Professional Documents
Culture Documents
V2.0
Welcome Kit
SERVICE DELIVERY
CSC-Internal
DOCUMENT INFORMATION
CHANGE LOG
This document and its content are proprietary property of CSC. The content of this document shall not be
used, published, disclosed, or disseminated, as a whole or in part, without the written consent of CSC.
Table of Contents
1. OBJECTIVE 4
2. SCOPE 4
3. INTRODUCTION 4
4. KNOW YOUR SDI TEAM 4
4.1 SDI CONTACT DETAILS AND ESCALATIONS 5
4.2 SDI POLICIES AND PROCEDURES 5
5. SDI SUPPORTS AREAS 5
5.1 CONNECTIVITY SUPPORT 5
5.2 PLATFORM SUPPORT 5
5.3 CLIENT SITE SERVICES SUPPORT 6
5.4 SOFTWARE ASSET MANAGEMENT SUPPORT 6
5.5 HARDWARE ASSET MANAGEMENT SUPPORT 6
5.6 WORKPLACE EXPERT SUPPORT (REMOTE RESOLUTION TEAM) 6
5.7 SERVICES WHICH ARE NOT COVERED UNDER SDI 6
6. PROCEDURE TO RAISE IT-NSR REQUEST 7
7. SOME IMPORTANT DO’S AND DON’TS 8
7.1 Do's 8
7.2 Don’ts 8
8. IMPORTANT INFORMATION 9
8.1 FOR ANY INCIDENT OR BREAK FIX 9
8.2 FOR ANY NEW SERVICE REQUEST 9
8.3 WORKSTATION SECURITY AWARENESS 9
8.4 VIRUS INCIDENT REPORTING 10
8.5 SECURE ID FAQ 10
8.6 SKYPE FOR BUSINESS 10
9. CISCO PHONE SERVICE 11
9.1 DIAL WITHIN CSC INDIA 11
9.2 DIAL OUTSIDE INDIA 11
9.3 DIAL CSC BRIDGE NUMBERS 12
9.4 RECEIVING CALLS FROM OTHER COUNTRIES 13
1. OBJECTIVE
To provide first-hand information about SDI (Service Delivery Internal) operations and support
arrangements for CSC India users and make them familiar with SDI process and people.
2. SCOPE
The information provided in this document is applicable to SDI team’s IT operations across CSC India
Offices.
3. INTRODUCTION
Service Delivery – CSC Internal (SDI) is the internal IT team that provides support and services related
to internal IT Infrastructure (eg... Internal Infrastructure Servers, Networks, Desktop Support, Service
desk) etc. SDI regularly attains organization wide certifications and ensure that process adherence
remains a core value with Strong customer focus, quick and round-the-clock response and prompt
problem resolution are the hallmark of Service Delivery – CSC Internal. In the present fast growing
and time to market IT space, we all are aware that IT infrastructure support is one of the critical area
for companies like ours. So we felt that it is important for us to furnish the first-hand information
about SDI and its operations to all employees. This document would comfort in familiarizing with the
SDI people and process.
• Centralized IT Service Desk: To record end user’s break-fix issues in form of tickets and
routing tickets to respective line of service. First Point of Contact to users for all break fix
calls and updates on new requirements of any hardware and software resources.
• Workplace Expert Services (WES): First level remote support team who remotely attend to
user’s tickets via chat or phone call and provide resolution for all incidents/service requests.
• Connectivity Services team who provide network support
• Platform Services team who support Servers and other critical systems.
• Client Site Services – iTouch (CSS) who provide desktop support at end user’s desk.
IT Hardware Asset Management (HAM) team which takes care of IT Hardware & peripherals
allocation and deallocation to end users. Including initiating procurement of IT equipment.
(eg.. NEW PC, Laptop, headset, Hardware upgrade requests etc..)
• IT Software Asset Management (SAM) who takes care of manage and procurement of
Software licenses.
Please refer to the following links for SDI org-chart and Escalation & Contacts matrix.
https://portal.amer.csc.com/wiki/display/ourspace/Service+Delivery+Internal+Procedures
• LAN Support
• WAN support - Connectivity to the client network
• WAN support - Voice
• Internet connectivity Support
• Implementation and commissioning of all the network services in the new sites
• DR (Disaster Recovery) plan and testing for India.
5. Select appropriate category from the left panel while raising the request. Also fill all the
mandatory details and submit the request as shown below.
6. Request will be processed after the NSR is approved by the manager and respective team will
raise a remedy request to complete the activity.
7.2 Don’ts
Do not install unauthorized application on your machine. Services like Web, SMTP, Telnet, FTP
and proxy servers are highly vulnerable and must be disabled if not being used.
Do not share any folder to everyone group. If any folder is required to be shared (for imperative
business use), selective access needs to be provided to authorized users only.
Do not share any passwords.
Do not send in requests or complaints via E-mail to the engineers directly. Use service desk,
IT/NSR systems only.
Do not misuse the Internet facility.
Do not indulge in Chain Mails.
Don’t try to open/repair any hardware (printer/Laptop/Desktop/etc.) instead if you need any
help, contact ServiceDesk via eChat tool.
Do not try to open printer trays or printer covers to solve paper jams - you may end up damaging
the printer parts.
Do not use Peer-to-Peer (P2P) applications
Do not use Instant messaging applications other than "Sametime and Skype for business"
Do not open any unknown recipient mail in Outlook, Lotus Notes, Internet (Gmail, Hotmail,
Yahoo, Rediffmail etc.) with attachments having extensions - .bat, .cmd, .com, .exe, .pif, .scr, .job,
.vbs or with any suspicious attachment.
Do not open .zip attachments received from suspicious account and with suspicious subject.
Do not download any file from Internet directly with an attachment .bat, .cmd, .com, .exe, .pif,
.scr, .job or .zip, .vbs extension from unauthorized websites.
Before accessing any website link (Hyperlink) place the mouse cursor on the link to verify the
destination URL in status bar before clicking on it.
8. IMPORTANT INFORMATION
8.1 FOR ANY INCIDENT OR BREAK FIX
Any IT service stopped due to a reason impacting the business would be considered as Incident.
For example
Outlook related problem
System performance degradation problems
Monitor, Keyboard problems
Application crash (, MS Office, Skype for Business, VPN client, etc…)
Printer, mails, IE related problems.
Link connectivity issues.
Virus infection.
All users shall report their incidents primarily to Service desk through e-Chat.
(http://chat.csc.com).
• We have a centralized console which will push the updates to all clients and ensure that
McAfee Antivirus DAT files are up-to-date. Generally, this takes 4-8 hrs. time for all our
machines get updated, and in case of emergency we may ask you to manually verify and
initiate the update.
• Security patch manager server ensures that your machine is installed with the latest
security patches. WSUS (Windows system update services) client installed on your
machine will take care of automatic installation of latest security patches and will ask for
re-boot. Make sure to Re-boot machine after installation of patches else WSUS client will
not able download the newly released patches. Newly installed patches are not effective
until the PC/laptop is rebooted and cannot protect against latest vulnerabilities.
• Disconnect your PC from the network immediately and do not switch off the machine.
• Reach Service desk via chat services and report the same with help from your colleagues
or manager.
North America Region token (Used to connect to CSC network from home network)
EMEA Region token (Used to connect to CSC EMEA regions client VPN servers)
Australia Region token (Used to connect to CSC Australia regions client VPN servers)
https://c3.csc.com/docs/DOC-1061072
Please refer the below training video for detailed explanation on various features available with
'Skype For Business’ tool.
https://c3.csc.com/docs/DOC-992810
To dial any other country not listed above please use ‘99’ ‘00’ ‘Country code’ ‘number’.
System will prompt “Enter Authorization Code”, then enter “STD/ISD Authorization code” + “#”