ServiceNow Script on Incident Table
So here is the scenario, on my incident table I have a field called “Escalated” and I have another field called “Escalated Time”. Requirement is “when user choose escalated field to “Yes”, escalated...
So here is the scenario, on my incident table I have a field called “Escalated” and I have another field called “Escalated Time”. Requirement is “when user choose escalated field to “Yes”, escalated...
What is ACL? In a simple way to say ACL or Access Control List tell what data user can access and how they can access it. Not every body can access data from ServiceNow,...
Are you getting “Flow reports not available” error while opening flow context? Here is how you can solve this issue 1. Go to system properties sys_properties.list 2. Once you’re in system properties, search for...
sys_id is a 32 character unique GUID(Globally Unique ID) This means your catalog item have a 32 character unique sys_id as well. There are few ways to find the sys_id of a record. In...
This is a follow-up blog post because I got a new request. Incase you didn’t see my first blog about SLA in ServiceNow, click here to watch it. This post will answer following question...
If an interviewer ask you what is “Retroactive start“, what will be your answer? I am in IT for more than 18 years, Retroactive start is something I heard after moving to ServiceNow Development....
What is a coalesce field in ServiceNow? Imagine you want to upload following data to ServiceNow (click image below to see more clearly) Once you upload the data, you’ll see following fields Ticket Number:INC100000...
How To Do a Pushup To do a push-up you are going to get on the floor on all fours, positioning your hands slightly wider than your shoulders. Don’t lock out the elbows; keep...
Question is: Which one statement correctly describes Access Control rule evaluation? Answers are: A. Table access rules are evaluated from the general to the specific B. If more than one rule applies to a...
Question: Which of the following protects applications by identifying and restricting access to available files and data? Answers: A. Application Configuration B. Verbose Log C. Access Control Rules D. Application Scope What do you...