新機能を知りましょう:ITOMヴィジビリティ&クラウドアクセラレートの最新機能のハイライト
ServiceNow Community
·
Mar 31, 2025
·
video
Good morning, it's time so we will start today's webinar. Before we begin, I would like to mention that we will be holding this webinar in Las Vegas again this year, so please register if you would like. Once again, today's seminar is a webinar, I'm sorry, so in conjunction with the store release of iTomboti and Cloud Accelerator Q1 and the new features of the Yokohama release, we will be holding this live on-demand service webinar. Welcome, and once again, my name is Naga, the outbound product manager, and I look forward to your continued support. I think you can probably see my screen, but if there are any of you who can't see it, please let me know. This is the usual safe harbor declaration regarding the roadmap, so there will be some overlap, but if there is any information included here, we will definitely protect that information as a service. Or rather, since it is a node map, that is what has been said, so it is a little bit of a legal declaration. Well, this live on service is, as always, not just a variety of products, but it is a webinar where we will be communicating about various products. Well, there is also something global about it, and there are also overseas products, so this link, you can just take a screenshot, but I have also shared this link in the chat. And then, as a little bit of housekeeping information, at the end of the first session, we will set aside time for answering questions, so please use the Q&A button to ask any questions, not at the end, but if you have any questions along the way, please feel free to post them in Q1A. And at the end, the recording will also be shared with the service community, so you can see past sessions. It has been shared with the community, so you can refer to it. During the recording of an event, or when you leave Tekken during the event, a survey screen will pop up, so please fill it in. In particular, there is a section for freely entering requests, so if you have any requests, fill in your email address and company name in addition to your name. After that, I will follow up with you, so I will contact you directly via your email address. I will definitely do that, so I would appreciate your cooperation. As for the gender, there are several things to cover today, mainly BGBT and Accelerate, which overlap a little, but there is one more new feature that was added this time, which I would like to introduce, which is AOPSIPS. Also, regarding Maganobu, there is a voting section, and there are some things that everyone would like to hear about, so lastly, there are some announcements. I will also be in touch with you about future nominations, so I would like to move on to this legend. First of all, BPTT, the products of the past three years, we have been introducing new functions, and we are constantly posting new ones, for example, Tokyo is currently the first in Tokyo, but in fact, before the patent was granted, there was another session, so from an ITOM perspective, it is not just family releases, but because it is a rapid development, we are releasing functions for each commercial station, and in that sense, the speed of this confidence has increased dramatically, so you can see that we are moving at a completely different speed than other places up until now. And the main thing this time, as I have highlighted in yellow, is file-based discovery using ACC, and the other is limitless ACC, which does not use limits. These are the two big things, and there is also a new function, which is the discovery service mapping. More patterns have been added, 27 more have been added, and I'd like to briefly introduce what we are using to add them. We use something called NoAssist, which is to say generation, and I would like to emphasize that we have been able to add new patterns to these 27 discoveries using only a commercial machine. In the future, therefore, our development team is accelerating the development of discovery patterns using NoAssist CSI, so in the future, we will be able to make these kinds of functions available to customers themselves. So rather than developing patterns by adding them ourselves using a system, we plan to use generation to speed up development in the future. And there is one more thing, which some of you may not use much, but there was a thing called the Visit Agent from Cuba Neris, but this was originally a Cloud door native observability, or native CNO. Starting with version 2, we have clarified the NatVisibiident, so the name has changed a bit. It did n't change yesterday, but we have changed the name to make it easier to understand, and we want to emphasize that it is truly for lending out Cubanedis. It can be a little confusing to know what cloud performance means, so we have clarified that. Now, let's go into the details. The next one is file-based discovery. This is the service's idea portal, and we listen to customer requests from there. One of the most requested features is file-based discovery, and we are now able to provide it in response to customer requests. Previously, file-based discovery was possible without the ACC agent, but this time you can also do it using the identity, so I 'll give you a brief introduction to what file-based discovery is, but generally, when software is installed on a machine, it always writes to the registry or to the package, but there are also pieces of software that aren't like that. I often use Windows, and I download it somewhere, and it digs into some file, folder, or directory, and it works without having to run an install shield or installer. There are a lot of pieces of software like that out there, and I think there 's a lot in Japan too, but with the traditional method, that kind of software can't be found by searching the registry or searching for packages, so this file- based discovery addresses that problem by specifying a directory folder and finding the software within it, and so this time we've added ACC to our software. This was added in response to customer requests, and what is particularly good for customers is, of course, that software, software installed through installation instructions, for example, for discovering vulnerabilities in installed software, or from the perspective of license management, which is extremely important. In that sense, by using ACC, you will be able to more broadly respond to such needs of customers, and so from a business perspective, this is an extremely important function. Well, it's simple, but in reality, if you use this app that I mentioned earlier, which is an installation app, or this new agent app, then all you have to do is make a few settings and get going. However, in terms of what the conditions are for the target, for example, ACC is running in Windows, of course it needs the authority to operate information in that directory, or to search and view it, so what kind of authority is this? It is necessary to grant a list of the full contents, and as you grant the security, it will be displayed as follows: If you find this, you can enable it. Well, I was able to pick up the Japanese screen, but I do n't have Windows, so it actually displays the follow-up content of the search action. I've just abbreviated it as it is in Japan, but if the user of the service running ACC has the authority to display this, then it's fine. Next, there is the support for M-less ACC, which is also a big part. Traditionally, the ACC agent had to go through the Mito server, but this is a very good configuration, especially for data centers, as there is a possibility that your own machines are not facing the outside world. So you can dismantle the Mito server and set up various subnets, for example, the Mid server is probably placed in the DMZ, and it contacts there and the Mito server goes outside. That 's fine, but on the other hand, it's a normal PC, and especially in sales, for example, when you often collect data from customers outside, or you work from home, so there is always the possibility that you won't be able to connect to the VPN, so you're working, and at times like that, it 's very inconvenient to have to upgrade the mid-server even in those situations. In reality, for such customers, the mid-server is very useful, as it allows them to do things without having to prepare it themselves, and ACC is a very big feature that can be handled like this, so in this case, the mechanism is very simple, and we put maintenance into the actual machine, and when communicating with instances such as this service, we invest in something called ICS, and by ICS I mean the IT Cloud service, and I'd like you to think of it simply, but basically, the mid-server itself is hosted by the service, and not the mid-server itself, but a mechanism like a mid-server is hosted in the service's own data center. So, customers do n't have to build it themselves, they can just contact this service and once connected, they will be able to connect to their own instance of ACC. As I said earlier, this is a very useful feature for customers who use PCs and the like. Previously, when I worked with other customers, we would have to do something, for example, put a mid-server on AWS or somewhere else, and the management would be very, very troublesome, so in that sense, it eliminates that kind of hassle. For customers, this is a very useful feature in terms of total cost management, in terms of TCO. Yes, let me introduce you to the screen I showed you earlier a little. First, let's go into ACC. As for my instance, this time, we have set up an instance called Hakkeijima, which is combined with Yokohama, and here it is. This is about discovery, but actually, when you do a discovery, you use this discovery configuration to find ACC files, and when you discover files, there is always a file-based discovery here, but it will be inside the folder you set here, and for example, you can find it by naming the folder, or by searching for which file in EXC with that extension, and if you put it in like that, then of course, when you work on that folder, if you give the service running ACC the authority to display this folder, it will automatically find it, so I think it's one week, the default is one week, so you can set it to search the folder, so of course, depending on the customer, you can make it a little shorter, for example, by setting these parameters to make it shorter, but if you make it too short, it will put a strain on your PC, so you need to think about the balance, and it is possible to do that. So when you find it, as you all know, when you run ACC, you always run this policy, for example, file-based backup policy and discover policy, so it looks like this, it 's probably distributed like this, but it's very short, it's set to 300 seconds, but in reality it's set to be a little longer, once a week, so it goes like this, and then when you actually find this file, for example, it looks like this, it's listed in ACC, but it 's another file, for example, this file, when there's a software called an exe, it will tell you, " This is in this folder," and you can find out how big the file is, and you can immediately find out which PC it's installed on, so for example, if we look at the agent that I mentioned earlier, the mid-range Let's take a look at it for now, especially when it comes to mid-reception, it's very simple, there is an agent registration key, and here it's called light gateway, and this key doesn't change, but you must set the key like this, and then next there is an agent download, and here, to the new motherboard, you can apply to configure your instance so that it does not require mid-reception, in reality, your instance will be configured so that it does not require mid-reception, rather than it being a default, so please raise a ticket and configure it to be mid-reception, and then for example, my current instance, which is called island, will always have ICS running load balancing before it, and this command will also come up, so here there is a command called withoutme, and all you need to do is download this, and as you download it, it 's a single-line installer, so let's take a look at this once, Well, the way it's set up is as follows: here is the instance name, and at the back it 's a little hard to see, here I'd like to make it a little bigger, excuse me, yes, it's something like this, um, where do you parse this file? Well, as it's written here, this is the destination we were connecting to earlier, what is it, it's set up as the URL for AICS, so each of us has one for each region, so this is America, I think, and there 's another one, and there's also an AP, and these three locations have this load balancing, and there's this ICS, and then your own key, which we saw earlier for this instance, excuse me, is it this side, yes, this key, and when I say this key, the copied key is the same, so it's this key, and so where is the instance, you enter that, and the installer will generate and run it, and then it will install ECC, and you'll see that ACC will connect to this ICS, and then the IC will start working. Now, let's take a look at these simple things. Yes, let's move here a little. Yes, if you install this like this, then if we look at what moves the ACC edge, excuse me, for example, here, the bottom four go through the mid server, right? These are mostly servers, but there is no mid here. That means that it is not directly connected to the instance, but it looks like it is directly connected, but it goes through ICS. But, like this, it goes in like this. For example, if we look at one computer here, it might be here, yes, this is a computer that is being used, but this is probably a Mac, I think it is a Mac, and this file, the actual file from before is not visible, so shall we look at Windows ? Is it the other side? Yes, the sponsor is not over there, wait a moment, is there no PC? Did you drop it? Let's look at the cost information for now, and is this something that ACC will find? Yes, that's right. This is the file information for the work. This file information is directly found in the base of this file. For example, you can put in a random file name like test HTML, and when you want to test it, it is found like this. So it can be anything you put on any floor, but if you put it like this, it will be found. For example, openSSL. Ruby is something that works, so if you don't install it, if you put it in there as is, it will be found. Yes, so this time we used ACC, which is a file-based capali, of course, and mid-less ACC, which I've introduced briefly. Next, we have the cloud accelerator, which is similar. Last time, in Q4, I think it was around November or December of last year, and the content is a little similar to that, but there are two, one is the cloud account management and the other is the cloud line instimeter, and which one is which? It has n't yet been officially released, but it will be soon, and we are working on this Innovation Lab, which we are reading as the LV3V2 release. Cloud computing is very important, so customers are increasingly adopting things like AWS, but within that, there are risks and compliance is very important, if you don't meet the requirements, you will be exposed to risks and there may be information leaks, so this is a function that is particularly necessary for customers of banks and other churches with strict regulations. Within that, they create their own accounts, parent accounts, and distribute these in various ways, but how many of these accounts are used? In my case, one customer created thousands of accounts and distributed them, which is a common story, but once they are distributed, is it really okay? Are they being paid properly? If someone is in charge and the person in charge is gone, for example, The owner in charge will check, and which service is this account connected to? Or from the perspective of cost and risk, these are things that need to be considered, and in that sense, there is a function called Cloud Account Management that allows for all this management all at once, so I'd like to emphasize that, for example, by using both Aziru, each account does this, the owner does this, and the cost is this much, and so on, you can see all of this at a glance, so up until now, customers have had to manage this information in Excel or some other way when using AWC Agile, but there are also some functions like that in this dedicated AVS, but just cross-accounts, especially when you're using two accounts at the same time, or when you're using GCP and three accounts, the simple methods are different for each, so you can see everything on one screen Being able to see and manage it is very important, and one of the major points is to regularly check the various configurations within the cloud account, for example, to see if a password has been set, and to check whether the package and SS3 are encrypted, and to periodically check things like that. Also, things like that regarding the account funds are already being authenticated or proving, and a series of such operations are being made into a workflow. This is something that is unique to cloud services, but all of these things can now be done within cloud account management, so it is currently attracting a lot of attention, and many customers have consulted me about such cases. Next, the cloud license estimator. This is a service that is very useful not only for internal sales people, but also for customers, as it is very useful for calculating the number of SUs, that is, how many resources are in one's license, or cloud account, and how much it will cost in terms of item licenses. This can now be done very quickly, so there is no need for discovery, you just access it through the API and it pulls the information, so you can easily get information on how many licenses you have and how many resources you have, and so on. This is also an I release, so if you have any requests like that, please feel free to download it, as it is now an I release, so anyone can use it. But of course, with the release of the Innovation Lab, it does not have to be a production environment, for example, you can apply it to a server environment or a test instance to check operation, so I think it is fine to use it. Next, we will look at the RIP function, which has a name that sounds a bit similar to AIOPS, which I always explain in another session, and it just so happens that the team that developed it is one of the visibility teams, so it is the same as the one I mentioned earlier, Bibiri and Cloud Accelerator. From my perspective, it looks like data, but the nuance has changed a little, so this AIops playbook is what makes this playbook easy. It's written here as an enhanced automation playbook, which means that learning has been further enhanced. In other words, the response is, "I'll explain this a little bit. This is machine learning plus Now Assist, which uses machine learning to detect incidents in IT operations, particularly among various customers, and there are many incidents that arise from IT operations, and if they are not incidents of customer inquiries but obstacles to transportation, the data is analyzed and automation options are found. Then, all the steps up to the resolution are automated. So, why did we create this? Up until now, customers have been thinking about automation or zero-touch operations, on what basis do we find these? Well, the general idea is that you just need to do this. Then, using the law of reduction, or by finding and searching for incident information, referencing the information for each incident, and writing down everything, and then compiling it all together, you have to do it manually, but this takes a lot of time, so if you use this Alilip, the automation person can use machine learning or machine learning to automate these steps and improve automation, so if you use this real data to find potential automation opportunities in IT operations, you can expand the scope of automation more quickly, and speed up automation. Of course, this is directly linked to the efficiency of IT and the shortening of AMTTR, so in the Alilip, you can see how much cost can be reduced, and how much cost can be reduced by automating this, and there is a calculation or a guide. It will be displayed, so for the art side, for example, if you say to the president, "By automating our IT operations to this extent, we have been able to reduce costs by this much," or "We have made this much of a contribution," it will be very useful when you want to appeal to them. So, I have introduced a little bit about the background and the effects here, but let's take a look at how this is actually done. Yes, here we have a lot of customers who use the closed incident service, and since Mao's 10 has been with ITSM for a long time, almost all of them use ITSM, and the males are very high. Among these are ICD IT incidents, and we run processes like this every day, but there are many closed incidents. For these closed incidents, first of all, we use machine learning to perform clustering. Clustering is what it means to combine similar incidents, so we group them like this. Then, we cluster them, and then we do this. The Assist is still running in the background and making reservations for the clustered items. Then, using that, it automatically finds which ones should be automated, and automatically prioritizes them. By priority, we mean, for example, the importance of the item, or how much time it took, and so on. It considers various factors and prioritizes them in this way. It also gives an estimate of how much cost can potentially be reduced, and adds this to the automation objective, which is displayed as one step. Next, we use the Assist to create a step of this level. is the resolution step on the right side, and this is also input prototyped from the task name and resolution name of the related incident in the objective that the Assist found earlier. The Assist goes further like this. It will summarize the information like this, so it will stop at the solution step. Then, the actor can immediately see the steps to make, "Why not make this?", and of course, from there, you can create a problem record. This is, of course, an IT approach. But, since this much intelligence has been generated, there must be some problem. You have to pursue the root cause, and then you can ask, "Should we make it as a problem?". Next, you can use this solution step to generate the automatic pre-book using the Playbook Assist, and automate this. This is one of the assist functions, and we will use the Playbook Assist, which is written a little further down. But this Playbook Nasist is an assist function that includes everything other than the necessary lipstick, so if you add this and create it, using the Playbook, of course, what is SOWSOW this time? It 's not the S, it's the service service OP workspace, but SOW. If an incident is found from the GUI of the Service Operation Workspace, this reply can be called up from there, and all of the resolution steps can be automated, and the operator or the person in charge of the incident can immediately understand that if this is the incident, then this automated procedure is fine. I'll show you a demo later, but of course, this savings, as I mentioned earlier, will automatically output a dashboard, and you can then take that and explain it on the vulnerability site, and so on. Well, this is a slightly simpler summary of the two slides I showed you earlier, but looking at thousands of incidents in the past, closed incidents, it first finds the option list using machine learning and nurses, as I mentioned earlier. These topics are piled up one after another, and each topic is further automated using the playbook assist I mentioned earlier. Using the same method, you can create a playbook and include in this step, what if? For example, you may need to connect to another system or log in to a server. It's common to have an orchestration-like workflow where you can directly access another system via API, or log in to that machine and access SSH, and then you can go further and create a text flow. You've probably heard about this in various seminars on services, text flow is a term you enter and it automatically creates a flow, so with flow automation, it's possible to automatically generate the flow below the previous pull-out, the flow designer flow, which is the flow that we saw earlier. This will allow for more advanced, faster, and more efficient automation. So when an operator opens an incident, there is a lip button here, and if it is this incident, they can click on it and it will be executed. Or the content returned here can be communicated via guidance, but there may also be cases where it is automated twice. There are a lot of things, but this lip will tell you all about those steps. So in the end, it will explain things like how much critique there is, which one will be done, and how much cost can be reduced by doing that. All of this will be possible on one page. So to summarise, there is another type of machine running other than CSI and machine learning, and this can be specified and picked up as an automation, and if you want to automate the steps further, you can do text flow. That is the concept behind this lip, and of course, we use CCAI, so in terms of licenses, we need the IT Professional Enterprise Plus that is written here, and then the corresponding store apps, etc. Or, for that instance, patch 5 or above will enable it to be supported, so yes, so it will be installed in a little while. Well, yes, this is another instance, my instance, but here, you already have a lot of pseudo- test-like incentives in your own instance, but this time, when you install this AISP, after a while, it will automatically automate this instance like this, and it will find the opportunity top. For example, it will show you how many critical ones you have done, and how many high priority ones you have done, and then it will show you how many records there are for each, and how much cost you will create for each of them, and it will calculate all of these things, so it will show you the response time for all of these incidents, and of course, how much the response time will change in cost for one hour, and so on. When you look at it like this, for example, a common one is inquiries, For example, an incident may be an incorrect DHTP address, which is a misconfiguration. This is very expensive, and records show that this has happened in the past, and the cost for three years is high. For example, here you can see that there are no updates for the antivirus software, or that there is not enough disk space. All of these types of things are found by the RIP, so it is no good for the architect or the op-artist to think about each and every one of them, as it is only a subjective viewpoint and they actually have to look at all of the actual data. However, instead of finding all the data by themselves and calculating each piece to see what is the best thing to do, the RIP will automatically tell you this, and you can then tell the person in charge that, for example, this So when you update the SL server, it seems like you should do it like this, and when you click here once, it will find the Cyst AI inside and start working on it, but for example, the Lysine step, for example, will use SS to create a step, and when you click "Shall we create it?", you can see that it took a while, so you will be able to do it a little later, but while you are creating it, you will be able to look at another thing a little later. Yes, yes, here I have written down the steps, as I said earlier, right? Yes, here the steps are written, and as I said earlier, CCI will find things like the names of solutions to past incidents and will list them up, and of course it will bring up these 1234517 steps, but it is also possible to say, hey, maybe this step is not necessary, and as I said, this is common, so you can create a Prom record and request the cause of the problem, for example, You can send it to an expert and say, "Let's solve it," or "Let's find a fundamental solution to the problem," and then here, the crate trip, from here, you can create a real, you know, pre-book, 17 steps, but you can chain them right here. A workflow studio will appear, and in the workflow studio, you can create a flow, or rather, not a flow, but these steps, and you can find and create them. As I said earlier, the steps from 1 to 17 are like this, right? Yes. If there are parallel ones among them, they can be normal ones. For example, before my other item, I made this, it says, " Performance is a shoe p and such," but I made it like this, and I didn't change anything about it, so you can do it like this and like this. In this way, you can create steps to solve the automation steps, and of course, you can break them down even further into flows. From there, you can further create it with a text flow, for example, if we go like this, it 's a type of Perfunsu type RP, and we go like this, next, for example, in the incident SO section, if we go a little further, there is one more thing here, I think I made one more thing for a computer virus, but there was also another lip that was created, and for example, this is, of course, just something like, there was another phone call, and by using that, how do you view it, for example, the type of virus reported from event management, or the wireless lap, you can tech it, and then save the incident here. Yes, here, this lip will appear on the right side, and the previous one is the lip for the computer virus help request that I made, which I made a little bit inside, so click on it, and then this operator Or the person in charge of that service will do this step. For example, first find it, apply ice-screening, scan it, and after that, do these steps. These are the steps that you must take when dealing with this virus, and they were created by the RIP, so this person in charge just needs to do this step. Of course, there is also a workflow car, and if you go further, you can have a mode where you just press this button to do the work, and so on. This kind of thing was created by the RIP that I introduced here, so when it comes to automation, one big thing that helps a lot is the AI opslip, and I hope everyone will remember that. Another instance is here, for example, this report, which can be reported to the CIO or CEO, for example. It can show how much the total cost savings was, how many tickets were solved, and how much the RIP solved. We were able to reduce costs, for example, as you can see here, there is something like SND, or there is an SN login view, and so on, all of these things related to IT. If we use this lip to create automation steps, we can reduce the costs. Finding such automation steps is what is included in the lip. Yes, so finally, I would like to ask everyone if it was here. Please wait a moment. Here, everyone, um, something has gone a little strange. Okay, so there is something I wanted to ask you. It seems like all the settings here are not working properly. Yes, it's strange, isn't it? Yes, I think that I just explained what I explained today, and I'm sure you all can see it, and I'm sure you are interested. Thank you for your answers, but will you wait a little longer? I have given my answer, but I would like to share a little bit with you, some of it, not everyone yet, but my publication is... So, the results are as follows, but Lip is the most common, and then there is Cloud Account Management and then Mitres ACC Management. And then there is another thing, this one, but I can't get it to work, but it's fine, I can't get it to work, but actually, there is one more thing I wanted to say, which seems to be useful to Kitasato, but if you have any, I would appreciate it if you could contact me, Fieldwork, and finally, there is other information, and next time, we will provide that information again, as there will be such things as AIs, so we will also explain the next AIOs workshop, which is a webinar, so I would definitely like you to participate. We will be holding a webinar on the 3rd of April, and then in the latter half of May, in Q2, it's a bit early, but I will be back in the latter half of the month, but new functions will be released, so we will also be providing more Japanese ones in the latter half of the month, so I would like to ask everyone to participate. Thank you very much for participating. Yes, it seems that time is a little short, so if there are any questions, I will delete them, but I don't think there are many. Finally, I would like to ask you to fill out the questionnaire, and as I said earlier, if you are interested, please fill out the questionnaire and I will follow up with you later. Thank you very much. Yes, that 's all. Thank you very much.
https://www.youtube.com/watch?v=WAiHoP07mwg