ITSM articles
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Articles

ATF Server Side Script Step for Change Risk Assessment [HOWTO]

ServiceNow do not provide in the change process the Risk Assessment calculation via ATF. Without risk calculation it not possible to proceed to the next step. Also, it is not possible to interact with the popup window of the questionnaire and to pres...

sergo11221 by Tera Contributor
  • 1940 Views
  • 3 comments
  • 3 helpfuls

REST Message: Create an Incident and fetch the incident number and sys_id from target SN instance using POST HTTP method

Scenario: Create an Incident on the target SN instance and fetch the created incident number and sys_id from target to source SN instance using POST HTTP method.   1] In the source SN instance on the Incident form: Configure -> Form Layout -> Add Cor...

find_real_file.png find_real_file.png find_real_file.png find_real_file.png

Configuring Assessments and creating stakeholders

Hi, Appendix for this article can be found Here We use assessments to evaluate, score, and rank records from any table in the system. In this article we shall see how to configure assessment, create stakeholders and then generate assessments. Step 1:...

find_real_file.png find_real_file.png find_real_file.png find_real_file.png
Hassan Ahamed by ServiceNow Employee
  • 3766 Views
  • 7 comments
  • 6 helpfuls

What is IT Change Management

What Is IT Change Management? Article by Don Hall  Change types (servicenow.com) Information Technology (IT) change management is a structured process for reviewing proposed IT system or service changes. This process occurs prior to implementing the ...

ITSM Standard Welcome Guide

Welcome to ServiceNow®IT Service Management Are you ready to start your ITSM implementation journey? This guide gives you valuable information you can share with your team, including proven guidance and links to key resources—all designed to set you...

find_real_file.png find_real_file.png find_real_file.png find_real_file.png

ServiceNow® Virtual Agent Deployment Guide

Congratulations on activating Virtual Agent!Are you ready to give your users instant service anytime and anywhere? Looking forward to a boost in agent productivity? We thought so—and we’re here to help. Here are some great insights and resources to...

ACL

ACL(Access Control List) An instance uses access control list (ACL) rules, also called access control rules, to control what data users can access and how they can access it.(Simply restricting data) ACL rules require users to pass a set of requireme...

Top Contributors