Incident Management overview


The primary goal of the incident management process, according to ITIL standards, is "to restore normal service operation as quickly as possible with minimum disruption to the business, thus ensuring that the best achievable levels of availability and service are maintained." The mission of the incident management process is to resolve incident requests as quickly as possible in a prioritized fashion.

Some content is unavailable due to permissions.

is designed to support this goal.

Some content is unavailable due to permissions.

is typically initiated in response to a customer call, a service request, or an automated event. An example of an automated event might be an alert from a monitoring system, such as BMC Helix Operations Management (BHOM). 

Best practice
When dealing with incident requests, the following best practices are critical for success:

  • Prioritization so that incidents that cause the organization the most pain (such as lost sales or work stoppage) are fixed first. This approach conserves your resources, and uses them where they are most needed. 
  • Consistent recording of incident request details. These details are then made available to other applications, such as . This means that entries can be searched, analyzed, and communicated throughout the organization. 
  • Integration with . This information can be used both to resolve the immediate incident and to determine whether other systems might be affected.

An incident is any event that is not part of the standard operation of a service and that causes an interruption to or a reduction in the quality of that service. Normal service operation is the operation of services within the limits specified by the service target. When integrated with

Some content is unavailable due to permissions.

,

Some content is unavailable due to permissions.

monitors service targets. 

The incident management process also handles customer requests for service, such "I need a new laptop," or "I need access to this network resource." Customers can use  to enter service requests. If  is not available, your organization can use

Some content is unavailable due to permissions.

.

The following video (2:57) helps you to learn about

Some content is unavailable due to permissions.

in . 

icon_play.png https://youtu.be/hVUsAnHZcFU

Business value

provides an intuitive, social, and mobile service desk experience that enables a more knowledgeable and collaborative workforce organized around IT roles, not modules.
 acts as a single point of contact for user requests, user-submitted incidents, and infrastructure-generated incidents. The ITIL-compliant workflows automate the incident and problem management processes to enable IT to respond quickly and efficiently to conditions that disrupt critical services.

Some content is unavailable due to permissions.

 focuses on getting users up and running after disruptions.

Some content is unavailable due to permissions.

focuses on determining the root cause of a problem, and on using the  processes to correct the root cause.

The following graphic shows the relationship between incident, problem, and change management processes for user requests:

Apps_Relationships.png

Fast and efficient ticket logging

 provides a single interface to create multiple ticket types such as incidents, work orders, change requests, or service requests. Ticket creation is faster with a limited number of required field values, because of the following features:

  • Automatic creation of a ticket as you take notes during a customer call - The Smart Recorder enables you to take notes while talking to your customers. You can add the customer name, contact name, and affected assets by using special indicators in Smart Recorder, and the system provides a list of available options as you type your notes. Based on keywords in your notes,  starts to create the ticket in the background. After you finish taking your notes, you can create the ticket with the click of a single button.
  • Easy identification of users, related assets and incidents, and available templates while creating tickets - When you take your notes while talking to a customer, use special characters, and Smart Recorder displays a list of customers or assets available in the system. You can select the appropriate customer or asset as you type, and these details are automatically displayed in the ticket that is created. Based on keywords in your notes, Smart Recorder displays a list of available templates to use when creating the ticket.

Information for quick ticket resolution

When you take notes in Smart Recorder,  uses keywords to display resources that you can use to resolve the ticket, such as a list of related knowledge articles.

You can also use the Ask HelixGPT tab on the incident screen for a conversational experience when finding information that helps you resolve the incident. For example, instead of reading through the knowledge articles, you can ask specific questions on the Ask HelixGPT tab and get real-time summarized answers.

Easy collaboration and knowledge sharing

provides a chat application that enables you to communicate with other members of your team to get help or provide help in resolving a ticket. Create knowledge efficiently and collaboratively as part of the support role. When agents use Smart Recorder to record tickets, the system automatically searches for knowledge articles, making it easier for agents to use knowledge articles.

Mobile experience

You can access BMC Helix ITSM through your mobile web browser without any additional configuration. The changes already applied to screens through configuration or customization will also be visible in the mobile browser.  is available on mobile devices for classic

Some content is unavailable due to permissions.

screens. The mobile applications have most of the same capabilities as the web interface, and also include a few mobile-optimized features for scanning and receiving assets.

Knowledge article creation from incidents by using Knowledge Curator

Service Desk Agents can use the Agentic AI capabilities of Knowledge Curator to create a knowledge article in Failed to execute the [velocity] macro.
 directly from an incident. The description, summary, resolution notes, and activity logs are used to generate the content for the knowledge article, helping Service Desk Agents to reuse the information from the incidents effectively to create a knowledge article. When the article is saved, it is automatically pinned to the incident. 

End-to-end process

The following figure provides an overview of the incident request lifecycle. The incident management process consists of the following procedures for handling requests from users.

  1. Service desk analysts register incident requests for users.
  2. Service desk analysts and group coordinators assign incident requests to the appropriate specialists or change coordinators for resolution or implementation.
  3. Group coordinators track incidents to manage reassignment notifications or SLA escalations.
  4. Specialists resolve incident requests that have been assigned to them.
  5. After an incident has been escalated, the service owner of the affected service determines how the incident can be resolved in the most efficient manner.
  6. Service desk analysts resolve and close incident requests, and requesters can review incident requests that have been completed for them.
  7. When their approval is requested, group coordinators review a solution that has been proposed for general use.

Incident Management Process.png

How incident ownership is determined

Based on the following criteria, 

Some content is unavailable due to permissions.

automatically determines incident ownership when the incident request record is created:

  • Presence of relevant Incident Owner events in the Assignment Configuration (see Configuring assignments).
  • The default support group of the person who submits the incident request record.
  • The support group the incident request record is assigned to.

For example, consider the following support groups:

  • Support Group A has a support group role of Help Desk. The default support group of Person A is Support Group A.
  • Support Group A2 also has a support group role of Help Desk. Person A is not a member of Support Group A2.
  • Support Group B does not have a support group role of Help Desk; for example, it might have a support group role of Tier 2. The default support group of Person B is Support Group B.
  • Support Group C does not have a support group role of Help Desk; for example, it might have a support group role of Tier 3.

Based on these support groups, the following example events show how the incident owner is set when no incident owner assignment event is predefined:

  • Person A submits an incident and assigns it to Support Group A2 with the role of Help Desk. Ownership of the incident is set to Support Group A2 because the Assigned Group has the role of Help Desk. Otherwise, ownership of the incident is set to Support Group A, as it is the default Support Group of A.
  • Person B submits an incident and assigns it to Support Group A. Ownership of the incident is set to Support Group A because the group has the role of Help Desk.
  • Person B submits another incident, and assigns the incident to Support Group C. Support Group B becomes the owner, because Person B is the submitter.

 

Instructions for classic interfaces

View instructions for Mid Tier

 

acts as a single point of contact for user requests, user-submitted incidents, and infrastructure-generated incidents.  is the anchor product that enables you to get started with Service Desk Optimization.  consists of two features:

Some content is unavailable due to permissions.

and

Some content is unavailable due to permissions.

.

These ITIL-compliant applications automate the incident and problem management processes to enable IT to respond quickly and efficiently to conditions that disrupt critical services.

Some content is unavailable due to permissions.

focuses on getting users up and running after disruptions.

Some content is unavailable due to permissions.

focuses on determining the root cause of a problem, and on using the  processes to correct the root cause.

The following video (7:31) helps you to learn about the basic flow of the

Some content is unavailable due to permissions.

process.

Disclaimer

Although the concepts and procedures presented in this video are correct, the user interfaces shown are not current.

icon-play.pnghttps://www.youtube.com/watch?v=-nwIS66hsTI

How the Process Flow Status area displays the flow

The Process Flow Status area displays the flow of the incident request through the stages of the process in blue. The current stage of the incident is highlighted in green. The status of the incident is indicated by both color and text. At each stage, the diagram provides applicable accelerators. When you select an accelerator, you are prompted to enter the data required to complete the task. You can also enter optional recommended data in the dialog box.

Process Flow Status area.png

The following video (2:12) helps you to understand about the Process Flow Status area in

Some content is unavailable due to permissions.

.

Disclaimer

 Although the concepts and procedures presented in this video are correct, the user interfaces shown are not current.

icon-play.pnghttps://youtu.be/BPqgxrvTDSg

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*