Submitting a support ticket can be difficult and confusing at times. To help you submit effective support tickets, this article covers how to prevent requests for more information, which delay the process.
Submitting a Support Ticket
If your question/issue hasn’t been answered in the available resources listed in the Support Resources article, you can:
- submit a ticket from the Help Desk, or
- send us an email to Support
Help Center
When using the Help Center, click SUBMIT A REQUEST.
The Submit a Request form is divided into four sections:
-
Your email address can be populated with your email as well as other email(s) that you wish to be included in all responses on the ticket. For example, your account team, a manager or colleague who needs to be kept in the loop or maybe a distribution email address that needs to be copied on your ticket for coverage.
-
Subject should contain a few words or a sentence that sums up the general topic of the request. The Subject is one of the most important sections of any support ticket. Be as precise and concise as possible. Check out the section of this guide titled Tips for Writing Sensational Support Tickets for more help. As you fill in the Subject field, you will find a new section (Suggested articles) appear. These are article that have similar keywords as listed in your subject field.
-
Description should have all the information the Support Team needs to understand the issue you are experiencing, how to replicate the issue, and any workarounds you may have identified. The following is a list of critical information to include, depending on ticket type. For specific minimum requirements per ticket type, see the below section on Ticket Types and Their Related Minimum Requirements.
-
The URL of your Cisco Vulnerability Management instance, e.g: myco.kennasecurity.com or your organization’s name (Bonus points for both).
-
The Cisco Vulnerability Management product at issue: Vulnerability Management, Application Security, API, Vulnerability Intelligence.
-
The URL or title of the screen where the issue is occurring, i.e. Explore View, or a specific vulnerability url.
-
Issue Statement and detailed description of the problem, how it’s impacting you and your desired use case. Include screenshots whenever possible.
-
The behavior you are expecting or usually encounter given the scenario with screenshots whenever possible.
-
Whether the issue is reproducible on each attempt or intermittent, and if there is a pattern. If so, a step by step detail on how to recreate the issue goes a long way.
-
Detail any error/messages or dialog boxes presented or send screenshots.
-
Explain any workarounds for the issue encountered.
-
Whether the issue is encountered using a different web browser or a different machine. If so, please provide the browser you are using, and the version information and/or the machine specs.
-
Whether the issue is exclusive to one user or many. What privilege role does the user/s experiencing the issue have? Are they admin, read only or a specific custom role?
-
If this is a request for an enhancement, please provide details of the use case you are trying to address, the desired outcome/expected result, whether there is any workaround, the business impact and the criticality of the request (high/med/low).
-
-
Attachments can include any additional information that can support us in addressing your issue, but screenshots are vastly helpful.
We look forward to resolving your issue as quickly as possible now that we are armed with this information-packed request!
Please see below for additional tips that can help our team address your issue promptly.
An Example of a Sensational Support Ticket
Your email address
myboss@mycompany.com; myteam@mycompany.com
Subject
Risk Meter Group not showing expected assets
Description
I have created a Risk Meter Group named “EMEA Windows Servers Group” using the following filter on my organisation’s Cisco Vulnerability Management instance (myco.kennasecurity.com) under the Vulnerability Management module:
os:(Windows) AND tag:winsrv
When reviewing the group here:
https://mycompany.kennasecurity.com/explore?status%5B%5D=active&vulnerability%5Bstatus%5D%5B%5D=open&vulnerability%5Bq%5D=os%3A(*windows)%20AND%20tag%3Awinsrv*
I am seeing only 425 assets with open vulnerabilities. From my scanner information, I am expecting to see more around the 600 mark. There are no error messages and the result is consistent every time I run the query. I have tried using IE on another Windows 10 machine as my own is running Google Chrome but the issue remains. Other admins on the environment also see the same result. This is a serious issue for us as our end of month reporting is affected. I have no way to work around this issue at present.
Note: At this point you should include your attachments such as screenshots or export files which can confirm the problem and facilitate reproduction of your issue.
Tips for Writing Sensational Support Tickets
Write your report clearly so that anyone can sit down and reproduce your issue. Avoid using jargon or abbreviations because the person reading the request may not know what you mean. If you have difficulty following your own steps for reproducing an issue, chances are we'll find it difficult too.
If you have a workaround, include step-by-step instructions in your support ticket – this will assist the Support team and possibly other users who might encounter the same issue in the future.
Test your issue report before submitting it. Do the steps to reproduce your issue result in the same error or issue every time? Did you forget to write down a step? Walking through an issue report before submitting it helps ensure that your report is accurate and complete and contains enough information for us to research the problem effectively.
Spending the necessary time up front to ensure that your support ticket is easy to read, and that all of the pertinent information is included, allows the Support Team and developers to spend more time working to resolve the issue and will help you avoid the frustration of having to backtrack in order to provide missing data.
Follow the recommended format. Include a detailed description, reproduction steps if applicable, expected results, actual results, and any discussion or comments, including your recommendations or workarounds. We’ll be glad to help you find a resolution as quickly as possible.
Ticket Types and Their Related Minimum Requirements
Note: please still follow the guidance above to provide the most detail possible in the description. This is a list of some ticket types and their essential minimum requirements.
Ticket Type |
Minimum Information Required |
---|---|
Connector Run Errors |
|
Agent setup
|
|
Ticketing setup/errors (JIRA, Cherwell, Remedy) |
|
API results problems
|
|
Risk Meter query results inconsistencies |
|
Bulk User Role edits |
|
Bulk Risk Meter edits |
|
Asset deletion |
|
Vulnerability not closing |
|
Full connector runs |
|
Tag purge/wipe requests (wipes all tags from environment) |
|
Turn on tag reset (wipes tags associated with any active asset reported by a particular connector) |
|
Custom asset locator ordering |
|
Disabling the 200 point score bump for External IP Addresses and/or Applications |
|
Deletion or remapping of service tickets within Cisco Vulnerability Management |
For Deletion:
For Remapping:
|
IP Whitelisting |
|
Graph smoothing |
|
Comments
Please sign in to leave a comment.