← back

Technical Interview Prep

Platform Administrator

Tap to reveal • don't memorise, remember
Daniel Hammons — Staff Enterprise Platform Engineer
Thu 16 Apr • 2pm • ~45 min • Zoom
"Collaborative conversation" — talk through your thinking
All
Admin
Config
ITSM
Health
Reporting
🔍 Technical Interview Focus
⚙️
What Daniel Will Ask About
+
From Vanessa's email — the five focus areas:
1.Platform Administration Fundamentals — managing users, roles, groups, ACLs, core system configurations
2.Configuration & Customization — forms, UI policies, business rules, service catalog items, basic scripting
3.ITSM & Process Alignment — ITSM processes and how ServiceNow supports operational workflows
4.Platform Health & Governance — upgrades, patches, system health checks, security and compliance
5.Reporting & Visibility — dashboards and reports to drive operational insights
💡 Vanessa said: "We approach technical interviews as collaborative conversations. We're interested not only in your hands-on experience, but also in how you think through platform decisions." — Talk through your reasoning, don't just give final answers.
📎
Genesys Cloud CX + ServiceNow CSM Integration
+
Genesys and ServiceNow have a co-built product called "Unified Experience" — it integrates Genesys Cloud CX with ServiceNow CSM into a single agent desktop.
The partnership is massive
ServiceNow invested $750M in Genesys (July 2025) — Salesforce matched it. $1.5B total investment.
At Xperience 2025, they announced Agent2Agent (A2A) orchestration — AI agents collaborating autonomously across both platforms
Unified Experience is expanding from CSM into ITSM — help desk agents, not just customer service. Directly relevant to your role.
Genesys Cloud ARR hit ~$2.2B, growing 35% YoY — the company is scaling fast
Genesys is presenting at ServiceNow Knowledge 2026 right now — the partnership is deepening
What Unified Experience does
Centralises voice, chat & digital messaging routing through Genesys Cloud into ServiceNow
Agents get native call controls directly inside the ServiceNow Agent Workspace — no switching between systems
AI-powered Agent Copilot embedded as a custom component within ServiceNow
Queue mapping & presence sync — agent statuses stay aligned across both platforms
Admin-relevant setup
OAuth JWT authentication with self-signed certificates
OpenFrame configuration in ServiceNow connects to Genesys Cloud
Integration user creation, Application Registry setup, wrap-up code admin
💡 Drop this casually: "I saw ServiceNow invested $750M in Genesys and the Unified Experience is expanding into ITSM — that's exciting because it means the platform admin role sits right at the centre of that growth." Shows you've done homework beyond the job spec.
📎
Team Structure & GDPR Context
+
ServiceNow team is new at Genesys — manager in Brazil, rest of team in USA
Hiring a Senior Engineer + Sys Admin in Ireland
Irish hires likely needed for GDPR compliance — only EU-based staff can view certain customer data
⚠ Tip: In the manager/director round, show awareness of data residency and why having EU-based admins matters for compliance
1️⃣ Platform Administration Fundamentals
01
What's the difference between an ACL and a Role, and how do they work together?
admin
+
ACL = the rule — controls what can be done (read / write / create / delete) at table, field, or row level
Role = the label — controls who — means nothing until referenced by an ACL
Together: ACL says "only users with this role can read this table"
💡 Think: "ACL is the lock, Role is the key"
⚠ Gotcha: If no ACL exists for a resource, access is denied by default
💬 Full Answer
ACLs define what can be done — read, write, create, delete — and at what level: table, field, or even row. Roles define who someone is. On their own, roles don't actually restrict anything — they're just a label assigned to users or groups. They become powerful when an ACL references them. So for example, I could create an ACL that says "only users with the 'customer_viewer' role can read this table" — and then layer on a second ACL that prevents write or delete access entirely. That gives you real defence in depth: the ACL sets the rule, the role determines who the rule applies to. It's also worth knowing that ServiceNow denies access by default if no ACL exists — so you're building permissions up, not locking things down after the fact.
02
How do you manage users and groups in ServiceNow?
admin
+
Users live in sys_user — can be created manually, imported via CSV, or synced via LDAP/SSO
Groups live in sys_user_group — used for assignment, approvals, notifications, and role inheritance
Roles assigned to a group automatically cascade to all members — cleaner than per-user assignment
Group nesting — child groups inherit parent roles, useful for org hierarchy
💡 In practice: always assign roles to groups, not individual users. Easier to audit, easier to manage when people move teams.
💬 Full Answer
Users are stored in the sys_user table and can be provisioned in several ways — manually for one-offs, CSV import for bulk onboarding, or ideally through LDAP or SSO integration for automated provisioning and deprovisioning. Groups in sys_user_group serve multiple purposes: they're used for assignment routing, approval workflows, notification subscriptions, and importantly, role inheritance. My approach is to always assign roles at the group level rather than to individual users. It's much cleaner from an audit perspective, and when someone moves teams, you just change their group membership instead of hunting down individual role assignments. Groups can also be nested — child groups inherit the parent's roles, which maps well to organisational hierarchies.
03
What are Update Sets and why are they important?
admin
+
A wrapper that captures configuration changes (customer updates) in a dev instance
Promotion path: DevTest (UAT)Prod — never skip
Not everything is auto-captured (data changes, some form changes) — dev must verify
Can batch update sets, but keeping them separate = cleaner audit trail
Only captures customisations (customer updates), not base system / upgrade changes
Can be backed out if issues arise post-commit
💡 Think: "Update sets = version control for ServiceNow config"
⚠ Gotcha: Never commit directly to prod without UAT sign-off. Good hygiene: proper naming, descriptions, dates filled in.
💬 Full Answer
Update sets are essentially a wrapper that captures all your configuration changes in a development instance. Say you have dev, test, and prod — you spin up an update set with proper naming conventions, select it as your current set, and any changes you make get recorded as customer updates. It's important to know that not everything is automatically captured — some form changes need to be manually added, and data changes aren't included at all, so you need to be aware of that. Once the developer is happy with their work and has done functional testing in dev, they promote the update set into the test instance for proper UAT. If the tester finds issues, the dev spins up an additional update set, makes the fixes, and promotes again. You can batch update sets together, but personally I prefer keeping them separate — it gives you a cleaner audit trail and makes it easier to back out specific changes if something goes wrong. Good hygiene is key: fill in all fields on the update set form, use consistent naming like "GEN-001 - Adding field to incident form," populate dates, and add descriptions. Only once UAT is passed should an update set ever be committed to production. And the beauty is, if something does go wrong, update sets can be backed out.
04
Explain the difference between a baseline role like itil, admin, and snc_internal.
admin
+
itil = the standard fulfilment/agent role — lets users work incidents, problems, changes, etc.
admin = full platform access — bypasses most ACLs, can modify anything. Use sparingly.
snc_internal = internal ServiceNow employee role — you'll never assign this, but know it exists
Best practice: create custom roles for specific needs rather than handing out itil or admin broadly
⚠ Gotcha: admin role should be tightly controlled. In a mature org, even platform admins might use elevated custom roles instead of blanket admin access.
💬 Full Answer
The itil role is the baseline for anyone who needs to work within ITSM modules — incident, problem, change, and so on. It grants access to fulfiller views and actions. The admin role is the most powerful — it bypasses most ACLs and gives unrestricted access to configure the platform. In practice, you want to limit who holds admin and for how long. Some orgs use time-boxed admin access or elevated custom roles for day-to-day work. snc_internal is a ServiceNow internal role — you wouldn't assign it, but you'll see it referenced in base system ACLs. The key principle is least privilege: give people exactly the access they need, nothing more. If someone only needs to manage catalog items, build a role for that rather than giving them itil or admin.
2️⃣ Configuration & Customization
05
What's the difference between a Business Rule and a UI Policy?
config
+
UI Policy = client-side — controls the form experience (hide/show, mandatory, read-only)
Business Rule = server-side — runs on database operations (before / after / insert / update / delete)
💡 Think: "Am I affecting the form or the data?"
⚠ Gotcha: UI Policies can run server-side (checkbox) — but discouraged for performance
💬 Full Answer
A UI Policy is client-side — I'd use it to control the form experience, like hiding or showing fields, or making something mandatory based on what a user selects. A Business Rule is server-side and runs on database operations. It gives me more control over data integrity — for example, I can use a 'before' rule to validate or transform data before it's saved, or an 'after' rule to trigger downstream actions like notifications. The way I think about it is: if I need to affect what the user sees on the form, it's a UI Policy. If I need to affect what happens to the actual data, it's a Business Rule. Worth noting — UI Policies do have a server-side checkbox, but it's generally discouraged because it can cause performance issues.
06
What's the difference between a Catalog Item and a Record Producer?
config
+
Catalog Item = creates a Requested Item (RITM) + associated tasks — used for standard service requests (laptop, software, access)
Record Producer = creates a record on a specific target table — like an incident, change, or custom table record
Both live in the Service Catalog and look the same to the end user
Key difference: Catalog Item goes through the request → RITM → task fulfilment model. Record Producer skips that and writes directly.
💡 Think: "Catalog Item = ordering something. Record Producer = reporting something."
💬 Full Answer
Both sit in the Service Catalog and look identical to the end user — they fill in a form and submit. The difference is what happens behind the scenes. A Catalog Item creates a Requested Item (RITM) and associated catalog tasks, following the standard request fulfilment model. It's designed for ordering things — a laptop, software access, a new hire setup. A Record Producer creates a record directly on a target table — like an incident or a change request. So if you want users to raise an incident through the portal without seeing the incident form, you'd use a Record Producer that writes to the incident table. The choice depends on whether you want the fulfilment workflow (Catalog Item) or a direct record creation (Record Producer).
07
How do you customize a form, and what's the difference between form layout and form design?
config
+
Form Layout (Configure → Form Layout) = drag-and-drop field arrangement into sections and columns. Available per view.
Form Designer = a more modern visual interface — does the same thing but also lets you configure field properties inline
Views allow different form layouts for different roles or use cases (e.g., an "itil" view vs a "self-service" view)
Form changes are captured in update sets — but verify they were actually picked up
⚠ Gotcha: Form layout changes can be view-specific. If you change the "Default" view, it won't affect other named views. Always check which view you're editing.
💬 Full Answer
There are a few ways to customize forms. Form Layout is the classic approach — you go to Configure → Form Layout and drag fields into sections and columns. It's quick and straightforward. Form Designer is the more modern version — it's visual, lets you see the form as you build it, and you can configure field properties like read-only or mandatory right there. Both achieve the same result. The key thing to understand is views — you can have multiple form layouts for the same table. So the itil view might show different fields than what a self-service user sees. When customizing, always double-check which view you're editing. And while form changes should be captured in your update set, it's good practice to verify, because not all form-level changes are automatically tracked.
08
What's the difference between configuration and customization in ServiceNow?
config
+
Configuration = using built-in tools — form layout, UI policies, workflows, system properties. Upgrade-safe.
Customization = writing custom code or modifying base system files. Can break during upgrades.
ServiceNow's philosophy: configure first, customize only when necessary
💡 This is a values question. Daniel wants to hear that you lean towards out-of-the-box solutions and only write code when configuration can't do the job.
💬 Full Answer
Configuration is using the platform's built-in tools to tailor it to your needs — things like form layouts, UI policies, workflows, system properties. These are upgrade-safe because ServiceNow knows about them and can preserve them through upgrades. Customization means writing custom code or modifying out-of-the-box components — things like custom business rules, script includes, or modifying base system scripts. These can break during upgrades because ServiceNow might change the underlying code you've modified. My approach is always configure first. If the platform gives me a way to do it without code, I'll use that. I only move to scripting when there's no configuration option that meets the requirement. And when I do customize, I document it thoroughly so the team knows what's been changed and why.
3️⃣ ITSM & Process Alignment
09
Walk me through the ITSM modules and how they relate to each other.
itsm
+
Incident = something is broken — restore service ASAP
Problem = root cause investigation — why did it break? Prevent recurrence.
Change = planned modification — proper approval, risk assessment, implementation plan
Request = user needs something — standard service through the catalog
Flow: multiple incidents → problem created → root cause found → change raised to fix → change implemented → problem resolved
💡 Daniel will want to hear you understand the flow between modules, not just what each does in isolation.
💬 Full Answer
The core ITSM modules are Incident, Problem, Change, and Request — and the power is in how they connect. Incident management is about restoring service as quickly as possible when something breaks. If you start seeing patterns — say the same incident keeps coming up — that's when you raise a Problem to investigate root cause. Once you've identified the fix, you raise a Change to implement it properly, with risk assessment and approvals. Requests are separate — they're for standard service needs like "I need access to this application" or "I need a new laptop." Those go through the Service Catalog and follow the request fulfilment process. The relationships matter too — incidents can be linked to problems, problems generate changes, and the CMDB ties it all together by showing what infrastructure is affected.
10
What's the difference between an Incident and a Problem?
itsm
+
Incident = symptom — "the service is down, fix it now"
Problem = root cause — "why does this keep happening?"
Incident goal: restore service. Problem goal: prevent recurrence.
Multiple incidents can be linked to one problem — shows the scope of impact
⚠ Common mistake: treating every incident as a problem. Problems should only be raised when there's a pattern or an unknown root cause worth investigating.
💬 Full Answer
An incident is a symptom — something is broken or degraded and we need to restore service as fast as possible. A problem is the underlying cause. The classic example: ten users report they can't access email — that's ten incidents. The fact that the mail server ran out of disk space — that's the problem. You can apply a workaround to the incidents while the problem is being investigated. Once you identify root cause, you raise a change to fix it permanently. Not every incident needs a problem — you only raise one when there's a pattern, an unknown root cause, or a major incident that warrants deeper investigation.
11
Explain the Change Management process. What are the different change types?
itsm
+
Standard = pre-approved, low-risk, repeatable — no CAB needed (e.g., password reset script)
Normal = needs assessment and approval — goes through CAB or peer review
Emergency = critical fix needed now — expedited approval, documented after the fact
All changes should have: risk assessment, implementation plan, backout plan, testing evidence
💡 Show Daniel you understand governance — changes need documentation, approval, and a backout plan. No cowboy deployments.
💬 Full Answer
Change management in ServiceNow supports three types. Standard changes are pre-approved and repeatable — things like scheduled maintenance or routine deployments that follow a known, low-risk process. Normal changes require proper assessment — you fill in the risk, impact, implementation plan, backout plan, and it goes through an approval flow, often a CAB or peer review. Emergency changes are for urgent fixes — something is broken in production and needs to be fixed immediately. The approval is expedited but still documented, and you do a proper review after the fact. Regardless of type, every change should answer: what are we doing, why, what's the risk, how do we test it, and how do we back it out if something goes wrong.
12
What is the CMDB and why is it important?
itsm
+
CMDB = Configuration Management Database — stores Configuration Items (CIs) and their relationships
CIs = servers, applications, databases, network devices, business services — anything that supports a service
Relationships are key — "this application runs on this server" / "this server depends on this database"
Feeds into impact analysis — when a CI goes down, you can see what else is affected
Links to incidents, changes, and problems — "which CIs are affected by this incident?"
⚠ A CMDB is only valuable if it's accurate and maintained. Stale data is worse than no data — it leads to wrong decisions.
💬 Full Answer
The CMDB is the Configuration Management Database — it's essentially a map of your IT infrastructure. It stores Configuration Items (CIs) — servers, applications, databases, network devices, business services — and crucially, the relationships between them. The real power isn't just knowing what you have, it's knowing how things connect. If a server goes down, the CMDB tells you which applications are affected, which business services are impacted, and who needs to be notified. It ties directly into ITSM processes: incidents are linked to affected CIs, changes reference what they're modifying, and problem management can use it to identify patterns across infrastructure. The catch is that a CMDB is only useful if it's accurate. Data quality is everything — so you need processes around discovery, reconciliation, and regular audits to keep it healthy.
4️⃣ Platform Health & Governance
13
How do you approach a ServiceNow upgrade?
health
+
Step 1: Review the release notes — what's new, what's deprecated, what's changed
Step 2: Run the upgrade on a sub-production instance first (clone prod → upgrade clone)
Step 3: Run Instance Scan and review skipped records — these are customisations that conflict with the upgrade
Step 4: Thorough UAT — test all critical workflows, integrations, and custom scripts
Step 5: Schedule a maintenance window, upgrade prod, validate, monitor
⚠ Skipped records are the biggest risk — they're where your customisations clash with ServiceNow's updates. Review every single one.
💬 Full Answer
Upgrades need a structured approach. First, I'd review the release notes to understand what's changing — new features, deprecations, and breaking changes. Then I'd clone production into a sub-production instance and run the upgrade there. After the upgrade, the critical step is reviewing skipped records — these are places where your customisations conflict with ServiceNow's updated versions. Each one needs a decision: take theirs, keep ours, or merge. I'd then run Instance Scan to check for best practice violations and any health issues introduced by the upgrade. From there, it's thorough UAT — testing critical workflows, integrations, scheduled jobs, and any custom scripts. Once the team is confident, you schedule the production upgrade during a maintenance window, execute it, validate, and monitor closely for the first few days.
14
What is Instance Scan and how do you use it?
health
+
A built-in tool that checks your instance against ServiceNow best practices
Scans for: performance issues, manageability concerns, upgrade risks, and security vulnerabilities
Produces a report with findings — each one rated by severity with remediation guidance
Should be run regularly (not just before upgrades) and findings tracked to resolution
💡 Mentioning Instance Scan proactively shows Daniel you think about platform hygiene, not just firefighting.
💬 Full Answer
Instance Scan is a built-in health check tool that evaluates your instance against ServiceNow's best practices. It scans for things like performance issues — say a business rule that's doing expensive queries — manageability concerns, potential upgrade risks, and security vulnerabilities. It produces a findings report where each issue is categorised by severity and comes with remediation guidance. I'd use it regularly as part of platform governance, not just before upgrades. You can also create custom scan checks if your organisation has specific standards. The findings should be triaged and tracked like any other work — assigned to someone, prioritised, and resolved.
15
How do you monitor platform health day-to-day?
health
+
System Diagnostics (stats.do) — shows node health, memory, active transactions, semaphores
Scheduled Jobs — monitor for failures, long-running jobs, stuck jobs
Performance Analytics / System Logs — track trends, slow queries, error rates
Email logs — notifications are a lifeline; if they stop, check the mail queue
Instance Scan on a regular cadence — not just reactive
💬 Full Answer
Day-to-day, I'd keep an eye on a few key areas. System diagnostics — stats.do is a quick pulse check on node health, memory usage, active transactions, and semaphores. Scheduled jobs need monitoring for failures, long-running jobs that might indicate performance issues, and stuck jobs that need restarting. System logs and slow query logs help you spot trends before they become incidents. Email is another one — notifications are critical for workflows, so monitoring the email queue and outbound mail logs catches issues early. I'd also set up a dashboard that surfaces these metrics in one view so the team can see platform health at a glance without having to dig through individual modules.
16
How do you ensure governance and compliance on the platform?
health
+
Change management: everything goes through Dev → Test → Prod. No direct prod changes.
Role hygiene: regular audits of who has admin / elevated access. Least privilege.
Update set discipline: proper naming, descriptions, no "Default" update set for real work
Instance Scan: regular checks, findings tracked and resolved
Documentation: every customisation documented — what, why, when, who
GDPR / data residency: relevant for Genesys — EU data handled by EU-based staff
💡 Tie this back to Genesys: with a new team across Brazil, USA, and Ireland, strong governance is essential from day one. Show you'd help build the processes, not just follow them.
💬 Full Answer
Governance starts with process discipline. Every configuration change goes through proper change management — dev to test to prod, no exceptions. Update sets need proper naming conventions and descriptions, and nobody should be making real changes in the Default update set. Role and access governance is ongoing — regular audits of who has admin or elevated roles, removing access that's no longer needed, applying least privilege. Instance Scan should be run on a regular cadence with findings tracked like any other backlog item. Documentation is non-negotiable — every customisation should be documented with what was changed, why, when, and who did it. For Genesys specifically, with the team being new and distributed across three regions, building strong governance habits early will pay off massively as the platform matures. And the GDPR angle is important — with EU customer data, you need clear controls around who can access what, which is where ACLs, data policies, and having EU-based admins come into play.
5️⃣ Reporting & Visibility
17
How do you create reports and dashboards in ServiceNow?
reporting
+
Reports = individual visualisations (bar, pie, trend, list) built from a table + filter
Dashboards = a collection of reports arranged in a layout with widgets
Reports can be scheduled to email on a cadence (daily/weekly to stakeholders)
Performance Analytics = more advanced — tracks KPIs over time with indicators and breakdowns
Always ask: "What decision does this report help someone make?" — don't build vanity dashboards
💬 Full Answer
Reports are built by selecting a table, applying filters, choosing a chart type, and grouping or trending the data. You can do bar charts, pie charts, trend lines, lists, and more. Dashboards collect multiple reports into a single view — you arrange them in a grid layout and can add different widget types. Reports can be scheduled for automated delivery — really useful for giving stakeholders a weekly summary without them having to log in. For more advanced needs, Performance Analytics lets you define KPIs and track them over time with indicators, breakdowns, and targets. The most important principle is intentionality — every report should help someone make a decision. If a dashboard doesn't drive action, it's just noise.
18
What reports would you set up for a new ServiceNow deployment?
reporting
+
Incident: open vs resolved trend, MTTR, incidents by priority/category/assignment group
Change: changes by type, success/failure rate, change calendar view
Request: catalog item popularity, fulfilment time, open requests by group
Platform health: scheduled job failures, update set activity, user login trends
SLA: SLA attainment by priority — this is the one leadership always asks about
💡 This is a great question to show initiative. Daniel's building a new team — showing you'd set up visibility from day one is exactly what they need.
💬 Full Answer
For a new deployment, I'd start with the reports that give the team immediate visibility. For incidents: open vs resolved over time, mean time to resolution, and breakdowns by priority, category, and assignment group — this tells you where the pain is. For changes: a trend of changes by type, success and failure rates, and a change calendar so teams know what's happening when. For requests: catalog item popularity helps you optimise what you offer, and fulfilment time shows where bottlenecks are. SLA attainment is critical — leadership will always want to know if you're meeting your service targets. And for platform health, I'd track scheduled job failures, update set activity, and user adoption metrics. I'd bundle these into role-specific dashboards — one for the ops team, one for management, and one for the platform admin team.