Monitoring and Event Management in ITIL 4

Home > Blogs > ITIL / COBIT > Monitoring and Event Management in ITIL 4

Monitoring and Event Management in ITIL 4

Like This Blog 0 Mark Thomas
Added by February 28, 2019

This content is from our ITIL 4 Video Certification Training Course. Start training today!


Monitoring and Event Management in ITLI 4 is an important practice for us to understand. The definition of an event is.

Event: Any change of state that has significance for the management of a service or other Configuration Item (CI)

For example, I monitor and manage multiple data centers. One of the things we had to monitor was the temperature inside these data centers. If the temperature rises too high, then we were going to have issues and problems with our gear.

We buy this monitoring tool, called a thermostat. The thermostat doesn’t know what it’s supposed to do when we first install it, we need to program it first. For this example, thermostat need to be set to keep my data center at 70 degrees Fahrenheit.

Now that it’s set to 70 degrees, it’s acceptable for the temperature to go up one degree up or down on degree, because that’s the acceptable variance that the data center will remain operational. If the temperature goes up to 72, that monitoring tool (the thermostat) will trigger a response. That monitoring tool will then react by turning the air conditioner on so that it comes back down to the acceptable requirement.

What we just did is avoided an incident through monitoring and detection. It was able to see an event and actually brought the temperature back down into a zone that was acceptable. Now, if that temperature hits 73 degrees, that’s beyond the programed threshold, now the monitoring tool kicks off a message to my Incident Management tool.

Based on what that message is, my incident management tool can recognize the incident type and priority and then automatically create an incident ticket and routes that to appropriate parties. It’s a great way of looking at Event Management.

In organizations today, we have monitoring tools that are monitoring everything, from temperature, to application, to storage, to capacity, to uptime, to security.

Monitoring and Event Management Purpose:

Systematically observes services and service components and record and report selected changes of state identified as events. Identifies and prioritizes infrastructure, services and business process and information security events. Establishes the appropriate response to events, including responding to conditions that could lead to potential faults or incidents.

Events are typically recognized through notifications created by an IT service, CI or monitoring

It is important is to understand from the above purpose statement, that Monitoring and Event Management are systematically observing services and my service components, so that they know what the threshold is, and that tool knows when we need to be alerted, and it knows when we’ve breached some type of threshold.

They record and report selected changes of state as events. For example, you could now go look in the log files. Those are events that are recorded, identified and prioritizes infrastructure, additional services, business processes and information security events.

Security teams pioneer their efforts around Monitoring and Event Management and establish the appropriate response to events, including responding to conditions that could lead to potential faults.

Finally, we place Event Management in front of Monitoring because we need to know before that incident takes place, so that that monitoring tool can trigger a reaction that removes the attributes of a potential incident coming up.

The key to understanding Monitoring and Event Management is to systematically observe and be able to help us react faster so that we can close incidents earlier or avoid those incidents altogether.

Mark Thomas – ITIL and COBIT Instructor
ITIL 4 Certification Video Training Course
Interface Technical Training

 

ITIL® is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo™  is a trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

Videos You May Like

Agile Methodology in Project Management

0 114 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 496 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 478 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.