Information Technology Service Management (ITSM) Processes. 1) Service Request Management Focuses on requests and responses for the IT help-desk items. The processes should be established and uniform. To reduce the workload on agents, organization may consider implementing self service options or chat-bots. 2) Service Catalogs Generally Service Catalogs is a central location/webpage with all the details for contacting the help-desk. It may also contain the self service options and solutions for common problems/issues. 3) Knowledge,Policy and Procedures. This is the knowledge base which controls the collection, maintenance and distribution of information sharing throughout the organization. It shall include the policies, standards, guidelines and the operating procedures for each process or tasks. 4) Incident Management. Defines process on how to handle a situation when an incident happens and how to fix the situation in an accelerated and organized manner. The objective is to reduce t

Feel free to share. Happy learning.
Preparation Notes
- Microsoft Azure Services #Index
- Scaling Up/Vertical Scaling vs Scaling Out/Horizontal Scaling.
- What are Azure availability sets?
- Difference between Azure management groups, Subscriptions and Resource groups
- Azure Active Directory : Overview.
- Azure Active Directory User Types and RBAC built-in roles
- Azure Active Directory User Source of Authority (SoA)
- Application Registration in Azure Active Directory
- Azure Active Directory Identity Protection.
- Azure AD Connect Overview.
- Azure Front Door : Overview.
- Hardening your Azure cloud platform and best practices.
Security Documentation Glossary.
- Azure Well-Architected Framework
- Introduction to Azure security
- Azure security documentation
- Using customer-managed keys in Azure Key Vault with Storage Service Encryption
- Start using Azure Active Directory Privileged Identity Management
- Privileged Identity Management documentation
- What is Azure Security Center?
- Azure Security Center documentation
- What is Conditional Access?
- Microsoft Security Development Life-cycle
- Azure Information Protection documentation
- Azure Sentinel documentation
- Azure Key Vault
- Azure Security Center for IoT documentation
- Azure Dedicated HSM documentation
- Azure DDoS Protection Standard overview
- Microsoft security architecture recommendations
- Become an Azure Sentinel Ninja: The complete level 400 training