strong>and</strong> specific intheir intent. For instance, is the survey gauging overallsatisfaction, or satisfaction from services received from aspecific tier, queue or individual staff member? Surveys mustalso be simple to underst<strong>and</strong> <strong>and</strong> easy to respond to. Keepquestions short – one sentence; if possible, <strong>and</strong> clear. If therespondent has to figure out what the question means, thevalue of their feedback will be diminished, as each respondentwill comprehend the question differently <strong>and</strong> skew the results.<strong>The</strong> outsourced service provider or internal service managershould keep each survey brief – end users should perceive itto take only a few minutes at most to complete a survey to228


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>increase response – 5 to 10 questions at the most, if they aresimply gauging satisfaction.<strong>The</strong> outsourced service provider or internal service managershould be prepared to act on the survey responses received.Taking the time to develop <strong>and</strong> deliver surveys <strong>and</strong> collateresponses without an action plan to execute on to raise client<strong>and</strong> end user satisfaction is pointless.Sample electronic end user satisfaction survey questions mayresemble:On a scale of 1 through 5, with 5 being highest, pleaserate your overall level of satisfaction with the <strong>Service</strong><strong>Desk</strong>On a scale of 1 through 5, with 5 being highest, pleaserate your level of satisfaction with the <strong>Service</strong> <strong>Desk</strong>’sresponse timeOn a scale of 1 through 5, with 5 being highest, pleaserate your level of satisfaction with the <strong>Service</strong> <strong>Desk</strong>’sresolution timeOn a scale of 1 through 5, with 5 being highest, pleaserate your level of satisfaction with the <strong>Service</strong> <strong>Desk</strong>’scustomer service229


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>On a scale of 1 through 5, with 5 being highest, pleaserate your level of satisfaction with the <strong>Service</strong> <strong>Desk</strong>’scommunicationsOn a scale of 1 through 5, with 5 being highest, pleaserate your level of satisfaction with the <strong>Service</strong> <strong>Desk</strong>’sperformance in keeping your systems up <strong>and</strong> running<strong>The</strong>se survey questions are included as an example only. <strong>The</strong>outsourced service provider or internal service managershould carefully determine the areas of satisfaction theywould like end user feedback on <strong>and</strong> create short, easy tounderst<strong>and</strong> surveys whose questions are clear <strong>and</strong> concise,with a numeric rating system for each question in order tofacilitate analysis in a meaningful way – then act on the results<strong>and</strong> measure improvement over time through additionalsurveys230


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Delivering <strong>Service</strong>Section 6 – Hiring <strong>and</strong> Training TechnicalStaff<strong>The</strong> following chapters will cover effective means for writingemployment ads that attract the right talent, using DISCbehavioral profiles before interviewing prospective <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> staff to make certain the outsourced serviceprovider or internal service manager is interviewing the rightc<strong>and</strong>idates, how to interview these c<strong>and</strong>idates <strong>and</strong> whichquestions to ask, along with creating an offer letter <strong>and</strong>employment agreement <strong>and</strong> developing a compensation plan<strong>and</strong> training requirements.231


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffWriting Effective Employment Ads for TechnicalStaffWriting an employment ad for technical staff may be the firstHR act an outsourced service provider or internal servicemanager performs in the search for talent. Let’s take amoment to underst<strong>and</strong> the motivating factors behindtechnically-oriented people. Technical staff’s ideal workenvironment may include challenging technical work, ongoingtraining opportunities <strong>and</strong> a team approach to problemsolving <strong>and</strong> solution design <strong>and</strong> delivery, along withappreciation <strong>and</strong> respect for their contributions to the team;with high monetary incentives ranking lower on the list ofrequirements when seeking employment, or in their decisionto remain with their current employer. Technicians’ behaviornormally falls into the Coordinator/ Supporter/ Relater areasof a DISC (behavioral) profile. A DISC profile is a psychometrictesting technique that uses a simple questionnaire as a basisfor revealing insights into a person’s normal, adapted <strong>and</strong>work behaviors, <strong>and</strong> we will explore utilizing DISC profiles toour advantage during the hiring process in the next chapter.Underst<strong>and</strong>ing these motivators for technical staff, effectiveemployment ads highlight these specific areas in the body ofthe advertisement. <strong>The</strong> ad copy writer’s job is to effectivelypromote the employment opportunity to the best technicians232


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical Staffavail<strong>able</strong>. <strong>The</strong> outsourced service provider or internal servicemanager is not looking for anybody that can fog a mirror –they want seasoned technicians <strong>and</strong> engineers, whose pastperformance is an indicator of their future potential.A good new technical hire will dive right in to learning everylast detail about the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>, <strong>and</strong> take it seriouslyto become a subject matter expert on everything theysupport. <strong>The</strong>re is a clear pecking order with them, <strong>and</strong> theirrespect is earned by knowing more than they do about aparticular subject. <strong>The</strong>se are the type of individuals that jumpright in to their positions soon after they are hired, <strong>and</strong> suckup information like a dry sponge.Technicians <strong>and</strong> engineers see things as black <strong>and</strong> whiteproblems to solve without a lot of emotion, <strong>and</strong> the reallygood ones can build personal relationships with clients <strong>and</strong>end users <strong>and</strong> underst<strong>and</strong> that their job is to build rapportwith them to establish the trust necessary to elevate theoutsourced service provider’s or internal service manager’s<strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong>’s overall perception as that of a valu<strong>able</strong>resource that can solve their technical problems <strong>and</strong> identifysolutions to increase their efficiencies, productivity <strong>and</strong>mitigate their business pain <strong>and</strong> risk.233


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical Staff<strong>The</strong>se behavioral traits are what to look for in technical staff.It can be difficult to find the right staff with the right mix oftechnical capability, customer service <strong>and</strong> desire to do the jobright the first time.But first things first – before the outsourced service provideror internal service manager has the ability to start the DISCprofiling <strong>and</strong> interview process, they need c<strong>and</strong>idates. And toget c<strong>and</strong>idates interested in their employment opportunitythey need to write compelling employment ads.So they need to structure the employment ad to cover thebasics, plus highlight the nuances that will attract the technicalprofessionals they seek. In the old days (pre-Internet), it wasnecessary to excel at “classified ad shorth<strong>and</strong>” for print ads inthe employment section of newspapers. This was the processwhere the ad copy writer would try to condense full wordsenough to save on the cost of the ad, while still conveying thegist of their message. Now the luxury of posting just about anysize ad through online job sites such as Monster,Careerbuilder, Dice, Hotjobs <strong>and</strong> others for a reason<strong>able</strong> fee,in addition to having it run for months at a time, greatlyimproves the process <strong>and</strong> results. Let’s look at the basiccomponents of an employment posting for a <strong>Service</strong> <strong>Desk</strong>position:234


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffCompany name <strong>and</strong> locationJob status – Full Time, EmployeeRelevant Work Experience – 3 years minimumJob Category – <strong>Service</strong> <strong>Desk</strong>Career Level – ExperiencedJob Description – Several short paragraphs documenting thedesired c<strong>and</strong>idate’s qualities, the position’s responsibilities<strong>and</strong> job duties (emphasis on challenging technical work,ongoing training opportunities <strong>and</strong> a team approach toproblem solving)Minimum Skills Required – A short bulleted list of requiredskills <strong>and</strong> experienceBenefits – A short paragraph detailing salary range, bonuses<strong>and</strong> other benefitsA method of contacting the companyOkay, now let’s take a look at a representative employment adthat conforms to many of the points in the above layout:Company: NameLocation: AddressStatus: Full-Time, Employee235


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffJob Category: <strong>Service</strong> <strong>Desk</strong>Relevant Work Experience: 3-5 YearsCareer Level: Experienced (Non-Manager)We are currently seeking a highly skilled <strong>Service</strong> <strong>Desk</strong>representative with the drive <strong>and</strong> determination to help ussupport our client base. This position reports to our servicemanager. We are looking for an individual who is a problemsolver<strong>and</strong> has a proven track record of working within a teamenvironment to successfully address challenging usercomputing issues, <strong>and</strong> is accustomed to leveraging technicaltraining opportunities to improve their skills. If you have theexperience <strong>and</strong> the desire, we'd like to talk to you.Our <strong>Service</strong> <strong>Desk</strong> representatives are responsible formaintaining user uptime <strong>and</strong> improving their computingexperiences through effective remote monitoring,maintenance <strong>and</strong> problem identification <strong>and</strong> resolutionactivities, as well as growing <strong>and</strong> developing the organization’sperception with existing clients through exceptional customerservice. C<strong>and</strong>idates must be energetic <strong>and</strong> focused with astrong motivation to learn new technologies <strong>and</strong> management<strong>and</strong> maintenance processes. This position requires dedication,persistence, follow-up, effective utilization of providedresources <strong>and</strong> unbeat<strong>able</strong> customer service.236


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffThis position will include identifying user problems <strong>and</strong>working within a structured problem management <strong>and</strong>resolution process to remediate issues within establishedSLAs, <strong>and</strong> involves working with other resources <strong>and</strong> vendorsto deliver effective support services. Responsibilities includeidentifying, documenting <strong>and</strong> troubleshooting user computingissues to resolution <strong>and</strong> maintaining client satisfaction.Job duties include utilizing our remote monitoring <strong>and</strong>management (RMM) <strong>and</strong> professional services automation(PSA) solutions along with other service-specific tools <strong>and</strong>technologies to deliver remote user support services <strong>and</strong>update service request information, answer technical supportcalls, assign ticket severity, prioritize work accordingly, <strong>and</strong>collaborate <strong>and</strong> work with other staff <strong>and</strong> vendor supportresources to resolve issues. Overall relationship management<strong>and</strong> the ability to coordinate required resources to respond tocomplex IT requirements is desired. Other requirementsinclude participating in ongoing training <strong>and</strong> attainment ofmanufacturer certifications, developing <strong>and</strong> maintainingrelationships with user <strong>and</strong> vendor contacts, <strong>and</strong> preparing<strong>and</strong> presenting service <strong>and</strong> monitoring reports tomanagement regularly.Minimum skills required:237


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffMinimum three years of <strong>Service</strong> <strong>Desk</strong> experienceMicrosoft Certified Professional statusExcellent knowledge of Microsoft software <strong>and</strong>technologiesStrong interpersonal skills required to effectivelycommunicate with users <strong>and</strong> vendorsPassion for teamwork, continuing education, problemsolving <strong>and</strong> exceptional customer serviceMust be well spoken, outgoing, organized, detailedorientated,depend<strong>able</strong> <strong>and</strong> flexibleExperience with HP, Cisco <strong>and</strong> Citrix technologies aplusValid driver's license <strong>and</strong> proof of insuranceBackground check <strong>and</strong> drug screen requiredReli<strong>able</strong> transportationThis position entails:Troubleshooting user problems over the phone <strong>and</strong>with remote control technologiesAccurate documentation of all activities conducted<strong>The</strong> ability to manage, maintain, troubleshoot <strong>and</strong>support our users’ networks, equipment, software <strong>and</strong>services<strong>The</strong> ability to learn quickly <strong>and</strong> adapt to changingrequirements238


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical Staff<strong>The</strong> successful c<strong>and</strong>idate must be:Professional <strong>and</strong> articulateInterpersonally adeptTechnically proficientA relationship builderA problem solverBenefits include group medical/dental insurance, paidvacation, holidays, personal & sick time <strong>and</strong> trainingreimbursement. Our generous compensation plans arestructured as salary plus bonuses for meeting utilization,compliance <strong>and</strong> customer service requirements, with initialcompensation commensurate with relevant experience.Qualified c<strong>and</strong>idates please submit a current resume, alongwith salary history via emailResourcesCareerbuilder.comwww.careerbuilder.comDice.comwww.dice.com239


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Writing Effective Employment Ads for Technical StaffHotjobs.comwww.hotjobs.comMonster.comwww.monster.com240


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffUsing DISC Behavioral Profiles BeforeInterviewing C<strong>and</strong>idatesI remember clearly how hit-<strong>and</strong>-miss our success at hiring theright staff used to be before we discovered the value ofutilizing DISC behavioral profiling in our hiring process. Basedupon the groundbreaking work of William Moulton MarstonPh.D. (1893 - 1947) in the (then) emerging field of psychology,DISC measures four dimensions of normal human behavior:Dominance - relating to control, power <strong>and</strong>assertiveness (how we respond to problems orchallenges)Influence - relating to social situations <strong>and</strong>communication (how we influence others to our pointof view)Steadiness (submission in Marston's time) - relating topatience, persistence, <strong>and</strong> thoughtfulness (how werespond to the pace of our environment)Conscientiousness (or caution, compliance inMarston's time) - relating to structure <strong>and</strong> organization(how we respond to rules <strong>and</strong> procedures set byothers)We have not only been <strong>able</strong> to significantly improve oursuccess rate at hiring the right staff since implementing DISC241


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffprofiling, but we have used DISC profiles to help in teambuildingefforts. If you haven’t read Jim Collins’ excellent book“Good to Great”, do yourself a favor <strong>and</strong> pick up a copy. Oneof the key concepts in “Good to Great” is that of not only“getting the right people on the bus”, but “getting the rightpeople in the right seats on the bus”. DISC behavioral profileshelp us achieve both of these objectives.Based upon answering a series of twenty-four questions, eachwith the directive to choose what a c<strong>and</strong>idate is “most like”<strong>and</strong> “least like”, the DISC profile will generate a voluminousreport describing the subject’s behavior with incredibleaccuracy. Here is a representative example of the types ofquestions a subject is asked to answer in a DISC profile:Each question has two answers – choose one answer thatindicates which you are Most Like, <strong>and</strong> one answer thatindicates which you are Least Like. Each question requires twochoices:242


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffMost LikeLeast LikeGentle, kindlyPersuasive, convincingxHumble, reserved, modestxOriginal, inventive, individualisticAttractive, Charming, attracts othersxCooperative, agree<strong>able</strong>Stubborn, unyieldingxSweet, pleasingxEasily led, followerxBold, daringLoyal, faithful, devoted243


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffCharming, delightfulIt seems almost unbeliev<strong>able</strong> that merely completing twentyfourquestions like this can create a comprehensive behavioralprofile that we have come to rely on in each <strong>and</strong> every one ofour hiring decisions. And I’ve got to admit that when we havegone ahead <strong>and</strong> made a hiring decision in spite of some redflags uncovered by a DISC profile, we’ve always come to regretit.Here’s a sample portion of a fictitious DISC profile:Elizabeth prefers being a team player, <strong>and</strong> wants each playerto contribute along with her. Many people see her as a selfstarterdedicated to achieving results. She can be blunt <strong>and</strong>critical of people who do not meet her st<strong>and</strong>ards. She mayhave difficulty dealing with others who are slower in thought<strong>and</strong> action. Elizabeth has the ability to question people's basicassumptions about things. She prides herself on her creativity,incisiveness <strong>and</strong> cleverness. She can be incisive, analytical <strong>and</strong>argumentative at times. She is aggressive <strong>and</strong> confident. Shetends to have a "short fuse" <strong>and</strong> can display anger ordispleasure when she feels that people are taking advantageof her. Elizabeth is forward-looking, aggressive <strong>and</strong>competitive. His vision for results is one of her positive244


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffstrengths. She is comfort<strong>able</strong> in an environment that may becharacterized by high pressure <strong>and</strong> is variety-oriented.Elizabeth will work long hours until a tough problem is solved.After it is solved, Elizabeth may become bored with any routinework that follows. She is logical, incisive <strong>and</strong> critical in herproblem-solving activities. She sometimes gets so involved in aproject that she tends to take charge. She usually takes timewhen confronted with a major decision; that is, she takes anunemotional approach to analyzing the data <strong>and</strong> facts. Othersmay see this as vacillating; however she is just thinkingthrough all the ramifications of her decision. Elizabeth finds iteasy to share her opinions on solving work-related problems.Sometimes she may be so opinionated about a particularproblem that she has difficulty letting others participate in theprocess. She sometimes requires assistance in bringing majorprojects to completion. She may have so many projectsunderway that she needs help from others. She likes thefreedom to explore <strong>and</strong> the authority to re-examine <strong>and</strong> retesther findings.Elizabeth tends to be intolerant of people who seemambiguous or think too slowly. She usually communicates in acool <strong>and</strong> direct manner. Some may see her as being aloof <strong>and</strong>blunt. When communicating with others, Elizabeth mustcarefully avoid being excessively critical or pushy. She tries to245


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffget on with the subject, while others may be trying to workthrough the details. She is skilled at asking informed questions<strong>and</strong> extracting information, but for some people she may needto phrase her questions more tactfully. Her creative <strong>and</strong> activemind may hinder her ability to communicate to otherseffectively. She may present the information in a form thatcannot be easily understood by some people. Others oftenmisunderst<strong>and</strong> her great ability as a creative thinker. She isnot influenced by people who are overly enthusiastic. <strong>The</strong>yrarely get her attention. She may display a lack of empathy forothers who cannot achieve her st<strong>and</strong>ards.Here are some other excerpts from Elizabeth’s DISC Profile:Value to the organization:This section of the report identifies the specific talents <strong>and</strong>behavior Elizabeth brings to the job. By looking at thesestatements, one can identify her role in the organization. <strong>The</strong>organization can then develop a system to capitalize on herparticular value <strong>and</strong> make her an integral part of the team.Thinks bigForward-looking <strong>and</strong> future-orientedPresents the facts without emotionPlaces high value on timeUsually makes decisions with the bottom line in mind246


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffInnovativeAlways looking for logical solutionsInitiates activityChallenge-orientedIdeal environment:This section identifies the ideal work environment based onElizabeth's basic style. People with limited flexibility will findthemselves uncomfort<strong>able</strong> working in any job not described inthis section. People with flexibility use intelligence to modifytheir behavior <strong>and</strong> can be comfort<strong>able</strong> in many environments.Use this section to identify specific duties <strong>and</strong> responsibilitiesthat Elizabeth enjoys <strong>and</strong> also those that create frustration.Evaluation based on results, not the processNon-routine work with challenge <strong>and</strong> opportunityAn innovative <strong>and</strong> futuristic-oriented environmentProjects that produce tangible resultsData to analyzePrivate office or work areaEnvironment where she can be a part of the team, butremoved from office politicsForum to express ideas <strong>and</strong> viewpointsPerceptions:247


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffA person's behavior <strong>and</strong> feelings may be quickly telegraphedto others. This section provides additional information onElizabeth's self-perception <strong>and</strong> how, under certain conditions,others may perceive her behavior. Underst<strong>and</strong>ing this sectionwill empower Elizabeth to project the image that will allow herto control the situation.Self-perception:Elizabeth usually sees herself as being:PioneeringAssertiveCompetitiveConfidentPositiveWinnerOther’s perception:Under moderate pressure, tension, stress or fatigue, othersmay see her as being:Dem<strong>and</strong>ingNervyEgotisticalAggressive248


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffAnd, under extreme pressure, stress or fatigue, others maysee her as being: Abrasive Controlling Arbitrary OpinionatedDescriptors:Based on Elizabeth's responses, the report has marked thosewords that describe her personal behavior. <strong>The</strong>y describe howshe solves problems <strong>and</strong> meets challenges, influences people,responds to the pace of the environment <strong>and</strong> how sheresponds to rules <strong>and</strong> procedures set by others.249


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffAdapted style:Elizabeth sees her present work environment requiring her toexhibit the behavior listed on this page. If the followingstatements DO NOT sound job related, explore the reasonswhy she is adapting this behavior.250


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffPrecise, analytical approach to work tasksActing without precedent, <strong>and</strong> <strong>able</strong> to respond tochange in daily workSensitivity to existing rules <strong>and</strong> regulationsLimited contact with peopleDisciplined, meticulous attention to orderHaving the ability to see the "big picture" as well as thesmall pieces of the puzzleCareful, thoughtful approach to decision makingQuickly responding to crisis <strong>and</strong> change, with a strongdesire for immediate resultsAnticipating <strong>and</strong> solving problemsPersistence in job completionDealing with a wide variety of work activitiesCalculation of risks before taking actionAccurate adherence to high quality st<strong>and</strong>ardsKeys to motivating:Elizabeth wants:251


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffEvaluation on not only the results achieved, but thequality of the work <strong>and</strong> the price she paid forperformanceSincere appreciation for achievements--may interpretas manipulation if overdoneTo explore new ideas <strong>and</strong> authority to test her findingsTo be part of a quality-oriented work groupSupport staff to do detail workTo know the agenda for the meetingNew challenges <strong>and</strong> problems to solveFreedom from controls that restrict her creativityTo be seen as a leaderPrestige, position <strong>and</strong> titles so she can control thedestiny of othersMeetings that stay on the agenda, or reasons forchanging the agendaKeys to managing:Elizabeth needs:To know results expected <strong>and</strong> to be evaluated on theresultsTo adjust her intensity to match the situationTo be more cooperative with other team membersA program for pacing work <strong>and</strong> relaxingTo analyze constructive criticism to see if it's true <strong>and</strong>how it may be impacting her career252


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffTo display empathy for people who approach lifedifferently than she doesTo underst<strong>and</strong> that her tendency to tell it like it is mayreduce performance rather than raise it with somepeopleTo underst<strong>and</strong> her role on the team--either a teamplayer or the leaderTo negotiate commitment face-to-faceAppreciation of the feelings of othersTo be objective <strong>and</strong> listen when others volunteerconstructive criticism<strong>The</strong> opportunity to ask questions to clarify ordetermine whyAreas for improvement:In this area is a listing of possible limitations without regard toa specific job. Review with Elizabeth <strong>and</strong> cross out thoselimitations that do not apply. Highlight 1 to 3 limitations thatare hindering her performance <strong>and</strong> develop an action plan toeliminate or reduce this hindrance.Elizabeth has a tendency to:253


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffHave no concept of the problems that slower-movingpeople may have with her styleBe inconsistent because of many stops, starts <strong>and</strong>ever-changing directionSet st<strong>and</strong>ards for herself <strong>and</strong> others so high thatimpossibility of the situation is common placeHave difficulty finding balance between family <strong>and</strong>workHave trouble delegating--can't wait, so does it herselfI hope by now you can see how extremely valu<strong>able</strong> this tool is,<strong>and</strong> why we choose to include it as a requirement during ourhiring process.So how exactly do we use the DISC profile? Well, we willreview all of the resumes that come in for a particular jobposting, <strong>and</strong> then determine who our top c<strong>and</strong>idates are.After this, we will conduct a quick phone interview with eachc<strong>and</strong>idate, <strong>and</strong> the ones that make it to the next cut will beemailed a link to take our DISC behavioral profile online. Wethen review the resultant report, <strong>and</strong> decide who to call in forin-person interviews.For technical staff c<strong>and</strong>idates, in addition to the st<strong>and</strong>ard DISCbehavioral profile, we will also have them take a specializedversion of the DISC profile, called the Personal Talent Skills254


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffInventory (PTSI). <strong>The</strong> PTSI is an objective analysis of thec<strong>and</strong>idate’s underst<strong>and</strong>ing of themselves, their strengths <strong>and</strong>their weaknesses. An individual’s talents <strong>and</strong> personal skillsare a fundamental <strong>and</strong> integral part of who they are. <strong>The</strong> PTSIdescribes what an individual “can do” in 23 capacities, orpersonal skills, related to the business environment.<strong>The</strong> PTSI is designed to capture how people see themselves<strong>and</strong> the world around them. To do this, it measures a personfrom two perspectives, external <strong>and</strong> internal, <strong>and</strong> in sixdimensions, three in each perspective.External:Empathetic Outlook ⇒ Judgment of peoplePractical Thinking ⇒ Judgment of tasksSystems Judgment ⇒ Judgment of systemsInternal:Sense of Self ⇒ Judgment of beingRole Awareness ⇒ Judgment of doingSelf Direction ⇒ Judgment of becoming<strong>The</strong> PTSI report provides a ranking of personal skills thatdescribe an individual’s potential for workplace performanceby determining their capability in several areas. After255


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffanalyzing the clarity, bias <strong>and</strong> intensity of each of the sixdimensions, one can begin to underst<strong>and</strong> an individual’s selfview <strong>and</strong> world view, gaining true insight into the internal <strong>and</strong>external perspectives that affect superior performance.Underst<strong>and</strong>ing problem-solving techniques, <strong>and</strong> the ability toimplement them effectively during service delivery, is how wedefine a successful technical resource. We utilize the PTSI toidentify a c<strong>and</strong>idate’s problem-solving strengths <strong>and</strong>weaknesses <strong>and</strong> their ability to perform these functions in theworkplace.<strong>The</strong> following is a sample of the results from a fictitious PTSI:256


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffName: ElizabethWorld ViewThis is how Elizabeth sees the world around her. This viewmeasures her clarity <strong>and</strong> underst<strong>and</strong>ing of people, tasks <strong>and</strong>systems. It could also be looked at in terms of feeling, doing<strong>and</strong> thinking from an external st<strong>and</strong>point. <strong>The</strong> statementsbelow are based primarily on the 3 dimensions on the left sideof the dimensional balance page <strong>and</strong> are in a r<strong>and</strong>om order.Elizabeth may benefit from improving her relationshipswith authority figuresShe needs an environment in which contributions arerecognized, properly rewarded, <strong>and</strong> appreciated.She has the ability to become action-oriented in orderto complete the task at h<strong>and</strong>She performs best in an atmosphere where there is anopen exchange of ideas <strong>and</strong> where feedback is readilyavail<strong>able</strong>.Elizabeth can be versatile <strong>and</strong> can adapt to differenttypes of people <strong>and</strong> changing situationsShe may benefit from underst<strong>and</strong>ing the importance ofinterpersonal relationshipsShe needs an atmosphere that has structure <strong>and</strong> adefined chain of comm<strong>and</strong>257


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffShe underst<strong>and</strong>s how to deal with ideas, knowledge,<strong>and</strong> systemsElizabeth has the ability to use her people skills inorder to relate to othersSelf ViewThis is how Elizabeth sees herself. This view measures herclarity <strong>and</strong> underst<strong>and</strong>ing of herself, her roles in life <strong>and</strong> herdirection for the future. <strong>The</strong> internal dimensions are areflection of her from both personal <strong>and</strong> professionalviewpoints. <strong>The</strong> statements below are based primarily on the3 dimensions on the right side of the dimensional balancepage <strong>and</strong> are in a r<strong>and</strong>om order.Elizabeth tends to use her internal awareness toachieve the desired outcome during the process of arole changeShe may apply her life planning skills for personalgrowthShe has a grasp of her actual <strong>and</strong> potentialaccomplishments, life roles <strong>and</strong> activitiesShe has achieved a moderate level of selfunderst<strong>and</strong>ingElizabeth believes that her own worth is based equallyon her sense of self, her life roles, <strong>and</strong> growing as aperson258


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffShe may focus on gaining information to clearlyenvision herself in the futureShe could get into a comfort zone which could restricther from developing or applying more of her potentialShe tends to have a balanced underst<strong>and</strong>ing of herself,her roles <strong>and</strong> her future developmentElizabeth tends to be adapt<strong>able</strong>, depending on what iscalled for in the current situationAs you can tell, this portion of the PTSI provides a goodunderst<strong>and</strong>ing of a c<strong>and</strong>idate’s perceptions of not onlyexternal environments such as the workplace, but ofthemselves as well, <strong>and</strong> can also be utilized as a tool toimprove an existing technical c<strong>and</strong>idate’s skills orinterpersonal relationships with others. <strong>The</strong> following sectionillustrates the PTSI’s findings of a c<strong>and</strong>idate’s critical successskills in a visually appealing manner, <strong>and</strong> ranks the c<strong>and</strong>idate’sresponses against the population:259


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffCritical Success Skills260


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staff261


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staff<strong>The</strong> General Employment Skills Summary262


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffGetting Results263


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffAs you can see from these graphical representations, Elizabethconsistently scored highly in almost every area of the PTSI.Based upon the information reflected in this Personal TalentSkills Inventory, along with an evaluation of Elizabeth’s DISCbehavioral profile, it’s immediately apparent that she wouldmake a good c<strong>and</strong>idate for a position on our technical team.<strong>The</strong> Interview Process for Hiring Technical StaffNow that we’ve reviewed the DISC behavioral profile <strong>and</strong>Personal Talent Skills Inventory results of our top c<strong>and</strong>idates,we can decide which of these merit an in-person interview.Note that we have minimized much of the effort we used toexpend when hiring staff in the old days. Those were the dayswhen c<strong>and</strong>idates would show up to our offices after sending ina resume that looked promising, <strong>and</strong> we’d take lots <strong>and</strong> lots oftime out of our busy schedules to interview them. And guesswhat? Many of the interviews for technical positions wentreally well – making it difficult for us to choose the rightc<strong>and</strong>idate.264


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffAlways remember to keep in mind the c<strong>and</strong>idate’s currentemployment situation during the interview <strong>and</strong> hiring process,<strong>and</strong> ask pointed questions regarding their prior <strong>and</strong> currentemployment history. A great technical c<strong>and</strong>idate should notcurrently be out of work, unless there is a very compellingreason for it. It’s simple logic to assume that successful,aggressive <strong>and</strong> motivated technical resources worth their saltshould currently be employed. And if they are successful, theyshould look <strong>and</strong> act the part. A good c<strong>and</strong>idate realizes thevalue of first impressions <strong>and</strong> follow-up. If they’re not dressedto impress, <strong>and</strong> speak confidently <strong>and</strong> articulately duringinterviews, that’s strike one. If they don’t initiate good followupafter interviews, that’s strike two. If they are notresponsive to your attempts at contact after interviews, that’sstrike three.Successful technical c<strong>and</strong>idates will have a firm knowledge oftheir history at previous employers, <strong>and</strong> be <strong>able</strong> tocommunicate their skill set, certifications <strong>and</strong> technicalexperience, in addition to their salaries <strong>and</strong> bonus plans forthe past 3 years. We’re also going to ask them specificquestions about their daily duties, roles <strong>and</strong> responsibilities,<strong>and</strong> how much of their compensation was based uponmeeting quotas for utilization, billing, client satisfaction <strong>and</strong>adhering to SLAs, <strong>and</strong> how often they failed to achieve them.265


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffIf they stutter or stammer, or begin tap-dancing during thisline of questioning, that’s a red flag. And as with any potentialhire, spotty or short tenure at previous employers is always amatter for concern. Read between the lines of the c<strong>and</strong>idate’sresume, <strong>and</strong> don’t be afraid to ask the tough questions – bedirect <strong>and</strong> look for the same in return. If you’re not good atconfrontation, for Pete’s sake, please have someone elseperform these initial interviews for you. <strong>The</strong> ultimateeffectiveness of your service delivery begins with the decisionsyou make during the hiring process.Let’s take a look at areas to evaluate when interviewing atechnical staff c<strong>and</strong>idate (depending upon their experience<strong>and</strong> areas of expertise, an experienced technical person willqualify themselves by answering the following questionssuccessfully):Ask the c<strong>and</strong>idate to verbalize their basic problemmanagement <strong>and</strong> resolution strategyIs the c<strong>and</strong>idate experienced <strong>and</strong> trained in PSAs,trouble-ticketing systems <strong>and</strong> RMM solutions? If so,ask them to describe which ones <strong>and</strong> their experiencewith them.How does the c<strong>and</strong>idate keep up with newtechnology?What are the c<strong>and</strong>idate’s certifications?266


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffWhat are the c<strong>and</strong>idate’s existing utilization numbersat their current/recent position?How many service requests does the c<strong>and</strong>idate closeper day/week/month at their current/recent position?What is the c<strong>and</strong>idate’s current/recent job title <strong>and</strong>function?Does the c<strong>and</strong>idate have experience providingproactive, reactive support, or both?What percentage of time does the c<strong>and</strong>idate provideremote support at their current/recent position?What percentage of time does the c<strong>and</strong>idate provideonsite support at their current/recent position?Does the c<strong>and</strong>idate have experience with producingservice reports?Ask the c<strong>and</strong>idate to describe successful methodsthey’ve used to calm an irate user or client withspecific examplesAsk the c<strong>and</strong>idate to provide a history of the hardwarethey have worked with <strong>and</strong> to rank their expertise insameAsk the c<strong>and</strong>idate to provide a history of the softwarethey have worked with <strong>and</strong> to rank their expertise insameAsk the c<strong>and</strong>idate to provide a history of the solutionsthey have worked with <strong>and</strong> to rank their expertise insame267


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffAsk the c<strong>and</strong>idate to provide a history of the vendorsthey have worked with <strong>and</strong> to describe theirrelationshipWhat metrics is the c<strong>and</strong>idate’s measured by in theircurrent/recent position <strong>and</strong> how often do they exceedthem?What support tier does the c<strong>and</strong>idate currentlyparticipate in at their current/recent position?How many other technical resources comprise thec<strong>and</strong>idate’s business unit at their current/recentposition?What percentage of time does the c<strong>and</strong>idate spendmentoring other technical resources at theircurrent/recent position?What percentage of time does the c<strong>and</strong>idate spendtroubleshooting an issue before deciding to escalate it?Has the c<strong>and</strong>idate ever managed a team of resources?If so, ask them to describe these situations, their role<strong>and</strong> responsibilities <strong>and</strong> success at achieving theirobjective.Verbalize several support scenarios specific to theposition the c<strong>and</strong>idate is interviewing for, <strong>and</strong> askthem how they would approach <strong>and</strong> resolve themFor an exhaustive list of technical questions to ask thec<strong>and</strong>idate, browse to the following links at Daniel Petri’sexcellent IT Knowledgebase:268


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffNetworking:http://www.petri.co.il/mcse_system_administrator_networking_interview_questions.htmActive Directory:http://www.petri.co.il/mcse_system_administrator_active_directory_interview_questions.htmMicrosoft Exchange:http://www.petri.co.il/mcse-system-administratorexchange-interview-questions.htmPC Support:http://www.petri.co.il/mcse-system-administrator-pctechnician-interview-questions.htm<strong>The</strong> interview questions contained at the links above on thePetri Knowledgebase are comprehensive – take a look at thesewhen developing your interview <strong>and</strong> testing process for newtechnical hires <strong>and</strong> don’t reinvent the wheel.Based upon review of the Personal Talent Skills Inventory <strong>and</strong>c<strong>and</strong>idate’s performance during the initial interview,determine whether the c<strong>and</strong>idate can qualify to join yourtechnical staff, once they underst<strong>and</strong> your particularprocesses <strong>and</strong> procedures, tools <strong>and</strong> technology.<strong>The</strong>se are the technical-specific areas we will cover during theinitial live interview with all c<strong>and</strong>idates, as well as the269


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Stafftechnical-specific activities they will be asked to performduring the interview (such as taking a written technical test ortroubleshooting a test pc, server or network “sabotaged” forthis purpose). <strong>The</strong> best technical c<strong>and</strong>idates will rise to the topof the list naturally. But let me throw out a cautionary notehere – we don’t want to make the mistake of hiring the bestc<strong>and</strong>idate of the bunch just because they are the bestc<strong>and</strong>idate of the bunch. We’ve got to hire the best c<strong>and</strong>idatefor our organization. This means we must be prepared tointerview many c<strong>and</strong>idates before making the commitment tohire <strong>and</strong> train one.Some general questions we would also like to have answeredinclude:What do you know about our company?o What we are gauging here is their preparationfor the interview – a good c<strong>and</strong>idate wouldhave researched our website, at the very leastTell me a little bit about yourself <strong>and</strong> your previousemployment historyo What we are looking for is a brief description oftheir work history & skills, a narrative of theirpersonal <strong>and</strong> professional experiences270


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffWhat are some of your strengths?o This question should not be difficult for thec<strong>and</strong>idate to answerWhat are some of your weaknesses?o A good c<strong>and</strong>idate should not have any troublenaming 3 weaknesses – give them plenty oftime to answerWhat do you see yourself doing in 3 years? …. howabout in 5 years?o Is the c<strong>and</strong>idate a goal-setter?Tell me about a time when you made a mistake with aclient <strong>and</strong> what steps you took to resolve the issueo Look for awareness of fallibility, <strong>and</strong> gauge thec<strong>and</strong>idate’s problem-resolution techniqueWhat do you get excited about? …. What upsets you?What situations make you lose your temper?o <strong>The</strong>se last two questions are more personal innature, <strong>and</strong> will be explored in more detailwhen discussing the c<strong>and</strong>idate’s DISC Profilewith themWhat was one of your greatest successes?What are 3 things you do extremely well?o A solid c<strong>and</strong>idate will have no troubleanswering these questionsWhat are 3 things that you need to improve on?o A good c<strong>and</strong>idate should not have any troublenaming all 3 things – give them plenty of timeto answer271


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staff In a group or team what position do you take on –leader, coordinator or support?o We’re looking for natural leaders here Tell us about a team you have worked ino What we are looking for is what their role was,again to determine if they are a leader,facilitator, or socializerWhat are three positive things your last boss would sayabout you?o A good c<strong>and</strong>idate should have no problemanswering this questionHow much guidance <strong>and</strong> management do you like?o We are trying to determine how independentthe c<strong>and</strong>idate isHow much do you feel you need?o A good c<strong>and</strong>idate will be <strong>able</strong> to verbalize whenthey need directionWhat type of people do you work best with?o This may elicit a canned response, but we mayalso get a nugget of insight if the person replies,"People who aren’t idiots."If budgets were of no concern at your current orprevious employer, what would be the first thing youwould spend money on <strong>and</strong> why?272


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffo <strong>The</strong> answer to this question gives an insight asto how involved the person was at theirprevious job. How quickly c<strong>and</strong>idate respondslets us know how much thought they’ve putinto this subject in the past.Can you send us an example of something you’vewritten – a quote or proposal?o We need to gauge the c<strong>and</strong>idate’s ability towrite quotes <strong>and</strong> proposals, if requiredIs there anything that would interfere with yourregular attendance?o A boilerplate question which may reveal anypersonal conflictsWhat would your perfect job look like?o This is the c<strong>and</strong>idate’s opportunity to push theenvelope, <strong>and</strong> test our response – the moredescriptive, the betterWhy should we hire you? …. What makes you morequalified than the other applicants?o This is the c<strong>and</strong>idate’s opportunity to sell us<strong>and</strong> try to close the positionWhat skills do you possess that you think wouldbenefit our company? ….How do you see yourselffitting in?o A follow-up on the previous line of questioning273


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffRate yourself on a scale of 1-10 on Word, Excel,PowerPoint, Outlook, Vista…o We’re looking for the c<strong>and</strong>idate’s proficiencywith our basic office applicationsHow do you respond to pressure & deadlines?o <strong>The</strong>re isn’t a specifically wrong answer here,but we’re looking for the c<strong>and</strong>idate’s copingmechanism – we might hear: “It stresses meout when…”, to which our follow-up would be:“How do you deal with it”?, to which theymight answer: “I just get out of the office for afew minutes, <strong>and</strong> take a walk to clear my head”If you could start your career again, what would you dodifferently?o We’re looking for an honest appraisalHow would you describe your personality?o Easy going, problem solver, director, like talkingto people, make friends easily, etc.What is your favorite movie of all time? Why?o Just a question to loosen up the mood, wemight find a common interest <strong>and</strong> chat for a bitDescribe a time when you made a client/clientextremely happy?o A positive, reinforcing questionDo you mind if we call your former employer?274


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffo A good reason for a negative answer here mustbe offeredWhy are you considering a career change at this time,or leaving your current position?What do you like <strong>and</strong> dislike about your currentposition?o A couple of basic interview questions meant toprovide insight into the c<strong>and</strong>idate’s currentstate of mind <strong>and</strong> desiresWhat about this position do you find the mostappealing? .... Least appealing?o We’re looking for something in addition to thecompensationIn your present position, what internal problems haveyou identified <strong>and</strong> taken action to fix?o We’re gauging how deeply the c<strong>and</strong>idate caresto involve themselves as a change agent for thebenefit of others besides themselvesWhat kind of feedback have you received from pastclients?o Expect positive reviews hereHow have you h<strong>and</strong>led negative feedback from clients,or team members?o We’re looking for a truthful response here – askfor a specific incident275


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical StaffGive an example of a time where there was a conflictin a team/group that you were involved in <strong>and</strong> how itwas resolved.o What did they do, how did they h<strong>and</strong>le it?What we are looking for is the ability to gostraight to the source. Telling the boss rightaway, without telling the person concerned orignoring the situation <strong>and</strong> hoping it will go awayare not good signs.Do you have any questions for us?o A good c<strong>and</strong>idate will always have questions<strong>The</strong>se are all excellent questions to pose to potentialc<strong>and</strong>idates for our technical position. I’m certain you can nowsee why we don’t just interview anyone that can fog a mirror –the interview <strong>and</strong> hiring process is lengthy, <strong>and</strong> deservedly so– we need to be absolutely certain to do everything in ourpower to minimize the possibility of hiring the wrong person.If we’re going to spend the consider<strong>able</strong> time <strong>and</strong> money tohire <strong>and</strong> train a new technical person, we want an excellentreturn on our investment.So let’s say we’ve found one or two c<strong>and</strong>idates that we feelhave the “right stuff”, <strong>and</strong> would be a positive addition to ourteam. Our next step is to schedule an interview with anothermember of our organization. At MSPU, all job c<strong>and</strong>idates for276


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffkey roles are interviewed by either I or my business partner. Ifthey are a technical c<strong>and</strong>idate, I perform the first liveinterview, <strong>and</strong> if they are a sales <strong>and</strong> marketing c<strong>and</strong>idate,Gary performs the first live interview. <strong>The</strong>n we swap roles, soGary gets to perform the second live interview with alltechnical c<strong>and</strong>idates, <strong>and</strong> I do the same for the sales <strong>and</strong>marketing c<strong>and</strong>idates. This second interview will eithervalidate or solidify the decision to hire a c<strong>and</strong>idate, or not.Like it or not, unless we’re a seasoned HR or hiringprofessional, sometimes it’s difficult to be completelyobjective during the interview <strong>and</strong> hiring process. This iswhere having another trusted individual avail<strong>able</strong> to comparenotes with can be invalu<strong>able</strong> – especially in situations whenthere needs to be a “tie-breaker” – two equally qualifiedc<strong>and</strong>idates that we may find challenging to choose between.In addition, when I’m the second interviewer, I know that thec<strong>and</strong>idate has already passed muster in order to get to me, soI begin exploring other areas that the first interviewer may nothave covered – to answer questions about compatibility (willthe c<strong>and</strong>idate be <strong>able</strong> to fit into our culture), <strong>and</strong> I try to gaugefrom a gut feeling (I know, the DISC profile doesn’t lie!) <strong>and</strong>comfort level my impression of how easy it will be to workwith <strong>and</strong> integrate the c<strong>and</strong>idate into our organization. I’ll askquestions specifically intended to reveal the more personalside of the c<strong>and</strong>idate, like what their taste in movies or T.V.277


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Interview Process for Hiring Technical Staffshows is, what they do for recreation, <strong>and</strong> ask them abouttheir immediate family, as well as their parents <strong>and</strong> theirbackgrounds; to get an idea of their stability <strong>and</strong> supportsystem, <strong>and</strong> attempt to uncover any stressors that may affectperformance on the job. This is all carried out in a friendly,conversational, “get to know me” manner, where I will sharepersonal information with the c<strong>and</strong>idate myself, a la HannibalLecter in Silence of the Lambs “…quid pro quo, Clarisse….”If the c<strong>and</strong>idate st<strong>and</strong>s a good chance of joining the team, it’simportant to begin building a relationship early on. If we reallywant to win over a c<strong>and</strong>idate, we need to show them thehuman side of our organization, as well as the careeropportunity. Assuming the second interview goes well, wenow have a green light to formalize an offer to the successfulc<strong>and</strong>idate. During the first interview, items such ascompensation <strong>and</strong> duties <strong>and</strong> responsibilities would naturallyhave been discussed, as well as a projected start date ofemployment, should the c<strong>and</strong>idate be awarded the position.It’s now time to formalize our offer to the successfulc<strong>and</strong>idate by means of an offer letter.278


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Letter<strong>The</strong> Offer Letter<strong>The</strong> offer letter will detail our intent to hire the c<strong>and</strong>idate,what their roles <strong>and</strong> responsibilities will be, as well as theircompensation, bonus <strong>and</strong> benefits plan. As with any <strong>and</strong> allforms used in your business practice, please consult with yourlegal advisor before relying on them.Let’s take a look at a st<strong>and</strong>ard offer letter:Offer of Employment <strong>and</strong> Employment ContractMonday, September 1 st , 2013(Employee’s Name)(Employee’s Address)Dear (Employee Name);We are pleased to offer you a position with (“Company”). Yourstart date, manager, compensation, benefits, <strong>and</strong> other termsof employment will be as set forth below <strong>and</strong> on EXHIBIT A.TERMS OF EMPLOYMENT279


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Letter1. Position <strong>and</strong> Duties. Company shall employ you, <strong>and</strong> youagree to competently <strong>and</strong> professionally perform such dutiesas are customarily the responsibility of the position as setforth in the job description attached as EXHIBIT A <strong>and</strong> asreasonably assigned to you from time to time by yourManager as set forth in EXHIBIT A.2. Outside Business Activities. During your employment withCompany, you shall devote competent energies, interests, <strong>and</strong>abilities to the performance of your duties under thisAgreement. During the term of this Agreement, you shall not,without Company’s prior written consent, render any servicesto others for compensation or engage or participate, activelyor passively, in any other business activities that wouldinterfere with the performance of your duties hereunder orcompete with Company’s business.3. Employment Classification. You shall be a Full-TimeEmployee <strong>and</strong> shall not be entitled to benefits except asspecifically outlined herein.4. Compensation/Benefits.4.1 Wage. Company shall pay you the wage as set forthin the job description attached as EXHIBIT A.280


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Letter4.2 Reimbursement of Expenses. You shall bereimbursed for all reason<strong>able</strong> <strong>and</strong> necessary expensespaid or incurred by you in the performance of yourduties. You shall provide Company with originalreceipts for such expenses.4.3 Withholdings. All compensation paid to you underthis Agreement, including payment of salary <strong>and</strong>tax<strong>able</strong> benefits shall be subject to such withholdingsas may be required by law or Company’s generalpractices.4.4 Benefits. You will also receive Company’s st<strong>and</strong>ardemployee benefits package (including healthinsurance), <strong>and</strong> will be subject to Company’s vacationpolicy as such package <strong>and</strong> policy are in effect fromtime to time.5. At-Will Employment. Either party may terminate thisAgreement by written notice at any time for any reason or forno reason. This Agreement is intended to be <strong>and</strong> shall bedeemed to be an at-will employment Agreement <strong>and</strong> does notconstitute a guarantee of continuing employment for anyterm.6. Nondisclosure Agreement. You agree to sign Company’sst<strong>and</strong>ard Employee Nondisclosure Agreement, Non-Compete281


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Letter<strong>and</strong> Proprietary Rights Assignment as a condition of youremployment. We wish to impress upon you that we do notwish you to bring with you any confidential or proprietarymaterial of any former employer or to violate any otherobligation to your former employers.7. Authorization to Work. Because of federal regulationsadopted in the Immigration Reform <strong>and</strong> Control Act of 1986,you will need to present documentation demonstrating thatyou have authorization to work in the United States.8. Further Assurances. Each party shall perform any <strong>and</strong> allfurther acts <strong>and</strong> execute <strong>and</strong> deliver any documents that arereasonably necessary to carry out the intent of thisAgreement.9. Notices. All notices or other communications required orpermitted by this Agreement or by law shall be in writing <strong>and</strong>shall be deemed duly served <strong>and</strong> given when deliveredpersonally or by facsimile, air courier, certified mail (returnreceipt requested), postage <strong>and</strong> fees prepaid, to the party atthe address indicated in the signature block or at such otheraddress as a party may request in writing.10. Governing Law. This Agreement shall be governed <strong>and</strong>interpreted in accordance with the laws of the State ofCalifornia, as such laws are applied to agreements between282


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Letterresidents of California to be performed entirely within theState of California.11. Entire Agreement. This Agreement sets forth the entireAgreement between the parties pertaining to the subjectmatter hereof <strong>and</strong> supersedes all prior written agreements<strong>and</strong> all prior or contemporaneous oral Agreements <strong>and</strong>underst<strong>and</strong>ings, expressed or implied.12. Written Modification <strong>and</strong> Waiver. No modification to thisAgreement, nor any waiver of any rights, shall be effectiveunless assented to in writing by the party to be charged, <strong>and</strong>the waiver of any breach or default shall not constitute awaiver of any other right or any subsequent breach or default.13. Assignment. This Agreement is personal in nature, <strong>and</strong>neither of the parties shall, without the consent of the other,assign or transfer this Agreement or any rights or obligationsunder this Agreement, except that Company may assign ortransfer this Agreement to a successor of Company’s business,in the event of the transfer or sale of all or substantially all ofthe assets of Company’s business, or to a subsidiary, providedthat in the case of any assignment or transfer under the termsof this Section, this Agreement shall be binding on <strong>and</strong> inureto the benefit of the successor of Company’s business, <strong>and</strong> the283


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer Lettersuccessor of Company’s business shall discharge <strong>and</strong> performall of the obligations of Company under this Agreement.14. Severability. If any of the provisions of this Agreement aredetermined to be invalid, illegal, or unenforce<strong>able</strong>, suchprovisions shall be modified to the minimum extent necessaryto make such provisions enforce<strong>able</strong>, <strong>and</strong> the remainingprovisions shall continue in full force <strong>and</strong> effect to the extentthe economic benefits conferred upon the parties by thisAgreement remain substantially unimpaired.15. Arbitration of Disputes. Any controversy or claim arisingout of or relating to this contract, or the breach thereof, shallbe settled by arbitration administered by the AmericanArbitration Association under its National Rules for theResolution of Employment Disputes, <strong>and</strong> judgment upon theaward rendered by the arbitrator(s) may be entered by anycourt having jurisdiction thereof.We look forward to your arrival <strong>and</strong> what we hope will be thestart of a mutually satisfying work relationship.Sincerely,MSP UniversityBy: __________________________MSPU Authorized Representative284


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer LetterAcknowledged, Accepted, <strong>and</strong> AgreedDate: _____________By: __________________________EmployeeOnce the employee signs the Offer Letter, they will haveformally agreed to the terms <strong>and</strong> conditions of ouremployment as described. An EXHIBIT A would follow thisagreement, stipulating the employee’s job description, duties<strong>and</strong> compensation. Let’s review an example EXHIBIT A:Exhibit “A”Job Description – <strong>Service</strong> <strong>Desk</strong> AnalystStart Date Is Monday, September 4, 2013285


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer LetterThis position will require, but not be limited to the followingEssential Responsibilities:Provide remote <strong>and</strong> onsite desktop, laptop, server <strong>and</strong>network problem management <strong>and</strong> resolution servicesto clients <strong>and</strong> end users via Company’scommunications <strong>and</strong> remote <strong>and</strong> onsite supportsolutions, processes <strong>and</strong> proceduresIdentify, document, prioritize, troubleshoot <strong>and</strong>escalate service requests per Company’s problemmanagement <strong>and</strong> resolution processes <strong>and</strong> SLAsPerform proactive maintenance of client <strong>and</strong> end userhardware, software <strong>and</strong> services per Company’sestablished processes <strong>and</strong> best practicesMaintain <strong>and</strong> pursue I.T. training competencies <strong>and</strong>certifications per Company’s established trainingschedule <strong>and</strong> requirementsMaintain Company st<strong>and</strong>ards for client satisfaction,utilization <strong>and</strong> compliance policiesUtilize Company’s PSA <strong>and</strong> RMM solutions perCompany’s established processes to delivermaintenance <strong>and</strong> problem management <strong>and</strong>resolution services to clients <strong>and</strong> end users286


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Offer LetterInterface with clients, end users <strong>and</strong> vendor supportresources as needed to deliver services withinestablished SLAsMaintain communication with all affected partiesduring problem management <strong>and</strong> resolution perCompany’s established processes <strong>and</strong> proceduresBase Salary for this position will be ($) per year.Eligibility to participate in quarterly bonuses will bedetermined by meeting established Company utilization,process <strong>and</strong> policy compliance, attainment of training <strong>and</strong>competencies/certifications, adherence to SLAs <strong>and</strong> customerservice performance metrics:Utilization requirement score: (%)Process <strong>and</strong> policy compliance score: (%)Attainment of competencies: (%)Adherence to SLAs score: (%)Customer service score: (%)Of course, your particular business model, products, servicesjob requirements <strong>and</strong> compensation schedules will dictatehow you structure EXHIBIT A.287


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreement<strong>The</strong> Employment AgreementAs part of the HR <strong>and</strong> hiring process, we are going to requireour new technical person to sign an employment agreement.<strong>The</strong> employment agreement will detail the technical person’sjob title <strong>and</strong> duties <strong>and</strong> responsibilities, <strong>and</strong> will contain nondisclosure<strong>and</strong> non-compete language in order to protectourselves from the potential for one of our competitors tohire our technical person away at some later date, <strong>and</strong>leverage our business plans, processes or other intellectualproperty against us. Depending upon your local or state laws,NDA <strong>and</strong> non-compete language <strong>and</strong>/or agreements will needto be tailored specifically to protect your rights in a court oflaw. As with any <strong>and</strong> all forms used in your business practice,please consult with your legal advisor before relying on them.Let’s take a look at a st<strong>and</strong>ard Employment Agreement:EMPLOYMENT AGREEMENTThis Employment Agreement (this "Agreement") is madeeffective by <strong>and</strong> between Company name , of full address toinclude zip code(employee’s name) ("Employee"), of(employee’s address).288


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment AgreementA. Company name is engaged in the business of ProvidingInformation Technology <strong>Service</strong>s. Employee willprimarily perform the job duties at full addressB. Company name desires to have the services ofEmployee.C. Employee is willing to be employed by CompanyName.<strong>The</strong>refore, the parties agree as follows:1. EMPLOYMENT. “Company Name” shall employ Employeeas a (job title). Employee shall provide to MSPU the followingservices: duties as needed. Employee accepts <strong>and</strong> agrees tosuch employment, <strong>and</strong> agrees to be subject to the generalsupervision, advice <strong>and</strong> direction of “Company name” <strong>and</strong> itssupervisory personnel. Employee shall also perform (i) suchother duties as are customarily performed by an employee ina similar position, <strong>and</strong> (ii) such other <strong>and</strong> unrelated services<strong>and</strong> duties as may be assigned to Employee from time to time.2. BEST EFFORTS OF EMPLOYEE. Employee agrees to performfaithfully, industriously, <strong>and</strong> to the best of Employee's ability,experience, <strong>and</strong> talents, all of the duties that may be requiredby the express <strong>and</strong> implicit terms of this Agreement, to the289


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreementreason<strong>able</strong> satisfaction of “Company name”. Such duties shallbe provided at such place(s) as the needs, business, oropportunities may require from time to time.3. EXPENSE REIMBURSEMENT. “Company name” willreimburse Employee for "out-of-pocket" expenses incurred byEmployee in accordance with policies in effect from time totime.4. RECOMMENDATIONS FOR IMPROVING OPERATIONS.Employee shall provide “Company name” with all information,suggestions, <strong>and</strong> recommendations regarding MSPU’sbusiness, of which Employee has knowledge, which will be ofbenefit to“Company name”.5. CONFIDENTIALITY. Employee recognizes that “Companyname” has <strong>and</strong> will have information regarding the following:- inventions- products- product design- processes- technical matters- trade secrets290


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreement- copyrights- client lists- prices- costs- discounts- business affairs- future plans- marketing plans <strong>and</strong> methods- communications- meetings- conversations- training- emails- faxes- documents- wage <strong>and</strong> compensation information291


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreement- disciplinary actions- policies<strong>and</strong> other vital information items (collectively, "Information")which are valu<strong>able</strong>, special <strong>and</strong> unique assets of “Companyname”. Employee agrees that Employee will not at any timeor in any manner, either directly or indirectly, divulge,disclose, or communicate any Information to any third partywithout the prior written consent of “Company name”.Employee will protect the Information <strong>and</strong> treat it as strictlyconfidential. A violation by Employee of this paragraph shallbe a material violation of this Agreement <strong>and</strong> will justify legal<strong>and</strong>/or equit<strong>able</strong> relief.6. UNAUTHORIZED DISCLOSURE OF INFORMATION. If itappears that Employee has disclosed (or has threatened todisclose) Information in violation of this Agreement,“Company name” shall be entitled to an injunction to restrainEmployee from disclosing, in whole or in part, suchInformation, or from providing any services to any party towhom such Information has been disclosed or may bedisclosed. “Company name” shall not be prohibited by thisprovision from pursuing other remedies, including a claim forlosses <strong>and</strong> damages.292


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreement7. CONFIDENTIALITY AFTER TERMINATION OF EMPLOYMENT.<strong>The</strong> confidentiality provisions of this Agreement shall remainin full force <strong>and</strong> effect for a 1 year period after thetermination of Employee's employment.8. NON-COMPETE AGREEMENT. Employee recognizes thatthe various items of Information are special <strong>and</strong> unique assetsof the Company <strong>and</strong> need to be protected from improperdisclosure. In consideration of the disclosure of theInformation to Employee, Employee agrees <strong>and</strong> covenantsthat for a period of 1 year following the termination of thisAgreement, whether such termination is voluntary orinvoluntary, Employee will not compete directly or indirectlywith “Company name”. <strong>The</strong> term “not compete” shall meanthat the Employee shall not, on Employee’s behalf or onbehalf of any other party, solicit or seek the business of anyclient or account of the Company existing during the term ofemployment <strong>and</strong> wherein said solicitation involves a product<strong>and</strong>/or service substantially similar to or competitive with anypresent or future product <strong>and</strong>/or service of the Company. Thiscovenant shall apply to the geographical area that includes allof the State of California <strong>and</strong> any other state in which theCompany has clients. Directly or indirectly engaging in anycompetitive business includes, but is not limited to: (i)engaging in a business as owner, partner, or agent, (ii)becoming an employee of any third party that is engaged in293


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreementsuch business, (iii) becoming interested directly or indirectly inany such business, or (iv) soliciting any client of “Companyname” for the benefit of a third party that is engaged in suchbusiness. Employee agrees that this non-compete provisionwill not adversely affect Employee's livelihood.9. EMPLOYEE'S INABILITY TO CONTRACT FOR EMPLOYER.Employee shall not have the right to make any contracts orcommitments for or on behalf of “Company name” withoutfirst obtaining the express written consent of MSPU.10. BENEFITS. Employee shall be entitled to employmentbenefits, including holidays, sick leave, <strong>and</strong> vacation asprovided by “Company name” policies in effect from time totime.11. TERM/TERMINATION. Employee's employment under thisAgreement shall be for an unspecified term on an "at will"basis. This Agreement may be terminated by company at will<strong>and</strong> by Employee upon 2 Week's written notice. If Employeeis in violation of any part of this Agreement, company mayterminate employment without notice <strong>and</strong> with compensationto Employee only to the date of such termination. <strong>The</strong>compensation paid under this Agreement shall be Employee'sexclusive remedy. Please refer to the rules governing294


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment Agreementtermination in your own region/country’sregulatory/governmental offices.12. COMPLIANCE WITH EMPLOYER'S RULES. Employee agreesto comply with all of the rules <strong>and</strong> regulations of “Companyname”.13. RETURN OF PROPERTY. Upon termination of thisAgreement, Employee shall deliver to “Company name” allproperty which is “Company name”’s property or related to“Company name”’s business (including keys, records, notes,data, memor<strong>and</strong>a, models, <strong>and</strong> equipment) that is inEmployee's possession or under Employee's control. Suchobligation shall be governed by any separate confidentiality orproprietary rights agreement signed by Employee.14. NOTICES. All notices required or permitted under thisAgreement shall be in writing <strong>and</strong> shall be deemed deliveredwhen delivered in person or on the third day after beingdeposited in the United States mail, postage paid, addressedas follows:Employer:“Company name”Full address295


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment AgreementEmployee:(Employee Name)(Employee Street Address)(Employee City, State ZIP)Such addresses may be changed from time to time by eitherparty by providing written notice in the manner set forthabove.15. ENTIRE AGREEMENT. This Agreement contains the entireagreement of the parties <strong>and</strong> there are no other promises orconditions in any other agreement whether oral or written.This Agreement supersedes any prior written or oralagreements between the parties.16. AMENDMENT. This Agreement may be modified oramended, if the amendment is made in writing <strong>and</strong> is signedby both parties.17. S<strong>EVER</strong>ABILITY. If any provisions of this Agreement shall beheld to be invalid or unenforce<strong>able</strong> for any reason, theremaining provisions shall continue to be valid <strong>and</strong>enforce<strong>able</strong>. If a court finds that any provision of this296


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment AgreementAgreement is invalid or unenforce<strong>able</strong>, but that by limitingsuch provision it would become valid or enforce<strong>able</strong>, thensuch provision shall be deemed to be written, construed, <strong>and</strong>enforced as so limited.18. WAIVER OF CONTRACTUAL RIGHT. <strong>The</strong> failure of eitherparty to enforce any provision of this Agreement shall not beconstrued as a waiver or limitation of that party's right tosubsequently enforce <strong>and</strong> compel strict compliance with everyprovision of this Agreement.19. APPLICABLE LAW. This Agreement shall be governed bythe laws of the State of California.EMPLOYER:“Company name”By: _______________________Date:________________(Authorized “Company name” representative name/title)AGREED TO AND ACCEPTED.297


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Employment AgreementEMPLOYEE:By:_______________________Date: ________________298


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreement<strong>The</strong> Equipment Loan AgreementFrom time to time, <strong>and</strong> based upon the technical staff’s needs,it may become necessary to supply them with companyownedequipment in order to provide them the ability to fulfilltheir duties <strong>and</strong> responsibilities. Examples of equipment thatcan be furnished to employees may include:VehiclesPCsLaptopsWireless PC cardsCell phones/Smart phones/PDAsPagersSecurity tokensKey cards/credentialsTest equipmentInventoryThis equipment obviously has value to the company, so it is agood idea to have a solid equipment loan agreement in placedocumenting it <strong>and</strong> its value, <strong>and</strong> holding the employeeresponsible for keeping it in good condition. <strong>The</strong> equipmentloan agreement also makes it easier to reclaim equipmentwhen an employee leaves the organization, as they agree toforfeit the cost to replace the equipment from their pay299


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreementshould they fail to return it according to the terms of theiremployment agreement. Let’s take a look at a st<strong>and</strong>ardequipment loan agreement:Equipment LoanStatement of Underst<strong>and</strong>ingI am taking possession of the following equipment belonging to“Companyname”:__________________________________________________Description__________________________________________________Model Number, Serial Numberwhich has a replacement cost of $__________________________________________________I will take reason<strong>able</strong> <strong>and</strong> necessary steps to safeguard thisequipment from damage <strong>and</strong> theft.300


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan AgreementIf this equipment is damaged or stolen, I will report the relevantfacts as soon as possible to my supervisor. I further underst<strong>and</strong> thatI have an obligation to pursue recovery for Company from such aloss through my relevant insurance coverage, whether automobile,homeowner’s or tenant’s.I underst<strong>and</strong> that I must return this equipment as instructed toCompany premises within twenty-four hours of being asked to do soby my supervisor or Company administration.I underst<strong>and</strong> that I must immediately return this equipment asinstructed to Company premises in the event that my employmentends, whether by voluntary quit or involuntary termination.I agree <strong>and</strong> hereby give permission to Company to deduct from mypay any amount I owe to Company (up to the replacement costnoted above) due to my failure to return this equipment in workingcondition to Company as documented in my EmploymentAgreement.________________________________________________Employee Signature, printed name <strong>and</strong> date__________________________________________________Date EQUIPMENT RETURNED:__________________________________________________Received By301


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Compensation PlansCompensation PlansThroughout the years we’ve had the opportunity to work withour partners, one of the topics that seem to be the mostchallenging for them is creating an equit<strong>able</strong> compensationplan for technical staff. Now, as IT service providers, ourperception of an equit<strong>able</strong> compensation plan <strong>and</strong> ourtechnical staff’s perception of an equit<strong>able</strong> compensation planmay not always match. A generally accepted industry statisticregarding compensation is that a technician should generatetwo <strong>and</strong> a half times their W-2 compensation in bill<strong>able</strong> labortime. This means that a technical person earning $60,000 ayear on their W-2 should be generating $150,000 in bill<strong>able</strong>labor time per year.Bill<strong>able</strong> time based on W-2 earningsW-2 Earnings Bill<strong>able</strong> Labor$30,000 $75,000$40,000 $100,000$50,000 $125,000$60,000 $150,000$70,000 $175,000$80,000 $200,000$90,000 $225,000$100,000 $250,000302


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan AgreementSalary.com reports the following U.S. national averages fortotal compensation (base salaries, bonuses <strong>and</strong> benefits) forthe following technical positions on their website athttp://swz.salary.com/salarywizard/layoutscripts/swzl_newsearch.asp:Help <strong>Desk</strong> Support Jr.-Sr. (<strong>Service</strong> <strong>Desk</strong> Staff)Benefit Median Amount % Of TotalBase Salary $44,900 $52,608 68.5% - 69.4%Bonuses $906 $1,135 1.4% - 1.5%Social $3,504 $4,111 5.3% - 5.4%Security401k/403b $1,741 $2,042 2.7% - 2.7%Disability $458 $537 0.7% - 0.7%Healthcare $6,103 $6,103 9.3% - 8.0%Pension $2,290 $2,687 3.5% - 3.5%Time Off $5,638 $6,615 8.6% - 8.7%Total $65,540 $75,839 100%Source: salary.comPlease note that the median <strong>Service</strong> <strong>Desk</strong> staff’s bonuses inthe US as reported by salary.com amount to about 1.5% oftheir total take-home compensation. In our experience, this isextremely low, as we would bonus our <strong>Service</strong> <strong>Desk</strong> staffupwards of 10% of their total salary for achieving goals set for:303


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan AgreementUtilization requirementsProcess <strong>and</strong> policy complianceAttainment of competenciesAdherence to SLAsCustomer serviceWe would base customer service scores upon surveyresponses. In addition, bonuses could be attained individually<strong>and</strong> by the entire group on a monthly, quarterly <strong>and</strong> yearlybasis. This was designed so that if an individual resourceachieved their minimum goals in each area for the month,they would be eligible to receive a bonus. If they achieved thebonus each month for the entire quarter, they would beeligible to receive a quarterly bonus as well. If the entire teamachieved their bonuses each month in a quarter, they wouldbe eligible to receive a quarterly team bonus, <strong>and</strong> if they were<strong>able</strong> to achieve a quarterly team bonus through 4 consecutivequarters, they would be eligible to receive a yearly bonus. Allof these bonuses would be in addition to previously-receivedbonuses, so the individual <strong>Service</strong> <strong>Desk</strong> staff could potentiallybe eligible to receive the following bonuses:Monthly individual bonusQuarterly individual bonusQuarterly team bonusYearly team bonus304


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreement<strong>Service</strong> Dispatcher Jr.-Sr.Benefit Median Amount % Of TotalBase Salary $34,910 $42,063 67.1% - 68.2%Bonuses $475 $764 0.9% - 1.2%Social $2,707 $3,276 5.2% - 5.3%Security401k/403b $1,345 $1,627 2.6% - 2.6%Disability $354 $428 0.7% - 0.7%Healthcare $6,103 $6,103 11.7% - 9.9%Pension $1,769 $2,141 3.4% - 3.5%Time Off $4,355 $5,271 8.4% - 8.5%Total $52,017 $61,674 100%Source: salary.comNote that the median service dispatcher’s bonuses in the USas reported by salary.com amount to about 1.2% of their totaltake-home compensation. This is low in our experience, as webonused our dispatcher a small amount based upon meetingSLAs, along with allowing participation in team bonuses, buttheir bonus did not quite rival the <strong>Service</strong> <strong>Desk</strong> staff’s.305


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreement<strong>Service</strong> <strong>Desk</strong> ManagerBenefit Median Amount % Of TotalBase Salary $84,146 67.7%Bonuses $6,923 5.6%Social Security $6,967 5.6%401k/403b $3,461 2.8%Disability $911 0.7%Healthcare $6,103 4.9%Pension $4,553 3.7%Time Off $11,208 9.0%Total $124,272 100%Source: salary.comNote that the median <strong>Service</strong> <strong>Desk</strong> manager’s bonuses in theUS as reported by salary.com average 5.6% of their total takehomecompensation. This matches our experience.306


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreement<strong>NOC</strong> ManagerBenefit Median Amount % Of TotalBase Salary $95,508 70.5%Bonuses $4,250 3.1%Social Security $7,708 5.6%401k/403b $3,849 2.8%Disability $1,008 0.7%Healthcare $6,103 4.5%Pension $5,038 3.7%Time Off $12,401 9.1%Total $136,844 100%Source: salary.comNote that the median <strong>NOC</strong> manager’s bonuses in the US asreported by salary.com average about 3.1% of their total takehomecompensation. This matches our experience.A compensation plan for a new technical person will normallybe structured as base salary plus bonuses. A base salary is aguaranteed amount of compensation the technical person willreceive each month, <strong>and</strong> if they meet specific goals set bytheir supervisor during the month, quarter <strong>and</strong> year,additional bonuses can be realized.307


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan AgreementIn a base plus bonus compensation plan, we generally seesmall bonus percentages structured in to support theguaranteed base salary, <strong>and</strong> engineered in such a manner asto reward the technical staff on activity that helps theorganization increase efficiencies <strong>and</strong> client satisfaction,among other factors – all of which in one form or anotherdrive additional profits to the bottom line. This is where thebonuses are paid out from – the additional revenues that thetechnical staff helps to generate.Now I hope I’ve done a decent job of presenting differentways of looking at technical compensation <strong>and</strong> bonus plans foryou. Please do not take any of the figures in this chapter asgospel – but rather visit salary.com to drill deep <strong>and</strong> utilizetheir filtering capabilities <strong>and</strong> input your zip code, state ormetro area to discover what the median compensation isbeing reported for the technical roles required for your servicedelivery model <strong>and</strong> mode. I’ve used information gatheredfrom partners, <strong>and</strong> the rest from our own experience to helpyou get started.Let me caution you against thinking that by reading thischapter you will be <strong>able</strong> to save yourself some homework <strong>and</strong>come away with a ready-made compensation plan that you308


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!<strong>The</strong> Equipment Loan Agreementcan simply slap your company’s name on, implement <strong>and</strong> besuccessful with.You’ve got to do your own legwork <strong>and</strong> investigation intowhat your true margins <strong>and</strong> profitability are for each of yourservices, products <strong>and</strong> solutions. From there, you’ve got to digdown deep into your gut <strong>and</strong> come up with a realisticexpectation of how much increased profitability each of yourtechnical resources can achieve, <strong>and</strong> of this number, what youare comfort<strong>able</strong> with incenting your staff to qualify for.309


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical StaffTraining Technical Staff<strong>The</strong> function of training technical staff in an IT servicesorganization, <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> is obviously much differentthan training staff in other businesses or business units. Inaddition to training technical staff in <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>overall day-to-day operations <strong>and</strong> functions, there need to beopportunities for technical staff to receive the role-specifictraining required to make them effective, efficient <strong>and</strong>successful, in order to receive the maximum return on theirhiring investment.Let’s identify the common training that will be delivered to allstaff, regardless of their job description, before going intorole-specific technical training topics:Company Overview Trainingo Vision, mission, values, philosophy, goalsHR Process Trainingo Overview of compensation, benefits, conduct,sick day <strong>and</strong> vacation policy, Employeeh<strong>and</strong>book, accept<strong>able</strong> use policyAdministrative Setup <strong>and</strong> Trainingo User <strong>and</strong> email account creation, telco account,extension <strong>and</strong> voicemail creation,o Use of company equipment (cell phone, PC,laptop, etc.)310


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Use of company software, Instant Messaging,remote access <strong>and</strong> remote emailFormal introduction to management <strong>and</strong> staffo Tour of facilityo Introduction to all management <strong>and</strong> staff<strong>The</strong> above points cover in broad strokes some of the tasksassociated with any new employee’s basic training <strong>and</strong>indoctrination to an organization – of course, the outsourcedservice provider’s or internal service manager’s policies <strong>and</strong>procedures may differ from those illustrated.So what role-specific training is needed to deliver to insure atechnical person’s success? Let’s highlight some of the obviousareas for their managers to address:Internal tools <strong>and</strong> technology trainingo Make certain all technical staff is trained oninternal tools• PSA solution• RMM solution• Remote control solution• Quoting solution• Technical drawing solution• Project planning/management solution• Specialty solutions311


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staff• All othersProcesses <strong>and</strong> procedureso Make certain all technical staff is trained on allprocesses <strong>and</strong> procedures• Employee h<strong>and</strong>book• Incident management, escalation <strong>and</strong>resolution• Remote monitoring <strong>and</strong> management• Remote control• Patching <strong>and</strong> updating• Documentation• Customer service• Reporting• All othersProduct <strong>and</strong> <strong>Service</strong> Trainingo Make certain all technical staff is trained on allof products <strong>and</strong> services deliveredRoles <strong>and</strong> responsibilitieso Make certain all technical staff is trained ontheir own, as well as other team members’roles, responsibilities <strong>and</strong> expectationsClients312


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Make certain all technical staff is trained on theorganization’s clients <strong>and</strong> their individualneeds, requirements <strong>and</strong> SLAsFulfillment partnerso Make certain all technical staff is trained on theorganization’s fulfillment partners, theirservices <strong>and</strong> their engagement processVendorso Make certain all technical staff is trained on theorganization’s vendors, their services <strong>and</strong> theirengagement processGoals <strong>and</strong> bonuseso Make certain all technical staff is trained ontheir individual <strong>and</strong> team goals <strong>and</strong> bonusprogramsCompetency <strong>and</strong> certification achievemento Make certain all technical staff is trained on theorganization’s requirements for theirattainment of additional competencies <strong>and</strong>certificationsRole-Specific Training<strong>NOC</strong> staffIn this context, the <strong>NOC</strong> staff participates in the outsourcedservice provider’s or internal service manager’s incident313


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffmanagement <strong>and</strong> resolution process, <strong>and</strong> can be assigned todeliver proactive remote patching, updating <strong>and</strong> monitoringservices for devices, operating systems, applications software<strong>and</strong> services in client environments. Whereas the <strong>Service</strong> <strong>Desk</strong>staff works primarily with end user issues, the <strong>NOC</strong> staff’smain focus is on managing <strong>and</strong> delivering scheduledmaintenance activities to critical devices <strong>and</strong> responding toalerts generated by the provider’s Remote Monitoring <strong>and</strong>Management solution.<strong>The</strong> <strong>NOC</strong> staff identifies, prioritizes <strong>and</strong> documents all serviceactivity <strong>and</strong> will execute the outsourced service provider’s orinternal service manager’s incident management <strong>and</strong>resolution processes as well as utilize the provider’s chosensoftware <strong>and</strong> hardware management <strong>and</strong> remediation tools,processes <strong>and</strong> procedures during remote service delivery.In addition to the general training requirements for alltechnical staff previously mentioned, at a minimum, all <strong>NOC</strong>staff will need specific training in these areas:Problem management <strong>and</strong> resolutiono Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Management314


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Release Managemento <strong>Service</strong> Level Managemento Availability Managemento Capacity Managemento <strong>Service</strong> Continuity Managemento Security Managemento Communication ManagementRemote Monitoring <strong>and</strong> Managemento Installing agentso Configuring thresholdso Configuring alertso Developing scriptso Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> level managemento Availability Managemento Capacity Managemento <strong>Service</strong> Continuity Managemento Security Managemento Communications ManagementDay to day service deliveryo Receiving all incident notifications <strong>and</strong> servicerequestso Recording all incidents <strong>and</strong> service requestso Classifying all incidents <strong>and</strong> service requests315


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Prioritizing all incidents <strong>and</strong> service requestso Troubleshooting all incidents <strong>and</strong> servicerequestso Escalating all incidents <strong>and</strong> service requests asnecessary to maintain SLAo Maintaining consistent communication with allparties affected by the incident or servicerequesto Performing all scheduled maintenance activitieso Reporting on all activitiesCustomer serviceo Customer managemento Setting <strong>and</strong> adjusting expectationso Phone etiquetteo Utilizing the “hold” or “mute” buttoneffectivelyo Follow-up <strong>and</strong> follow-through<strong>Service</strong> <strong>Desk</strong> staffIn this context, the <strong>Service</strong> <strong>Desk</strong> staff participates in theoutsourced service provider’s or internal service manager’sincident management <strong>and</strong> resolution process, <strong>and</strong> can beassigned to deliver remote technical support services to endusers. <strong>The</strong> <strong>Service</strong> <strong>Desk</strong> staff identifies, prioritizes <strong>and</strong>documents all service requests, <strong>and</strong> initiates incidentmanagement <strong>and</strong> resolution activity.316


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staff<strong>Service</strong> desk staff will execute the outsourced serviceprovider’s or internal service manager’s incident management<strong>and</strong> resolution processes as well as utilize the provider’schosen software <strong>and</strong> hardware management <strong>and</strong> remediationtools, processes <strong>and</strong> procedures during remote technicalservice delivery.In addition to the general training requirements for alltechnical staff previously mentioned, at a minimum, all <strong>Service</strong><strong>Desk</strong> staff will need specific training in these areas:Problem management <strong>and</strong> resolutiono Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> Level Managemento Availability Managemento Capacity Managemento IT <strong>Service</strong> Continuity Managemento Security Managemento Communication ManagementDay to day service deliveryo Receiving all incident notifications <strong>and</strong> servicerequestso Recording all incidents <strong>and</strong> service requests317


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Classifying all incidents <strong>and</strong> service requestso Prioritizing all incidents <strong>and</strong> service requestso Troubleshooting all incidents <strong>and</strong> servicerequestso Escalating all incidents <strong>and</strong> service requests asnecessary to maintain SLAo Maintaining consistent communication with allparties affected by the incident or servicerequesto Performing all scheduled maintenance activitieso Reporting on all activitiesCustomer serviceo Customer managemento Setting <strong>and</strong> adjusting expectationso Phone etiquetteo Utilizing the “hold” or “mute” buttoneffectivelyo Follow-up <strong>and</strong> follow-through<strong>Service</strong> DispatchersIn this context, the service dispatcher participates in theoutsourced service provider’s or internal service manager’sincident management <strong>and</strong> resolution process, <strong>and</strong> assignsresources to <strong>and</strong> schedules all services. <strong>The</strong> service dispatchermay also be included in the provider’s escalation process <strong>and</strong>be alerted by their PSA solution should service requestsbecome in danger of falling out of SLA.318


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staff<strong>Service</strong> dispatchers will utilize the provider’s chosen softwaremanagement tools, processes <strong>and</strong> procedures to managedispatch functions during technical service delivery.In addition to the general training requirements for alltechnical staff previously mentioned, at a minimum, all servicedispatchers will need specific training in these areas:Problem management <strong>and</strong> resolutiono Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> Level Managemento Availability Managemento Capacity Managemento IT <strong>Service</strong> Continuity Managemento Security Managemento Communication ManagementDay to day service deliveryo Managing all incident notifications <strong>and</strong> servicerequestso Monitoring all incidents <strong>and</strong> service requestsfor proper escalation as necessary to maintainSLA319


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Managing consistent communication with allparties affected by the incident or servicerequesto Scheduling all maintenance activitieso Reporting on all activitiesCustomer serviceo Customer managemento Setting <strong>and</strong> adjusting expectationso Phone etiquetteo Utilizing the “hold” or “mute” buttoneffectivelyo Follow-up <strong>and</strong> follow-through<strong>NOC</strong> ManagersIn this context, the <strong>NOC</strong> manager is ultimately responsible formaintaining the outsourced service provider’s or internalservice manager’s <strong>NOC</strong> staffing levels, training <strong>and</strong>certification requirements, incident management <strong>and</strong>resolution processes <strong>and</strong> client satisfaction by strict SLAmanagement, among other responsibilities. <strong>NOC</strong> managerswill utilize the provider’s chosen software management tools,processes <strong>and</strong> procedures to manage service delivery.In addition to the general training requirements for alltechnical staff previously mentioned, at a minimum, all <strong>Service</strong><strong>Desk</strong> managers will need specific training in these areas:Problem management <strong>and</strong> resolution320


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> Level Managemento Availability Managemento Capacity Managemento <strong>Service</strong> Continuity Managemento Security Managemento Communication ManagementRemote Monitoring <strong>and</strong> Managemento Installing agentso Configuring thresholdso Configuring alertso Developing scriptso Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> level managemento Availability Managemento Capacity Managemento <strong>Service</strong> Continuity Managemento Security Managemento Communications Management321


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical StaffDay to day service deliveryo Receiving all incident notifications <strong>and</strong> servicerequestso Recording all incidents <strong>and</strong> service requestso Classifying all incidents <strong>and</strong> service requestso Prioritizing all incidents <strong>and</strong> service requestso Troubleshooting all incidents <strong>and</strong> servicerequestso Escalating all incidents <strong>and</strong> service requests asnecessary to maintain SLAo Maintaining consistent communication with allparties affected by the incident or servicerequesto Performing all scheduled maintenance activitieso Reporting on all activitiesCustomer serviceo Customer managemento Setting <strong>and</strong> adjusting expectationso Phone etiquetteo Utilizing the “hold” or “mute” buttoneffectivelyo Follow-up <strong>and</strong> follow-through<strong>Service</strong> <strong>Desk</strong> ManagersIn this context, the <strong>Service</strong> <strong>Desk</strong> manager is ultimatelyresponsible for maintaining the outsourced service provider’sor internal service manager’s <strong>Service</strong> <strong>Desk</strong> staffing levels,training <strong>and</strong> certification requirements, incident management322


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staff<strong>and</strong> resolution processes <strong>and</strong> client satisfaction by strict SLAmanagement, among other responsibilities. <strong>Service</strong> <strong>Desk</strong>managers will utilize the provider’s chosen softwaremanagement tools, processes <strong>and</strong> procedures to manageservice delivery.In addition to the general training requirements for alltechnical staff previously mentioned, at a minimum, all <strong>Service</strong><strong>Desk</strong> managers will need specific training in these areas:Problem management <strong>and</strong> resolutiono Incident Managemento Problem Managemento Configuration Managemento Change Managemento Risk Managemento Release Managemento <strong>Service</strong> Level Managemento Availability Managemento Capacity Managemento IT <strong>Service</strong> Continuity Managemento Security Managemento Communication ManagementDay to day service deliveryo Responsible for managing all technical staffo Responsible for managing all service deliveryo Responsible for managing all clientexpectations323


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Training Technical Staffo Responsible for reporting on all activitiesCustomer serviceo Staff managemento Customer managemento Setting <strong>and</strong> adjusting expectationso Follow-up <strong>and</strong> follow-through324


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Management by the NumbersSection 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>Management by the NumbersIn order to reduce costs, improve performance <strong>and</strong>efficiencies <strong>and</strong> drive more profit to the bottom line, best inclass service providers utilize a means to regularly measurethe performance of the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>. Thismeasurement must focus on capturing meaningful data <strong>and</strong>displaying it in a simple to underst<strong>and</strong> manner. This data willbecome the Key Performance Indicators by whichperformance will be measured, goals set against <strong>and</strong> bonuses<strong>and</strong> commissions designed <strong>and</strong> implemented to help realize.After determining the meaningful data to collect, performancereports can be created to report on this data. <strong>The</strong>seperformance reports will be produced <strong>and</strong> reviewed on aregular basis by the outsourced service provider or internalservice manager <strong>and</strong> their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> managers.<strong>The</strong> first time this KPI data is reported, it must be analyzed todetermine a baseline – what is the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>’sperformance today? Through this analysis, a trueunderst<strong>and</strong>ing of performance can be realized, which maydirectly contradict perceived performance up to this point.<strong>The</strong>re are several areas the outsourced service provider orinternal service manager <strong>and</strong> their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>managers should focus on, but at a minimum should include:325


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Management by the NumbersFinancial performance<strong>NOC</strong> performance<strong>Service</strong> <strong>Desk</strong> performance326


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring Financial PerformanceMeasuring financial performance will provide the followinginformation to the outsourced service provider or internalservice manager:Revenue by product or service soldCost of goods sold by product or serviceGross margin by product or service soldOperating expensesPre-tax net incomeMany service providers tend to aggregate all services such asbreak-fix, time <strong>and</strong> materials, projects, managed services(including <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>), hosting <strong>and</strong> licenserenewals <strong>and</strong> others into one line item in their accountingsystem’s chart of accounts: service revenue. Setting up thechart of accounts in this manner hampers the ability tounderst<strong>and</strong> how well or poorly any individual product orservice is financially performing.Paul Dippell from <strong>Service</strong> Leadership Inc. (www.serviceleadership.com);an advisory firm that specializes in growth,performance <strong>and</strong> M&A strategies for the IT industry,characterizes this scenario as one of having a relay team offour runners. In this example, each runner represents onedeliver<strong>able</strong> such as break-fix services, project services,managed services, <strong>and</strong> other services.327


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Management by the NumbersWhile the relay team finishes the race with a total time of twominutes <strong>and</strong> thirty seconds, because the individual split timefor each runner is not being measured, it is impossible todetermine how fast or slow each runner ran their portion ofthe race. This prevents the coach from knowing how toimprove each individual runner’s performance.<strong>The</strong> same holds true with outsourced service providers orinternal service managers that cannot determine theperformance of their individual services in terms of cost,revenue <strong>and</strong> net profit. <strong>The</strong> first step in gaining visibility intothese areas is to separate the individual revenue streams,their costs <strong>and</strong> gross margins. Only after this has been donecan more meaningful analysis begin.When evaluating financial performance, special attentionshould be paid to the differential between the cost of goodssold (COGS) <strong>and</strong> gross margin (GM) for each product or servicesold or delivered; along with their individual contribution togross revenue, to determine performance <strong>and</strong> profitability. Inaddition, a careful review of sales, general & administrativeexpenses (SG&A), will help identify opportunities to reducecosts in these areas.Once the outsourced service provider’s or internal servicemanager’s financial chart of accounts has been normalized inthis fashion, they can develop strategies to continually328


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 7: <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Management by the Numbersimprove net profits, utilizing regular financial reporting <strong>and</strong>benchmarking to attain this goal by running their organizationby the numbers.329


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>NOC</strong> PerformanceMeasuring <strong>NOC</strong> PerformanceMeasuring <strong>NOC</strong> performance will provide the outsourcedservice provider or internal service manager <strong>and</strong> their <strong>NOC</strong>manager <strong>and</strong> staff a clear indicator of performance.Measuring this performance will establish a baseline forimprovement, allowing goals for improvement to be set, <strong>and</strong>bonuses <strong>and</strong> commissions developed to help incent thisimprovement.Key <strong>NOC</strong> performance indicators that the outsourced serviceprovider or internal service manager will measure mayinclude:Total ticket load per day/week/month/quarter/yearTotal ticket load per queue perday/week/month/quarter/yearTotal ticket load per client/location/contract perday/week/month/quarter/yearTotal ticket load per resource perday/week/month/quarter/yearAverage time to resolution perday/week/month/quarter/yearAverage time to resolution per queue perday/week/month/quarter/year330


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>NOC</strong> PerformanceAverage time to resolution per resource perday/week/month/quarter/yearAverage time to resolution per client/location/contractper day/week/month/quarter/yearAverage time to response perday/week/month/quarter/yearAverage time to response per queue perday/week/month/quarter/yearAverage time to response per resource perday/week/month/quarter/yearAverage time to response per client/location/contractper day/week/month/quarter/yearTotal tickets closed per day/week/month/quarter/yearTotal tickets closed per queue perday/week/month/quarter/yearTotal tickets closed per resource perday/week/month/quarter/yearTotal tickets closed per client/location/contract perday/week/month/quarter/yearTotal “Repeat” tickets perday/week/month/quarter/yearTotal “Repeat” tickets per queue perday/week/month/quarter/yearTotal “Repeat” tickets per resource perday/week/month/quarter/year331


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>NOC</strong> PerformanceTotal “Repeat” tickets per client/location/contract perday/week/month/quarter/yearAdherence to SLA % perday/week/month/quarter/yearAdherence to SLA % per queue perday/week/month/quarter/yearAdherence to SLA % per resource perday/week/month/quarter/yearAdherence to SLA % per client/location/contract perday/week/month/quarter/yearTop Clients with the most open tickets perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery per queue perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery perclient/location/contract perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery resource perday/week/month/quarter/yearUtilization per day/week/month/quarter/yearUtilization per queue perday/week/month/quarter/year332


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>NOC</strong> PerformanceUtilization per client/location/contract perday/week/month/quarter/yearUtilization per resource perday/week/month/quarter/yearRealization per day/week/month/quarter/yearRealization per queue perday/week/month/quarter/yearRealization per client/location/contract perday/week/month/quarter/yearRealization per resource perday/week/month/quarter/yearProfitability per day/week/month/quarter/yearProfitability per queue day/week/month/quarter/yearProfitability per client/location/contract perday/week/month/quarter/yearProfitability per resource perday/week/month/quarter/yearClient satisfaction per day/week/month/quarter/yearEnd user satisfaction perday/week/month/quarter/yearResource satisfaction perday/week/month/quarter/year333


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> PerformanceMeasuring <strong>Service</strong> <strong>Desk</strong> PerformanceMeasuring <strong>Service</strong> <strong>Desk</strong> performance will provide theoutsourced service provider or internal service manager <strong>and</strong>their <strong>Service</strong> <strong>Desk</strong> manager <strong>and</strong> staff a clear indicator ofperformance. Measuring this performance will establish abaseline for improvement, allowing goals for improvement tobe set, <strong>and</strong> bonuses <strong>and</strong> commissions developed to helpincent this improvement.While similar to key <strong>NOC</strong> performance indicators, withadditional metrics included for verbal interaction with clients<strong>and</strong> end users, key <strong>Service</strong> <strong>Desk</strong> performance indicators thatthe outsourced service provider or internal service managerwill measure may include:Average speed of call answer perday/week/month/quarter/yearAverage speed of call answer per queue perday/week/month/quarter/yearAverage speed of call answer per resource perday/week/month/quarter/yearAverage speed of call answer perclient/location/contract perday/week/month/quarter/year334


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> PerformanceAverage call wait time perday/week/month/quarter/yearAverage call wait time per queue perday/week/month/quarter/yearAverage call wait time per resource perday/week/month/quarter/yearAverage call wait time per client/location/contract perday/week/month/quarter/yearAverage first call resolution perday/week/month/quarter/yearAverage first call resolution per queue perday/week/month/quarter/yearAverage first call resolution per resource perday/week/month/quarter/yearAverage first call resolution perclient/location/contract perday/week/month/quarter/yearTotal ticket load per day/week/month/quarter/yearTotal ticket load per queue perday/week/month/quarter/yearTotal ticket load per client/location/contract perday/week/month/quarter/yearTotal ticket load per resource perday/week/month/quarter/year335


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> PerformanceAverage time to resolution perday/week/month/quarter/yearAverage time to resolution per queue perday/week/month/quarter/yearAverage time to resolution per resource perday/week/month/quarter/yearAverage time to resolution per client/location/contractper day/week/month/quarter/yearAverage time to response perday/week/month/quarter/yearAverage time to response per queue perday/week/month/quarter/yearAverage time to response per resource perday/week/month/quarter/yearAverage time to response per client/location/contractper day/week/month/quarter/yearTotal tickets closed per day/week/month/quarter/yearTotal tickets closed per queue perday/week/month/quarter/yearTotal tickets closed per resource perday/week/month/quarter/yearTotal tickets closed per client/location/contract perday/week/month/quarter/yearTotal “Repeat” tickets perday/week/month/quarter/year336


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> PerformanceTotal “Repeat” tickets per queue perday/week/month/quarter/yearTotal “Repeat” tickets per resource perday/week/month/quarter/yearTotal “Repeat” tickets per client/location/contract perday/week/month/quarter/yearAdherence to SLA % perday/week/month/quarter/yearAdherence to SLA % per queue perday/week/month/quarter/yearAdherence to SLA % per resource perday/week/month/quarter/yearAdherence to SLA % per client/location/contract perday/week/month/quarter/yearTop Clients with the most open tickets perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery per queue perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery perclient/location/contract perday/week/month/quarter/yearTotal Cost of <strong>Service</strong> Delivery resource perday/week/month/quarter/year337


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> PerformanceUtilization per day/week/month/quarter/yearUtilization per queue perday/week/month/quarter/yearUtilization per client/location/contract perday/week/month/quarter/yearUtilization per resource perday/week/month/quarter/yearRealization per day/week/month/quarter/yearRealization per queue perday/week/month/quarter/yearRealization per client/location/contract perday/week/month/quarter/yearRealization per resource perday/week/month/quarter/yearProfitability per day/week/month/quarter/yearProfitability per queue day/week/month/quarter/yearProfitability per client/location/contract perday/week/month/quarter/yearProfitability per resource perday/week/month/quarter/yearClient satisfaction per day/week/month/quarter/yearEnd user satisfaction perday/week/month/quarter/yearResource satisfaction perday/week/month/quarter/year338


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Measuring <strong>Service</strong> <strong>Desk</strong> Performance<strong>The</strong> outsourced service provider’s or internal servicemanager’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> managers should be <strong>able</strong> topull the data required to report on these metrics from theirProfessional <strong>Service</strong>s Automation solution when integratedwith their Remote Monitoring <strong>and</strong> Management tool, theirCommunications solution <strong>and</strong> the results of customersatisfaction surveys, in order to identify, evaluate <strong>and</strong> improveupon these service delivery KPIs.339


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> ComponentsSection 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> ComponentsWith the advent of afford<strong>able</strong>, 3 rd -party back office <strong>NOC</strong> <strong>and</strong><strong>Service</strong> <strong>Desk</strong> organizations, the outsourced service provider orinternal service manager has the opportunity to scale theirservices to a much broader range of clients, <strong>and</strong> prolong thenecessity to hire, train <strong>and</strong> manage internal full-time staff.This allows a consistent support experience for clients <strong>and</strong> endusers <strong>and</strong> in many cases increases the provider’s profitabilitydue to the low cost of these services. In addition, theseorganizations can private-label their services, <strong>and</strong> representthe outsourced service provider’s or internal servicemanager’s organization throughout all communications <strong>and</strong>incident management <strong>and</strong> resolution activities.Benefits of OutsourcingBenefits to engaging with a 3 rd -party <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong>provider may include:<strong>The</strong> ability to scale services broadly <strong>and</strong> quicklyImprove performance metricsUtilize highly-skilled <strong>and</strong> costly internal resources formore profit<strong>able</strong> tasks <strong>and</strong> activities340


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> ComponentsIncrease customer satisfaction through improved,consistent KPIsIncrease net profits by lowering costsConsiderations Prior to OutsourcingWhen exploring outsourcing components of the <strong>NOC</strong> or<strong>Service</strong> <strong>Desk</strong> to a 3 rd -party provider, among other concerns,the outsourced service provider or internal services managermay consider:<strong>The</strong> 3 rd -party provider’s location<strong>The</strong> 3 rd -party provider’s qualifications <strong>and</strong> experience<strong>The</strong> 3 rd -party provider’s business structure <strong>and</strong> time inbusiness<strong>The</strong> 3 rd -party provider’s solvency<strong>The</strong> 3 rd -party provider’s tools <strong>and</strong> technology <strong>and</strong>ability to integrate with the provider’s existingsolutions<strong>The</strong> 3 rd -party provider’s <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> delivery<strong>and</strong> management processes<strong>The</strong> 3 rd -party provider’s training <strong>and</strong> support offerings<strong>The</strong> 3 rd -party provider’s customer service philosophy<strong>The</strong> 3 rd -party provider’s privacy policy<strong>The</strong> 3 rd -party provider’s culture <strong>and</strong> native language<strong>The</strong> 3 rd -party provider’s SLA <strong>and</strong> KPIs341


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Components<strong>The</strong> 3 rd -party provider’s customer satisfaction rating<strong>The</strong> 3 rd -party provider’s pricing <strong>and</strong> payment model<strong>The</strong> 3 rd -party provider’s ability to private label theirservices <strong>and</strong> represent themselves as the provider<strong>The</strong> 3 rd -party provider’s perception in the industryIn addition, the outsourced service provider or internal servicemanager may request an NDA from the 3 rd -party providerprior to negotiating at a deep level where internal <strong>and</strong> clientspecificinformation may be shared.What to OutsourceIndustry statistics reflect that best in class <strong>Service</strong> <strong>Desk</strong>s close90% of service requests with Tier 1 resolution in less than anhour. That means that only 10% of all service requests areescalated to Tier 2 <strong>and</strong> beyond. Let’s assume that 7% of allservice requests are escalated to Tier 2, with the remaining 3%ending up in Tier 3.This means that if the outsourced service provider or internalservice manager outsourced their Tier 1 <strong>and</strong> Tier 2 servicerequests to a 3 rd -party <strong>Service</strong> <strong>Desk</strong>, they may potentiallyreduce their incoming ticket load by up to 97%.Imagine the potential impact that this has on the ability torepurpose or eliminate internal staff as a result. If highlyskilled,costly internal staff can be reassigned to focus on342


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Componentshigher-value, higher-visibility <strong>and</strong> more profit<strong>able</strong> services,this is a beneficial outcome. And if some costly internal staffcan be released, this can also improve net profits.Outsourcing <strong>NOC</strong> services to a 3 rd -party organization can havesimilar positive outcomes for the outsourced service provideror internal service manager, <strong>and</strong> when both <strong>Service</strong> <strong>Desk</strong> <strong>and</strong><strong>NOC</strong> services are outsourced to the same 3 rd -party provider,this reduces complexity <strong>and</strong> costs over time, as all <strong>NOC</strong> <strong>and</strong>Tier 1 <strong>and</strong> Tier 2 service delivery activity is conducted by a soleprovider. This eases integration, escalation, reporting,communication between, <strong>and</strong> overall management of therelationship <strong>and</strong> service outcomes.<strong>The</strong> outsourced service provider or internal service managermay outsource:Tier 1 <strong>and</strong> 2 <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> functionsWhat to KeepWhen outsourcing components of the <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong><strong>and</strong> transferring the role of the single point of contact to a 3 rd -party provider, the outsourced service provider or internalservice manager would be well advised to monitor <strong>and</strong>manage the Professional <strong>Service</strong>s Automation solution toinsure all service requests are prioritized, assigned <strong>and</strong>escalated by the 3 rd -party provider in adherence with SLAs.343


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Components<strong>The</strong> outsourced service provider or internal service managershould also keep all Tier 3 service requests; as these arenormally the most visible, high-value incidents from a clientperspective, allowing the appropriate sensitivity <strong>and</strong> attentionto be directed to these incidents as quickly as possible by theoutsourced service provider or internal service manager. Inthis scenario, all Tier 3 escalations will be assigned to theoutsourced service provider’s or internal service manager’sstaff by the 3 rd -party provider.<strong>The</strong> outsourced service provider or internal service managerwill also want to retain management of all vendors supportingtheir clients or end users <strong>and</strong> their activity. This again is ahighly-visible, high-value activity that requires sensitivity <strong>and</strong>direct attention.<strong>The</strong> outsourced service provider or internal service managermay keep:Monitoring <strong>and</strong> management of the serviceboard/dispatch portalTier 3 escalationsVendor managementIntegration<strong>The</strong> more tightly integrated the 3 rd -party <strong>NOC</strong> <strong>and</strong> <strong>Service</strong><strong>Desk</strong> provider’s systems <strong>and</strong> solutions are with the outsourced344


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Componentsservice provider’s or internal service manager’s, the moreefficient <strong>and</strong> effective service delivery, visibility <strong>and</strong> reportingwill be. Since reporting is so important in terms of KPImanagement <strong>and</strong> utilized to reflect service value to endclients by the outsourced service provider or internal servicemanager, the tighter the integration between these systems,the easier it will be to aggregate the necessary performancedata to generate these critical reports.Transitioning ClientsIt will be simpler to on-board new clients or end users to the3 rd -party <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> provider as the single point ofcontact than it will existing clients <strong>and</strong> end users. <strong>The</strong> reasonfor this is simple – new clients’ <strong>and</strong> end users’ expectationscan be set appropriately during pre-sales, on-boarding <strong>and</strong>service turn-up, or go-live to underst<strong>and</strong> <strong>and</strong> accept theintegrated service delivery process. Existing clients <strong>and</strong> endusers; however, are a different story, as they are being askedto accept a change to an unknown experience, <strong>and</strong> arecomfort<strong>able</strong> with the existing outsourced service provider’s orinternal service manager’s processes, staff <strong>and</strong> deliver<strong>able</strong>s.When transitioning existing end users or clients to a 3 rd -partyprovider, it is imperative for the outsourced service provideror internal service manager to reflect a better experience forthem to the decision maker. Some points to impress to the345


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Componentsclient or end user by the outsourced service provider orinternal service manager may include:<strong>The</strong> relationship, management <strong>and</strong> monitoring of allservice delivery processes <strong>and</strong> KPIs will be retained bythe outsourced service provider or internal servicemanagerTier 3 escalations will be retained by the outsourcedservice provider or internal service managerVendor management responsibilities will be retainedby the outsourced service provider or internal servicemanagerA more consistent service delivery experience will bedelivered to the end users or clientSpeedier call response will be delivered to the endusers or clientIncreased first call closure will be delivered to the endusers or clientIncreased customer satisfaction will be delivered to theend users or client<strong>The</strong> outsourced service provider or internal servicemanager will be free to focus on more high-valueservices for end users or clients that help them achievetheir business goals346


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> ComponentsA final consideration for the outsourced service provider orinternal service manager to keep in mind when engaging witha 3 rd -party provider is that their <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>Managers’ roles will shift from managing internal resources tomanaging external ones, along with the relationship with the3 rd -party provider. This added responsibility will addsubstantially to the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> Managers’ duties, asit is always challenging to manage an outsourced,geographically displaced group of people. In order to achievesuccess in this endeavor, the <strong>NOC</strong> or <strong>Service</strong> <strong>Desk</strong> Managermust over-communicate with the 3 rd -party provider <strong>and</strong> theirstaff, <strong>and</strong> continuously monitor their PSA solution’s serviceboard or management portal to insure the 3 rd -party provider’sstaff is delivering services competently <strong>and</strong> adhering to SLAs.A heavy emphasis on customer satisfaction activity isrecommended when using a 3 rd -party <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong>provider, including conducting face-to-face <strong>and</strong> anonymouselectronic surveying, as well as outsourced 3 rd -party telephonesurvey activities.347


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Section 8: Outsourcing <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> Components348


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Certified Network ChecklistSection 9: Forms, Tools <strong>and</strong> CollateralCertified Network ChecklistServers All Servers with Microsoft Operating Systems runningWindows Server 2008 or later All Servers with Microsoft Operating Systems have all ofthe latest Microsoft <strong>Service</strong> Packs <strong>and</strong> Critical Updatesinstalled. All Server Software must be Genuine, Licensed <strong>and</strong> Vendor-Supported <strong>The</strong> environment must have a currently licensed, up-todate<strong>and</strong> Vendor-Supported Server-based AntivirusSolution protecting all Servers, <strong>Desk</strong>tops,Notebooks/Laptops, <strong>and</strong> Email.<strong>Desk</strong>top PC’s <strong>and</strong> Notebooks/Laptops All <strong>Desk</strong>top PC’s <strong>and</strong> Notebooks/Laptops with MicrosoftOperating Systems running Windows 7 or later.349


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Certified Network Checklist All <strong>Desk</strong>top PC’s <strong>and</strong> Notebooks/Laptops with MicrosoftOperating Systems have all of the latest Microsoft <strong>Service</strong>Packs <strong>and</strong> Critical Updates installed. All Non-Microsoft PC’s <strong>and</strong> Notebooks/Laptops must meetsimilar OS-Specific requirements All <strong>Desk</strong>top PC <strong>and</strong> Notebook/Laptop Software must beGenuine, Licensed <strong>and</strong> Vendor-SupportedEnvironment <strong>The</strong> environment must have a currently licensed, up-to-date<strong>and</strong> Vendor-Supported Anti-Spam Solution. <strong>The</strong> environment must have a currently licensed, up-to-date<strong>and</strong> Vendor-Supported Anti-Spyware Solution. <strong>The</strong> environment must have a currently licensed, Vendor-Supported Server or Network-based Backup Solution. <strong>The</strong> environment must have a currently licensed, Vendor-Supported Firewall between the Internal Network <strong>and</strong> theInternet. All Wireless data traffic in the environment must be securelyencrypted. <strong>The</strong> environment must have a T1 or other form of High-SpeedInternet Access with Static IP’s. <strong>The</strong> environment must contain Spare PC(s) per locationComments:350


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Certified Network Checklist_____________________________________________________________________________________________________________________________________________351


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormClient Information On-Boarding FormClient InfoContact PersonOffice PhoneCell PhoneHome PhoneE-mail AddressAddressDomain Name InfoDomain NameRegistrar NameDomain CreatedDomain ExpiresDNS ServersUser AccountPassword352


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormMX Record(s)A Record(s)OtherMiscISP InfoISPInternet type ( DSL/T-1)B<strong>and</strong>widthDynamic or StaticUs<strong>able</strong> IP RangeSubnetGatewayISP Tech Support Phone NumberISP Tech Support E-mailUser AccountPasswordMisc353


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormWeb & E-mail HostingWeb Site Hosted onEmail Hosted onUser AccountPasswordMiscServer InfoMake & ModelSerial NumberCPURAMRAID ConfigurationSCSIBattery BackupServer NameAdministrator AccountAdministrator Password354


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormDomain nameServer LAN IPServer’s OSServer’s RoleHard Disk SizeNumber of hard drivesFault ToleranceFireWallHardware/SoftwareMake/ ModelLAN IP AddressWAN IP AddressUser AccountPasswordRemote Management (En<strong>able</strong>d/Dis<strong>able</strong>d)Ping ( on /off)VPN(s)355


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormOpen PortsNAT’ing Outside/InsideLAN infoLAN SubnetServer’s IPGatewayAnti-SpamAnti-Spam SolutionVersionUser AccountPasswordBackupBackup Software <strong>and</strong> Version356


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormBackup ScheduleBackup Device (Type & Model)Number of back up tapesRemote Backup/Vendor NameUser AccountPasswordAntiVirus/ Anti-SpywareVirus Protection SoftwareVersionUser AccountPasswordSpy Aware Protection SoftwareVersionUser AccountPassword357


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormUser AccountsUser NamePassword358


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormWorkstation InventoryComputernameUser CPU Memory Hard drive359


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormNetwork InventoryDevice Name Make & Model IP Address360


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Client Information On-Boarding FormPrinters & PeripheralsType & Model Share Name Physical Location IP addressPoint of SaleSoftware or HardwareVendorVersionCompatibility361


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleManaged <strong>Service</strong>s Agreement ExampleThis sample managed service agreement is included for instructional <strong>and</strong>informational purposes only, <strong>and</strong> is not recommended, nor warranted foruse.Always have legal counsel review any <strong>and</strong> all agreements or documentsthat you utilize in your IT practice, or distribute to your clients prior todoing so.Local laws <strong>and</strong> liabilities can never be fully covered by any type of genericdocument, including this sample managed service agreement.362


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleManaged <strong>Service</strong>s Agreement10. Term of Agreement11. This Agreement between_______________________________, herein referred toas Client, <strong>and</strong> _______________________________,hereinafter referred to as <strong>Service</strong> Provider, is effectiveupon the date signed, shall remain in force for a period ofthree years, <strong>and</strong> be reviewed annually to address anynecessary adjustments or modifications. Shouldadjustments or modifications be required that increasethe monthly fees paid for the services rendered underthis Agreement, these increases will not exceed ______%of the value of the existing monthly fees due under thisAgreement. <strong>The</strong> <strong>Service</strong> Agreement automaticallyrenews for a subsequent three year term beginning onthe day immediately following the end of the Initial Term,unless either party gives the other ninety (90) days priorwritten notice of its intent not to renew this Agreement.d) This Agreement may be terminated by either Partyupon ninety (90) days’ written notice if the otherParty:363


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleI. Fails to fulfill in any material respect itsobligations under this Agreement <strong>and</strong>does not cure such failure within thirty(30) days’ of receipt of such writtennotice.II.III.Breaches any material term or conditionof this Agreement <strong>and</strong> fails to remedysuch breach within thirty (30) days’ ofreceipt of such written notice.Terminates or suspends its businessoperations, unless it is succeeded by apermitted assignee under thisAgreement.e) If either party terminates this Agreement, <strong>Service</strong>Provider will assist Client in the orderlytermination of services, including timely transferof the services to another designated provider.Client agrees to pay <strong>Service</strong> Provider the actualcosts of rendering such assistance.12. Fees <strong>and</strong> Payment ScheduleFees will be $_______________ per month, invoiced toClient on a Monthly basis, <strong>and</strong> will become due <strong>and</strong>364


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Examplepay<strong>able</strong> on the first day of each month. <strong>Service</strong>s will besuspended if payment is not received within 5 daysfollowing date due. Refer to Appendix B for servicescovered by the monthly fee under the terms of thisAgreement.It is understood that any <strong>and</strong> all <strong>Service</strong>s requested byClient that fall outside of the terms of this Agreementwill be considered Projects, <strong>and</strong> will be quoted <strong>and</strong>billed as separate, individual <strong>Service</strong>s.13. TaxesIt is understood that any Federal, State or Local Taxesapplic<strong>able</strong> shall be added to each invoice for servicesor materials rendered under this Agreement. Clientshall pay any such taxes unless a valid exemptioncertificate is furnished to <strong>Service</strong> Provider for the stateof use.14. CoverageRemote Helpdesk <strong>and</strong> Vendor Management of Client’sIT networks will be provided to the Client by <strong>Service</strong>Provider through remote means between the hours of8:00 am – 5:00 pm Monday through Friday, excludingpublic holidays. Network Monitoring <strong>Service</strong>s will beprovided 24/7/365. All services qualifying under these365


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Exampleconditions, as well as <strong>Service</strong>s that fall outside thisscope will fall under the provisions of Appendix B.Hardware costs of any kind are not covered under theterms of this Agreement.Support <strong>and</strong> Escalation<strong>Service</strong> Provider will respond to Client’s Trouble Ticketsunder the provisions of Appendix A, <strong>and</strong> with best effortafter hours or on holidays. Trouble Tickets must beopened by Client’s designated I.T. Contact Person, byemail to our Help <strong>Desk</strong>, or by phone if email isunavail<strong>able</strong>. Each call will be assigned a Trouble Ticketnumber for tracking. Our escalation process is detailedin Appendix A.<strong>Service</strong> outside Normal Working HoursEmergency services performed outside of the hours of8:00 am – 5:00 pm Monday through Friday, excludingpublic holidays, shall be subject to provisions ofAppendix B.<strong>Service</strong> Calls Where No Trouble is foundIf Client requests onsite service <strong>and</strong> no problem isfound or reproduced, Client shall be billed at thecurrent applic<strong>able</strong> rates as indicated in Appendix B.366


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleLimitation of LiabilityIn no event shall <strong>Service</strong> Provider be held li<strong>able</strong> forindirect, special, incidental or consequential damagesarising out of service provided hereunder, includingbut not limited to loss of profits or revenue, loss of useof equipment, lost data, costs of substitute equipment,or other costs.15. Additional Maintenance <strong>Service</strong>sHardware/System Support<strong>Service</strong> Provider shall provide support of all hardware<strong>and</strong> systems specified in Appendix B, provided that allHardware is covered under a currently active VendorSupport Contract; or replace<strong>able</strong> parts be readilyavail<strong>able</strong>, <strong>and</strong> all Software be Genuine, CurrentlyLicensed <strong>and</strong> Vendor-Supported. Should any hardware orsystems fail to meet these provisions, they will beexcluded from this <strong>Service</strong> Agreement. Should 3 rd PartyVendor Support Charges be required in order to resolveany issues, these will be passed on to the Client after firstreceiving the Client’s authorization to incur them.367


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleVirus Recovery for Current, Licensed Antivirusprotected systemsDamages caused by, <strong>and</strong> recovery from, virus infectionnot detected <strong>and</strong> quarantined by the latest Antivirusdefinitions are covered under the terms of thisAgreement. This <strong>Service</strong> is limited to those systemsprotected with a Currently Licensed, Vendor-Supported Antivirus Solution.Monitoring <strong>Service</strong>s<strong>Service</strong> Provider will provide ongoing monitoring <strong>and</strong>security services of all critical devices as indicated inAppendix B. <strong>Service</strong> Provider will provide monthly reportsas well as document critical alerts, scans <strong>and</strong> eventresolutions to Client. Should a problem be discoveredduring monitoring, <strong>Service</strong> Provider shall make everyattempt to rectify the condition in a timely mannerthrough remote means.16. Suitability of Existing EnvironmentMinimum St<strong>and</strong>ards Required for <strong>Service</strong>s368


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleIn order for Client’s existing environment to qualify for<strong>Service</strong> Provider’s Managed <strong>Service</strong>s, the followingrequirements must be met:1. All Servers with Microsoft Windows OperatingSystems must be running Windows 2008 Serveror later, <strong>and</strong> have all of the latest Microsoft<strong>Service</strong> Packs <strong>and</strong> Critical Updates installed.2. All <strong>Desk</strong>top PC’s <strong>and</strong> notebooks/laptops withMicrosoft Windows operating systems must berunning Windows 7 or later, <strong>and</strong> have all of thelatest Microsoft service packs <strong>and</strong> criticalupdates installed.3. All Server <strong>and</strong> <strong>Desk</strong>top Software must begenuine, licensed <strong>and</strong> vendor-supported.4. <strong>The</strong> environment must have a currentlylicensed, up-to-date <strong>and</strong> vendor-supportedserver-based antivirus solution protecting allservers, desktops, notebooks/laptops, <strong>and</strong>email.5. <strong>The</strong> environment must have a currently licensed,vendor-supported server-based backup solution.6. <strong>The</strong> environment must have a currentlylicensed, vendor-supported hardware firewallbetween the internal network <strong>and</strong> the Internet.369


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example7. Any Wireless data traffic in the environmentmust be secured with a minimum of 128bitdata encryption.Costs required to bring Client’s environment up tothese Minimum St<strong>and</strong>ards are not included in thisAgreement.17. Excluded <strong>Service</strong>s<strong>Service</strong> rendered under this Agreement does notinclude:11) Parts, equipment or software not covered byvendor/manufacturer warranty or support.12) <strong>The</strong> cost of any parts, equipment, or shippingcharges of any kind.13) <strong>The</strong> cost of any Software, Licensing, or SoftwareRenewal or Upgrade Fees of any kind.14) <strong>The</strong> cost of any 3 rd Party Vendor orManufacturer Support or Incident Fees of anykind.15) <strong>The</strong> cost to bring Client’s environment up tominimum st<strong>and</strong>ards required for <strong>Service</strong>s.370


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example16) Failure due to acts of God, buildingmodifications, power failures or other adverseenvironmental conditions or factors.17) <strong>Service</strong> <strong>and</strong> repair made necessary by thealteration or modification of equipment otherthan that authorized by <strong>Service</strong> Provider,including alterations, software installations ormodifications of equipment made by Client’semployees or anyone other than <strong>Service</strong>Provider.18) Maintenance of Applications softwarepackages, whether acquired from <strong>Service</strong>Provider or any other source unless as specifiedin Appendix B.19) Programming (modification of software code)<strong>and</strong> program (software) maintenance unless asspecified in Appendix B.20) Training <strong>Service</strong>s of any kind.18. MiscellaneousThis Agreement shall be governed by the laws of theState of __________. It constitutes the entireAgreement between Client <strong>and</strong> <strong>Service</strong> Provider formonitoring/maintenance/service of all equipmentlisted in “Appendix B.” Its terms <strong>and</strong> conditions shall371


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Exampleprevail should there be any variance with the terms<strong>and</strong> conditions of any order submitted by Client.<strong>Service</strong> Provider is not responsible for failure to renderservices due to circumstances beyond its controlincluding, but not limited to, acts of God.19. Acceptance of <strong>Service</strong> AgreementThis <strong>Service</strong> Agreement covers only those services <strong>and</strong>equipment listed in “Appendix B.” <strong>Service</strong> Providermust deem any equipment/services Client may want toadd to this Agreement after the effective dateaccept<strong>able</strong>. <strong>The</strong> addition of equipment/services notlisted in “Appendix B” at the signing of this Agreement,if accept<strong>able</strong> to <strong>Service</strong> Provider, shall result in anadjustment to the Client’s monthly charges.IN WITNESS WHEREOF, the parties hereto have caused this<strong>Service</strong> Agreement to be signed by their duly authorizedrepresentatives as of the date set forth below.Accepted by:Authorized Signature <strong>Service</strong> Provider Date372


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleAuthorized Signature Client Date373


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleManaged <strong>Service</strong>s AgreementAppendix AResponse <strong>and</strong> Resolution Times<strong>The</strong> following t<strong>able</strong> shows the targets of response <strong>and</strong>resolution times for each priority level:374


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleSupport Tiers<strong>The</strong> following details <strong>and</strong> describes our Support Tier levels:375


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleManaged <strong>Service</strong>s AgreementAppendix A (cont)<strong>Service</strong> Request Escalation Procedure1. Support Request is Received2. Trouble Ticket is Created3. Issue is Identified <strong>and</strong> documented in Help <strong>Desk</strong>system4. Issue is qualified to determine if it can be resolvedthrough Tier 1 SupportIf issue can be resolved through Tier 1 Support:5. Level 1 Resolution - issue is worked to successfulresolution6. Quality Control –Issue is verified to be resolved toClient’s satisfaction7. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>system376


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleIf issue cannot be resolved through Tier 1 Support:6. Issue is escalated to Tier 2 Support7. Issue is qualified to determine if it can be resolved byTier 2 SupportIf issue can be resolved through Tier 2 Support:8. Level 2 Resolution - issue is worked to successfulresolution9. Quality Control –Issue is verified to be resolved toClient’s satisfaction10. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 2 Support:9. Issue is escalated to Tier 3 Support10. Issue is qualified to determine if it can be resolvedthrough Tier 3 Support377


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement ExampleIf issue can be resolved through Tier 3 Support:11. Level 3 Resolution - issue is worked to successfulresolution12. Quality Control –Issue is verified to be resolved toClient’s satisfaction13. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 3 Support:12. Issue is escalated to Onsite Support13. Issue is qualified to determine if it can be resolvedthrough Onsite SupportIf issue can be resolved through Onsite Support:14. Onsite Resolution - issue is worked to successfulresolution378


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example15. Quality Control –Issue is verified to be resolved toClient’s satisfaction16. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Onsite Support:17. I.T. Manager Decision Point – request is updated withcomplete details of all activity performed379


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example380


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example381


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Managed <strong>Service</strong>s Agreement Example382


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Sample Managed <strong>Service</strong>s Welcome LetterSample Managed <strong>Service</strong>s Welcome LetterCongratulations <strong>and</strong> Welcome to (Your Company Name) – thePremier Managed I.T. Solution Provider.Since (Inception Date), (Your Company Name) has beendeveloping <strong>and</strong> implementing Information TechnologySolutions that improve our Clients’ Business Processes, addingvalue to their Bottom Line.Our new Managed <strong>Service</strong>s Plan is a direct result of ourcontinual effort to identify our Clients’ needs, <strong>and</strong> alleviatetheir business pain.We are pleased <strong>and</strong> excited to introduce this valu<strong>able</strong> <strong>Service</strong>to you <strong>and</strong> your Organization. We are now your I.T.Department, <strong>and</strong> will provide Technical Support for each User<strong>and</strong> Device on your Network, as detailed in your Managed<strong>Service</strong>s Agreement.Your Managed <strong>Service</strong>s Plan provides you with Unlimited Help<strong>Desk</strong>/Remote Support during the hours of 8am <strong>and</strong> 5pmMonday through Friday, excluding Holidays. Should yourSupport need fall outside of these hours; you will be billed asindicated in Appendix “B” of your Managed <strong>Service</strong>sAgreement.383


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Sample Managed <strong>Service</strong>s Welcome LetterIn addition to providing you with Unlimited Help <strong>Desk</strong>/RemoteSupport, we will also monitor your Servers <strong>and</strong> their Critical<strong>Service</strong>s such as Exchange, SQL Databases, <strong>and</strong> other specificLine-Of-Business Applications installed on them, along withyour Internet Connection <strong>and</strong> Firewall/Routers 24 hours a day,7 days a week.Should any of these <strong>Service</strong>s fail, our Network MonitoringSystems will attempt to restart them. Should these attemptsfail, a Trouble Ticket will be created immediately, <strong>and</strong> anEngineer will be alerted to begin troubleshooting. Our goal isto minimize your downtime, <strong>and</strong> this is just one tool that werely on to achieve this objective.We’ve made it simple to request Support – just send an Emailto:(Your Helpdesk Email Address)Or, just ask for the Help <strong>Desk</strong> at (Your Helpdesk PhoneNumber).If calling after hours with an Emergency, please dial extension(Your After-Hours Extension), <strong>and</strong> an On-Call Engineer will bepaged immediately.Vendor Management is also included in your Managed<strong>Service</strong>s Plan. We relieve you of the burden of having to384


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Sample Managed <strong>Service</strong>s Welcome Lettermanage all of your Vendors, <strong>and</strong> allow you the ability to focuson running your business.You will be contacted shortly by a Customer <strong>Service</strong>Representative who will gather the information we will needin order to begin providing this valu<strong>able</strong> <strong>Service</strong> to you, <strong>and</strong> toschedule a visit from our Technical Team so that we can beginconfiguring your Network for Managed <strong>Service</strong>s.Thank you again for allowing us the opportunity to earn yourbusiness. In a short time, I’m sure you’ll agree that you’readding tremendous value to your Organization through ourManaged <strong>Service</strong>s.Sincerely,385


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident Management <strong>and</strong> Resolution Process ExampleIncident Management <strong>and</strong> Resolution ProcessExample1. Support Request is Received2. Trouble Ticket is Created3. Issue is Identified <strong>and</strong> documented in Help <strong>Desk</strong>system4. Issue is qualified to determine if it can be resolvedthrough Tier 1 SupportIf issue can be resolved through Tier 1 Support:5. Level 1 Resolution - issue is worked to successfulresolution6. Quality Control –Issue is verified to be resolved toClient’s satisfaction7. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>system386


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident Management <strong>and</strong> Resolution Process ExampleIf issue cannot be resolved through Tier 1 Support:6. Issue is escalated to Tier 2 Support7. Issue is qualified to determine if it can be resolved byTier 2 SupportIf issue can be resolved through Tier 2 Support:8. Level 2 Resolution - issue is worked to successfulresolution9. Quality Control –Issue is verified to be resolved toClient’s satisfaction10. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 2 Support:9. Issue is escalated to Tier 3 Support10. Issue is qualified to determine if it can be resolvedthrough Tier 3 Support387


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident Management <strong>and</strong> Resolution Process ExampleIf issue can be resolved through Tier 3 Support:11. Level 3 Resolution - issue is worked to successfulresolution12. Quality Control –Issue is verified to be resolved toClient’s satisfaction13. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Tier 3 Support:12. Issue is escalated to Onsite Support13. Issue is qualified to determine if it can be resolvedthrough Onsite SupportIf issue can be resolved through Onsite Support:14. Onsite Resolution - issue is worked to successfulresolution15. Quality Control –Issue is verified to be resolved toClient’s satisfaction388


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Incident Management <strong>and</strong> Resolution Process Example16. Trouble Ticket is closed, after complete problemresolution details have been updated in Help <strong>Desk</strong>systemIf issue cannot be resolved through Onsite Support:17. I.T. Manager Decision Point – request is updated withcomplete details of all activity performed389


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> <strong>Desk</strong> EngineerEmployment Ad for a <strong>Service</strong> <strong>Desk</strong> Engineer<strong>Service</strong> <strong>Desk</strong> EngineerCompany: NameLocation: Full addressStatus: Full-Time, EmployeeJob Category: <strong>Service</strong> <strong>Desk</strong>Relevant Work Experience: 3-5 YearsCareer Level: Experienced (Non-Manager)We are currently seeking a highly skilled <strong>Service</strong> <strong>Desk</strong> engineerwith the drive <strong>and</strong> determination to help us support our clientbase. This position reports to our <strong>Service</strong> Manager. We arelooking for an individual who is a problem-solver <strong>and</strong> has aproven track record of working within a team environment tosuccessfully address challenging user computing issues, <strong>and</strong> isaccustomed to leveraging technical training opportunities toimprove their skills. If you have the experience <strong>and</strong> the desire,we'd like to talk to you.Our <strong>Service</strong> <strong>Desk</strong> engineers are responsible for maintaininguser uptime <strong>and</strong> improving their computing experiencesthrough effective remote monitoring, maintenance <strong>and</strong>problem identification <strong>and</strong> resolution activities, as well as390


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> <strong>Desk</strong> Engineergrowing <strong>and</strong> developing the organization’s perception withexisting clients through exceptional customer service.C<strong>and</strong>idates must be energetic <strong>and</strong> focused with a strongmotivation to learn new technologies <strong>and</strong> management <strong>and</strong>maintenance processes. This position requires dedication,persistence, follow-up, effective utilization of providedresources <strong>and</strong> unbeat<strong>able</strong> customer service.This position will include identifying user problems <strong>and</strong>working within a structured problem management <strong>and</strong>resolution process to remediate them within established SLAs,<strong>and</strong> involves working with other resources <strong>and</strong> vendors todeliver effective support services. Responsibilities includeidentifying, documenting <strong>and</strong> troubleshooting user computingissues to resolution <strong>and</strong> maintaining client satisfaction.Job duties include utilizing our remote monitoring <strong>and</strong>management (RMM) <strong>and</strong> professional services automation(PSA) solutions along with other service-specific tools <strong>and</strong>technologies to deliver remote user support services <strong>and</strong>update service request information, answer technical supportcalls, assign ticket severity, prioritize work accordingly, <strong>and</strong>collaborate <strong>and</strong> work with other staff <strong>and</strong> vendor supportresources to resolve issues. Overall relationship management<strong>and</strong> the ability to coordinate required resources to respond tocomplex IT requirements are desired. Other requirements391


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> <strong>Desk</strong> Engineerinclude participating in ongoing training <strong>and</strong> attainment ofmanufacturer certifications, developing <strong>and</strong> maintainingrelationships with user <strong>and</strong> vendor contacts, <strong>and</strong> preparing<strong>and</strong> presenting service <strong>and</strong> monitoring reports tomanagement regularly.Minimum Skills Required:Minimum three years <strong>Service</strong> <strong>Desk</strong> experienceMicrosoft Certified Professional statusExcellent knowledge of our supported software <strong>and</strong>technologiesStrong interpersonal skills required to effectivelycommunicate with users <strong>and</strong> vendorsPassion for teamwork, continuing education, problemsolving <strong>and</strong> exceptional customer serviceMust be well spoken, outgoing, organized, detailedorientated,depend<strong>able</strong> <strong>and</strong> flexibleExperience with HP, Cisco <strong>and</strong> Citrix technologies aplusValid driver's license <strong>and</strong> proof of insuranceBackground check <strong>and</strong> drug screen requiredReli<strong>able</strong> transportationThis Position Entails:392


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> <strong>Desk</strong> EngineerTroubleshooting user problems over the phone <strong>and</strong>with remote control technologiesAccurate documentation of all activities conducted<strong>The</strong> ability to manage, maintain, troubleshoot <strong>and</strong>support our users’ networks, equipment, software <strong>and</strong>services<strong>The</strong> ability to learn quickly <strong>and</strong> adapt to changingrequirements<strong>The</strong> Successful C<strong>and</strong>idate must be:Professional <strong>and</strong> articulateInterpersonally adeptTechnically proficientA relationship builderA problem solverBenefits include group medical/dental insurance, paidvacation, holidays, personal & sick time <strong>and</strong> trainingreimbursement. Our generous compensation plans arestructured as salary plus bonuses for meeting utilization,compliance <strong>and</strong> customer service requirements, with initialcompensation commensurate with relevant experience.Qualified c<strong>and</strong>idates please submit a current resume, alongwith salary history.393


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> <strong>Desk</strong> Engineer394


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>NOC</strong> EngineerEmployment Ad for a <strong>NOC</strong> EngineerNetwork <strong>Operations</strong> Center (<strong>NOC</strong>) EngineerCompany: NameLocation: Full addressStatus: Full-Time, EmployeeJob Category: Network <strong>Operations</strong>Relevant Work Experience: 3-5 YearsCareer Level: Experienced (Non-Manager)We are currently seeking a highly skilled <strong>NOC</strong> engineer withthe drive <strong>and</strong> determination to help us support our clientbase. This position reports to our <strong>Service</strong> Manager. We arelooking for an individual who is a problem-solver <strong>and</strong> has aproven track record of working within a team environment tosuccessfully address challenging network computing issues,<strong>and</strong> is accustomed to leveraging technical trainingopportunities to improve their skills. If you have theexperience <strong>and</strong> the desire, we'd like to talk to you.Our <strong>NOC</strong> engineers are responsible for maintaining useruptime <strong>and</strong> improving their computing experiences throughproactive remote monitoring, maintenance <strong>and</strong> problemidentification <strong>and</strong> resolution activities, as well as growing <strong>and</strong>395


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>NOC</strong> Engineerdeveloping the organization’s perception with existing clientsthrough exceptional customer service. C<strong>and</strong>idates must beenergetic <strong>and</strong> focused with a strong motivation to learn newtechnologies <strong>and</strong> management <strong>and</strong> maintenance processes.This position requires dedication, persistence, follow-up,effective utilization of provided resources <strong>and</strong> unbeat<strong>able</strong>customer service.This position will include identifying hardware, network <strong>and</strong>service problems <strong>and</strong> working within a structured problemmanagement <strong>and</strong> resolution process to remediate themwithin established SLAs, <strong>and</strong> involves working with otherresources <strong>and</strong> vendors to deliver effective support services.Responsibilities include identifying, documenting <strong>and</strong>troubleshooting client network <strong>and</strong> computing issues toresolution <strong>and</strong> maintaining client satisfaction.Job duties include utilizing our remote monitoring <strong>and</strong>management (RMM) <strong>and</strong> professional services automation(PSA) solutions along with other service-specific tools <strong>and</strong>technologies to deliver remote network environment supportservices <strong>and</strong> update service request information, answertechnical support calls, assign ticket severity, prioritize workaccordingly, <strong>and</strong> collaborate <strong>and</strong> work with other staff <strong>and</strong>vendor support resources to resolve issues. Overallrelationship management <strong>and</strong> the ability to coordinate396


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>NOC</strong> Engineerrequired resources to respond to complex IT requirements aredesired. Other requirements include participating in ongoingtraining <strong>and</strong> attainment of manufacturer certifications,developing <strong>and</strong> maintaining relationships with user <strong>and</strong>vendor contacts, <strong>and</strong> preparing <strong>and</strong> presenting service <strong>and</strong>monitoring reports to management regularly.Minimum Skills Required:Minimum three years <strong>NOC</strong> experienceMicrosoft Certified Professional statusExcellent knowledge of our supported software <strong>and</strong>technologiesStrong interpersonal skills required to effectivelycommunicate with users <strong>and</strong> vendorsPassion for teamwork, continuing education, problemsolving <strong>and</strong> exceptional customer serviceMust be well spoken, outgoing, organized, detailedorientated,depend<strong>able</strong> <strong>and</strong> flexibleExperience with HP, Cisco <strong>and</strong> Citrix technologies aplusValid driver's license <strong>and</strong> proof of insuranceBackground check <strong>and</strong> drug screen requiredReli<strong>able</strong> transportationThis Position Entails:397


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>NOC</strong> EngineerTroubleshooting network, equipment <strong>and</strong> servicerelatedproblems with remote control technologiesAnalyzing remote monitoring reports to identifycapacity <strong>and</strong> performance issues <strong>and</strong> remediate themAccurate documentation of all activities conducted<strong>The</strong> ability to manage, maintain, troubleshoot <strong>and</strong>support our users’ networks, equipment, software <strong>and</strong>services<strong>The</strong> ability to learn quickly <strong>and</strong> adapt to changingrequirements<strong>The</strong> Successful C<strong>and</strong>idate must be:Professional <strong>and</strong> articulateInterpersonally adeptTechnically proficientA relationship builderA problem solverBenefits include group medical/dental insurance, paidvacation, holidays, personal & sick time <strong>and</strong> trainingreimbursement. Our generous compensation plans arestructured as salary plus bonuses for meeting utilization,compliance <strong>and</strong> customer service requirements, with initialcompensation commensurate with relevant experience.398


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>NOC</strong> EngineerQualified c<strong>and</strong>idates please submit a current resume, alongwith salary history.399


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> DispatcherEmployment Ad for a <strong>Service</strong> Dispatcher<strong>Service</strong> DispatcherCompany: NameLocation: Full AddressStatus: Full-Time, EmployeeJob Category: DispatcherRelevant Work Experience: 3-5 YearsCareer Level: Experienced (Non-Manager)We are currently seeking a highly skilled service dispatcherwith the drive <strong>and</strong> determination to help us support our clientbase. This position reports to our <strong>Service</strong> Manager. We arelooking for an individual who is a problem-solver <strong>and</strong> has aproven track record of working within a team environment tosuccessfully address remote user issues requiring onsitedispatch. If you have the experience <strong>and</strong> the desire, we'd liketo talk to you.Our service dispatchers participate in our problemmanagement <strong>and</strong> resolution process, <strong>and</strong> assign resources to<strong>and</strong> schedule all remote, onsite or bench services, as well asgrowing <strong>and</strong> developing the organization’s perception withexisting clients through exceptional customer service.400


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> DispatcherC<strong>and</strong>idates must be energetic <strong>and</strong> focused with a strongmotivation to learn new technologies <strong>and</strong> management <strong>and</strong>scheduling processes. This position requires dedication,persistence, follow-up, effective utilization of providedresources <strong>and</strong> unbeat<strong>able</strong> customer service.This position will include coordinating efficient <strong>and</strong> timelyclient installation <strong>and</strong> repair assignments through effectivemanagement of our field engineering staff <strong>and</strong> working withina structured problem management <strong>and</strong> resolution process tocomplete them within established SLAs, <strong>and</strong> involves workingwith other resources <strong>and</strong> vendors to deliver effective supportservices. Responsibilities include continuously monitoring <strong>and</strong>adjusting work assignments to insure optimum techproductivity through efficient routing <strong>and</strong> maintaining clientsatisfaction.Job duties include utilizing our professional servicesautomation (PSA) solution to monitor remote user supportservices <strong>and</strong> update service request information, answertechnical support calls, assign ticket severity, prioritize <strong>and</strong>schedule work accordingly, <strong>and</strong> collaborate <strong>and</strong> work withother staff <strong>and</strong> vendor support resources to resolve issues.Overall relationship management skills <strong>and</strong> the ability tocoordinate required resources to respond to complex ITrequirements are desired. Other requirements include401


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Dispatcherparticipating in ongoing training <strong>and</strong> preparing <strong>and</strong> presentingservice reports to management regularly.Minimum Skills Required:Minimum three years service dispatch experienceExcellent knowledge of our supported software <strong>and</strong>technologiesStrong interpersonal skills required to effectivelycommunicate with users, staff <strong>and</strong> vendorsPassion for teamwork, continuing education, problemsolving <strong>and</strong> exceptional customer serviceMust be well spoken, outgoing, organized, detailedorientated,depend<strong>able</strong> <strong>and</strong> flexibleValid driver's license <strong>and</strong> proof of insuranceBackground check <strong>and</strong> drug screen requiredReli<strong>able</strong> transportationThis Position Entails:Heavy scheduling <strong>and</strong> management of humanresourcesEfficient <strong>and</strong> effective routing of each day’s scheduledwork to the appropriate field engineerAccurate documentation of all activities conductedHeavy follow-up <strong>and</strong> follow-through<strong>The</strong> ability to learn quickly <strong>and</strong> adapt to changingrequirements402


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Dispatcher<strong>The</strong> Successful C<strong>and</strong>idate must be:Professional <strong>and</strong> articulateInterpersonally adeptTechnically proficientA relationship builderA problem solverBenefits include group medical/dental insurance, paidvacation, holidays, personal & sick time <strong>and</strong> trainingreimbursement. Our generous compensation plans arestructured as salary plus bonuses for meeting utilization,compliance <strong>and</strong> customer service requirements, with initialcompensation commensurate with relevant experience.Qualified c<strong>and</strong>idates please submit a current resume, alongwith salary history.403


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Dispatcher404


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> ManagerEmployment Ad for a <strong>Service</strong> Manager<strong>Service</strong> ManagerCompany: NameLocation: Full AddressStatus: Full-Time, EmployeeJob Category: <strong>Service</strong> ManagementRelevant Work Experience: 5-7 YearsCareer Level: Experienced (Manager)We are currently seeking a highly skilled service manager withthe drive <strong>and</strong> determination to help us support our clientbase. This position reports to our Director of Technical<strong>Service</strong>s. We are looking for an individual who is a problemsolver<strong>and</strong> has a proven track record of managing a technicalteam to successfully address challenging user computingissues, <strong>and</strong> is accustomed to maintaining technical staffinglevels, training <strong>and</strong> certification requirements, problemmanagement <strong>and</strong> resolution processes <strong>and</strong> client satisfactionvia strict SLA management. If you have the experience <strong>and</strong> thedesire, we'd like to talk to you.Our service manager is responsible for maintaining clientuptime <strong>and</strong> improving their computing experiences through405


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Managermanaging our technical staff’s effective remote monitoring,maintenance <strong>and</strong> problem identification <strong>and</strong> resolutionactivities, as well as growing <strong>and</strong> developing the organization’sperception with existing clients through exceptional customerservice. This position will directly supervise our <strong>Service</strong> <strong>Desk</strong><strong>and</strong> staff, provide customer service support, analyze trends inclient inquiries/requests for assistance, recommendimprovements in overall service levels <strong>and</strong> monitor staffperformance. C<strong>and</strong>idates must be energetic <strong>and</strong> focused witha strong motivation to learn new technologies <strong>and</strong>management <strong>and</strong> maintenance processes. This positionrequires dedication, persistence, follow-up, effectiveutilization of provided resources <strong>and</strong> unbeat<strong>able</strong> customerservice.This position will include managing a structured problemmanagement <strong>and</strong> resolution process to remediate clientproblems within established SLAs, <strong>and</strong> involves working withother resources <strong>and</strong> vendors to deliver effective supportservices.Job duties include utilizing our professional servicesautomation (PSA) solution to manage technical supportservices <strong>and</strong> collaborate <strong>and</strong> work with other management,staff <strong>and</strong> vendor support resources to insure effective,efficient service delivery to clients. Overall relationship406


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Managermanagement skills <strong>and</strong> the ability to coordinate requiredresources to respond to complex IT requirements are desired.Other requirements include participating in ongoingmanagement <strong>and</strong> strategy meetings <strong>and</strong> preparing <strong>and</strong>presenting service reports to management regularly.Minimum Skills Required:Minimum three years service dispatch experienceExcellent knowledge of our supported software <strong>and</strong>technologiesStrong interpersonal skills required to effectivelycommunicate with clients, staff <strong>and</strong> vendorsPassion for teamwork, problem solving <strong>and</strong>exceptional customer serviceMust be well spoken, outgoing, organized, detailedorientated,depend<strong>able</strong> <strong>and</strong> flexibleValid driver's license <strong>and</strong> proof of insuranceBackground check <strong>and</strong> drug screen requiredReli<strong>able</strong> transportationThis Position Entails:Management of human resources to meetorganizational goals for service excellenceAdministrator of established company policies407


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Manager Analysis of service delivery business unit data to seekimprovements in efficiency <strong>and</strong> productivity Heavy follow-up <strong>and</strong> follow-through <strong>The</strong> ability to learn quickly <strong>and</strong> adapt to changingrequirements<strong>The</strong> Successful C<strong>and</strong>idate must be:Professional <strong>and</strong> articulateInterpersonally adeptTechnically proficientA relationship builderA problem solverBenefits include group medical/dental insurance, paidvacation, holidays, personal & sick time <strong>and</strong> trainingreimbursement. Our generous compensation plans arestructured as salary plus bonuses for meeting utilization,compliance <strong>and</strong> customer service requirements, with initialcompensation commensurate with relevant experience.Qualified c<strong>and</strong>idates please submit a current resume, alongwith salary history.408


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Employment Ad for a <strong>Service</strong> Manager409


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Hiring Checklist for a New Technical PersonHR Hiring Checklist for a New Technical Person1. Run ad for technical person Completed2. Receive <strong>and</strong> review resume3. Conduct telephone interview Use st<strong>and</strong>ard interview questions4. Email c<strong>and</strong>idate DISC behavioral profile link5. Email c<strong>and</strong>idate PTSI profile link Email c<strong>and</strong>idate results of profilesbefore live interview6. Schedule live interview in office Complete job application <strong>and</strong> typingtest Review DISC behavioral profile Review PTSI profile Give c<strong>and</strong>idate technical testReview position requirementsReview training process <strong>and</strong>timeline7. Schedule second interview with uppermanagement8. Establish start date for c<strong>and</strong>idate (at least 1week out to check references)9. Email offer letter to c<strong>and</strong>idate10. Conduct criminal background check <strong>and</strong>reference check410


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!Hiring Checklist for a New Technical Person11. Schedule appointment for drug screen12. New hire orientation Issue employee h<strong>and</strong>book Schedule company training Company tour <strong>and</strong> introduction tostaff411


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download?HR Interview Questions for a New TechnicalPersonPrimary Questions*What do you know about our company?What we are looking for is do they know us or havethey at least looked at the web site. (we fill them in ifthey don’t know)Tell me a little bit about yourself. If needed clarify (tellme about your previous jobs)What are some of your strengths ….. Weaknesses?What do you see yourself doing in 3 years? …. howabout in 5 years?Tell me a time when you made a mistake <strong>and</strong> whatsteps did you take to resolve the issue?What do you get excited about? …. What upsets you?What situations make you lose your temper?What was one of your greatest successes?What are 3 things you do extremely well?What are 3 things you need to work on?In a group or team what position do you take on?Tell us about a team you have worked in.What are three positive things your last boss would sayabout you?How much guidance <strong>and</strong> management do you like?How much do you feel you need?What type of people do you work best with?412


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download?If budgets were of no concern, what would be the firstthing you would spend money on <strong>and</strong> why?What are your compensation requirements?Can we have references?Can you send us an example of something you’vewritten?Do you have any questions for us?Additional Questions*Is there anything that would interfere with yourregular attendance?What would your perfect job look like?Why should we hire you?What makes you more qualified than the otherapplicants?What are the skills that you think would benefit ourcompany?How do you see yourself fitting in to our organization?Rate yourself on a scale of 1-10 on Word, Excel,PowerPoint, Outlook <strong>and</strong> VistaWhat type of work environment do you like?How do you work under pressures & deadlines?If you could start your career again, what would you dodifferently?How would you describe your personality? What isyour favorite movie of all time? Why?413


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download?Describe a time when you made a client/clientextremely happy?Do you mind if we call your former employer?Why are you considering a career change at this timeor leaving your current position?What do you like <strong>and</strong> dislike about your currentposition?What about this position do you find the mostattractive? .... Least attractive?In your present position, what problems have youidentified that had previously been overlooked?What kind of feedback have you received from pastclients <strong>and</strong> clients?How have you h<strong>and</strong>led negative feedback from clients,clients, or team members?Give us an example of a time where there was aconflict in a team/group that you were involved in <strong>and</strong>how it was resolved.Information Systems Questions*Describe your documentation skillsRate yourself on a scale of 1-10 on, Windows Server,Backup Exec, Visio, Trend/Norton AV.How comfort<strong>able</strong> are you working with varioushardware?What important trends do you see in our industry?Do you hold any certifications?414


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download? How do you feel about attaining certifications? Do you own a car <strong>and</strong> have a driver’s license? Do you mind using your personal vehicle for work? What are your hours of availability? How do you feel about working some nights <strong>and</strong>weekends? What are the seven layers of the OSI model? What sort of cabling is suit<strong>able</strong> for Fast Ethernetprotocols? What is the difference between a hub, switch, <strong>and</strong>router? What is a default route? What is the difference between TCP <strong>and</strong> UDP? How would you optimize Exchange memory usage on aWindows Server server with more than 1Gb ofmemory? What are the st<strong>and</strong>ard port numbers for SMTP, POP3,IMAP4, RPC, LDAP <strong>and</strong> Global Catalog? What are the IP address ranges for class A-E? 5. What items of information would you request from auser to effectively address a technical problem? What comm<strong>and</strong> do you use to force the client to giveup the DHCP lease if you have access to the client PC? What’s the difference between forward lookup <strong>and</strong>reverse lookup zones in DNS? How do you breakup a broadcast domain?415


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download?If you were setting up a new PC for an existing userwith <strong>and</strong> existing a PC what steps would you gothrough?Name key files or directories on a Windows systemthat should always be backed up.What are some things to troubleshoot for an I/O errorreported in your backup logs?Scenario Questions*A call comes in to the help desk from a user statingthat no one in his or her building can get logged on.<strong>The</strong> PCs in that building are plugged into a switch <strong>and</strong>then connected to your building with routers over a T-1 line. What do you do?Fifty new PCs are to arrive within two weeks, <strong>and</strong>you're tasked with installing them. You have a staff offive people. Describe how you would take this projectfrom beginning to end.A call comes in from a client that is irate because it hasbeen 3 hours <strong>and</strong> his/her problem hasn’t been fixedyet. Describe how you would deal with this situationstep by step.What is DHCP <strong>and</strong> how does it work? What is it usedfor?What is DNS <strong>and</strong> how does it work? What is it usedfor?Describe what a netmask is. How does it work?416


<strong>The</strong> <strong>Best</strong> <strong>NOC</strong> <strong>and</strong> <strong>Service</strong> <strong>Desk</strong> <strong>Operations</strong> Book Ever!What’s on the Download?*Special thanks to Kurt Sippel from Applied Tech Solutions417

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!