- 04 Mar 2025
- 1 Minute to read
- Print
- PDF
Overview
- Updated on 04 Mar 2025
- 1 Minute to read
- Print
- PDF
Managing change effectively is crucial to maintaining service quality and minimizing disruptions to business operations. One key aspect of change management is assessing and mitigating the risks associated with implementing changes to IT systems. This is where the Configuration of Risk in ITSM Change Configurations comes into play.
The configured values as Risk on the Change SLA Configs is added to the Risk table data source. Which will further be used in the application in reference to this configuration.
To configure Risk on Change SLA Configs, perform the following steps:
Log in as an App Administrator.
Navigate to Design Studio > Change > Configurations > Change SLA Configs > Risk.
Click New to configure a new Change Risk.
Figure: Risk ConfigurationEnter the appropriate details in the required fields.
Figure: Risk Configuration
For field description, refer the following table:
Field
Description
Tenant
Select the Tenant from the dropdown.
Risk Name
Enter Risk Name. This value is added to the Risk table data source and these values populate in Risk field when the field is used as reference in the application.
Example: Low, Medium, High
Description
Enter the description about the purpose of the Risk.
Sort Order
Enter a numerical value for Sort Order.
Active
Enable Active switch for the configuration to be available and used in the application.
Default
Enable Default switch for the configured value to be a default risk value when not specifically referenced.
High Risk
Enable High Risk to indicate that the configured risk is having more weightage.
Click Save to add the configuration to the Risk List page.