Page 194 - Courses
P. 194

IT Essentials — Computer Operations

            Abended Jobs

            The details of the runs are captured in log files. Exceptions, known as abends or terminations, should
            be logged, and appropriate personnel should be notified. There are three common reasons files
            abend:

                 Disk space is not available to complete the backup.
                 File expected is not present.
                 File expected is open and locked so backup cannot occur.

            Jobs that abend can be restarted once more space is allocated, the file requested is available for
            backup, or the job is updated to exclude the file in question. Terminations (i.e., the job stopped
            before it was completed) typically happen when the allocated time to complete the backup is
            exceeded.

            Restore Services

            Restore  is the term used to describe the process of taking a file currently located in some sort of
            secondary storage, and placing it back on the network for user consumption.  Users will contact the
            help desk directly or through the self-service tool, requesting a file that may have been accidentally
            deleted from primary storage or may be archived. Computer operations will then need to run a job
            to restore the file.

            If computer operations fail to identify, notify, or follow-up on unsuccessful backup completions,
            future restore requests will fail or provide incomplete data.

            Network Activity Monitoring

            IT operation activities typically include the monitoring of critical devices and services. Most
            computer operations centers include a wall of screens to provide the operators and help desk
            personnel with a clear visual on the status and alerts for each critical system.

            If configured, an alert sounds when network congestion is detected or a service fails. The computer
            operations center should follow the instructions located in the knowledge management module of
            the service management tool. If they cannot resolve the exception, they will create a problem ticket
            and assign it to second-level support for further analysis.

            Managing and Monitoring Software

            Computer operations should manage and monitor the use of all types of software within the
            organization. This not only avoids licensing violations and fines, but also better ensures
            unauthorized software is quickly discovered and either added to inventory or removed from the
            network. The inventory also helps to identify what devices require patching.



            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   189   190   191   192   193   194   195   196   197   198   199