Workshop Guidelines Your participation is key to success Be open, honest, direct and concise Be prepared to take ownership of items requiring further action If it isn’t written down it is not clear Build consensus Silence is concurrence Avoid fixating on "how we do it today" and instead focus on the business drivers for our process steps No idea is a bad idea Issues and outstanding items will be recorded in a ‘Parking Lot’ Notes will be taken during the workshop
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
The information in this document shall not be disclosed outside BMC Software and shall not be duplicated, used or disclosed in whole or in part for any purpose other than to evaluate the information as provided. BMC Software and the BMC Software logo are registered trademarks or trademarks of BMC Software, Inc.
Purpose: to identify gaps between ITSM Asset Management out-of-the-box and the [Company Name] processes and procedures.
Define Configuration/Asset Management Roles and Responsibilities Define Asset Lifecycle Establish CI Ownership Policies Review the Configuration Item and Configuration Component lifecycles Review Configuration/Asset Management activities and procedures Establish guidelines for updating the CMDB Review Base Data used by the Asset Management module Determine scope, depth and breadth of CMDB Identify source(s) of initial CMDB data Identify Reporting Requirements Identify Integration Requirements
Asset Admin Asset User Asset Viewer Purchasing User
Receiving User
Manage CIs •Read Access•Write Access to CIs user supports(Includes ability to Create- Contracts- Configurations- Costs- Schedules- Outages- Returns- Work Info - Impacted Areas
Asset Admin Asset User Asset Viewer Purchasing User
Receiving User
Purchasing No Access No Access •Write Access to Purchase Requisitions (including Line items) that are assigned to your support group.•Write Access to Purchase Orders
No Access
Receiving No Access No Access No Access Access to all Receiving functions
In order to minimize modifications to the Atrium CMDB, the ITSM 7 Foundation base data structures were mapped to existing ITSM 6 data structure fields already in the CMDB.
Determine whether the ITSM CI Store must be synchronized with the Atrium CMDB for use with other applicationsIdentify any automated tools that will be used for populating or auditing the CMDBFor any required integrations, define:
Data to be transferred Mechanism of data transfer Direction of data transfer Frequency of data transfer Exception handling
Identify user(s) who require Asset application permissions and Functional RolesIdentify the process to request modifications to the CMDBIdentify Data Requirements
Product Catagorizatoin for CIs and Components CI Attributes CI Class and CI Type menus Approval Rejection Reasons
The Contracts functionality was re-written to create a contracts sub-system, so that other applications can reuse or extend it’s functionalityFive Types of contracts with AM
Warranty Support Maintenance Lease Software License
Fields added for: Customer structure: Company -> Organization ->
Department Contract Support Group: Support Company->Support
Use a lease contract to track details associated with leasing equipment.
For example, if you lease several servers from one company, you might have a master lease contract that shows the general terms and conditions, and subcontracts for each server.
Software license compliance can automatically track usage with a combination of PDEs and Software Contracts
When a CI is created that matches the exact six-tier product and class categorization of the product dictionary entry that is related to the contract, the contract will be automatically related to the CI.
Product Dictionary & Definitive Software Library (DSL)The DSL is a central repository of approved product dictionary entries (PDEs) used for application recognition
PDEs are the definitive or master names and descriptions of software applications
Any BMC application can use the DSL to identify a single name for a software application and its versions, which in turn supports software license compliance.
Includes over 10,000 applications (Windows only in this version)
Used by Marimba, ITSM & can be used for 3rd party tools» Marimba & ITDS – SW normalization» ITSM – pre-populate product categorizations OOTB
By default, each PDE in the DSL has an accompanying model and version form that contains the option “Requires Contract.” » This option is used by the software license management engine to
determine if the existing PDE must have a related software license contract.
Definitive Software Library (DSL) Repository of authorized and approved SW, versions, releases, etc.
» “Golden image(s)” Linked with Marimba Deployment Manager
» Location information & “channel” recognition
DSL data includes: ID, instance ID, name & description Type (Marimba package, source control, etc.) State (active, inactive, etc.) History Location Size Support contact info Dates (create date, modify date, etc.) Attachments
Total cost of ownership Per Gartner Group, the purchase cost of an IT asset represents approximately 30% of the total cost of owning an asset TCO is a concept introduced to track these additional costs
Multi-currency support Ability to input costs in multiple currencies Configure the “functional” currencies available for conversion (for reporting, etc.)
Five Charge-back reports (Crystal Reports) Charge-back Invoice
» Provides a detailed list of charges for the cost centers or business units. Charge-back Summary
» Provides the total costs of the charges made to cost centers. It shows three types of total costs - Total Direct Cost, Allocation To and Allocation From.
Cost Incurred by Source » This report is similar to Charge-back Summary Report except the
charge-back percentage is not added to charge. Unallocated Reports
» Provides of the list of charge-back entries that falls under the default cost center. Adjustment Reports
BMC Foundation DiscoveryAutodiscovery of network connected devices - detailed hardware attributes & software inventoryPowerful query capability for any device & new tabular viewsExportable table views to a file in a variety of formats (PDF, Excel, RTF, HTML, and CSV)Integrates with the BMC® Atrium™ CMDB
What is BMC Foundation Discovery?Foundation Discovery
First Cut – “What do I have?” “How can I monitor what is deployed?”
Agent-less device discovery/inventory Detailed hardware attribute discovery Software inventory based on registry information Network device discovery
Enable IT managers and network administrators to quickly determine hardware and software inventory positionsReduce TCO of network elements
Reduce end-user support costs by providing help desk personnel with details that enable them to remotely troubleshoot and correct problems
Provide asset managers with auto-discovery of everything connected to the network
An agentless discovery solution that is easy to install/easy to use, FD polls the network using IP address ranges and a “ping sweep”/scan of used ports, returning detailed hardware and software information found in the Registry, NETBIOS, Secure Shell, and WMI stores of connected devices. It also returns data, via SNMP, on the switches, routers, and hubs existing in the network.
FD discovers devices across all platforms, returning data to the BMC Configuration Management Database (CMDB) so other Service Management processes can be supported as well, i.e., Asset Management & Change Management, as well as broader service management initiatives such as Change and Configuration Management and Business Service Management.
Asset and Port InventoryInventory discovery type Discovery method Required credentialOS fingerprinting TCP Port Scan (nmap) NoneAsset InventoryHardware SSH /Telnet (for UNIX systems only)
WMI ( for Windows systems only)UNIX root account*Windows administrator login*
Installed Products SSH /Telnet (for UNIX systems only)WMI ( for Windows systems only)
UNIX root account*Windows administrator login*
Patches SSH /Telnet (for UNIX systems only)WMI ( for Windows systems only)
UNIX root account*Windows administrator login*
Related queries Application inventory Cluster inventory Database inventory Device inventory Server inventory System inventory
Available Configuration Item reports include: Configuration Items by Status All Configuration Items CI Component List
Available CI Availability reports include: Open CI Unavailability by Scheduled or Actual Dates Completed CI Unavailability by Scheduled Dates or Actual Dates
KPI targets and measurements for Availability include Availability Percentage, Duration and Summary Availability Statistics SMO Percentage