Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Configuration Management overview
- Configuration Management tables
- Configuration item maintenance history
- Searching Configuration Management
- Generating a large number of incident records
- Service Portfolio Creation
- Service Inventory
- Service Asset & Configuration Management (SACM) Reports
- Data Validation
- Configuration Management Access Control
- Service Portfolio Auditing
- Service Portfolio Notification and Escalation
- Service Portfolio Archiving
- Integration: Service Catalog And Knowledge Management Modules
- Financial Management
- Configuration Item Relationship Types
- Service Levels and Subscriptions
Service Portfolio Management Access Control
Service Portfolio Management leverages Configuration Management, which is controlled by security roles. These roles allow authorized users to create, modify, and close configuration items (CI). The system provides options for Never, Always, and When Assigned. For example, one user may be able to create and close CIs but only modify items assigned to them.
Access to functionality within each module is governed by Service Manager security utilities, which define access based on role and user.
Service Manager also provides a security control to segment data between multiple customers. “Mandanten” controls identify which customer data a particular user or group can access, update, or both.