Solved

config data accuracy

Posted on 2014-11-13
2
95 Views
Last Modified: 2015-01-29
can anyone explain the risks you would face (perhaps with examples) if the accuracy of the data in your configuration management DB was out of date/inaccurate? say for example in the context of desktops, servers, and network infrastructure. I am new to ITIL and work in a risk section, not IT, so some real world examples of the problems would be very interesting.
0
Comment
Question by:pma111
2 Comments
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40439718
That is one reason why Microsoft developed DSC (Desired State Configuration) which when a server is configured using DSC starts to drift from its baseline it will be reconfigured back to baseline.  One usually wants machines to act in a predictable manner say for instance an admin decides  that their web server doesn't need a web service so the web team deploys something onto that server (that works on every other server) that happens to need that service.. A third admin may be called in to troubleshoot and it may be hours wasted.  What we want is  every machine to act identically given a specific set of inputs.

The same goes for user machines.. we want each machine to act identically under a given scenario, if machines drift from the baseline one gets into the realm of 'it should work' rather than it will work since it was a tested configuration.  The aim is for every user to be able to logon to any machine and be productive right off the bat.  This is especially important in a disaster recovery situation

Configuration Manager is simply a tool and if it is out of date, poorly maintained,then the tool is useless. One is left in the 'I don't know' rather than 'Here it is' situation
0
 
LVL 3

Author Comment

by:pma111
ID: 40442042
Thanks but I was more talking about configuration management, i.e. the ITIL process, as opposed to the software.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now