Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • HR Service Delivery
Table of Contents
Choose your release version
    Home New York HR Service Delivery HR Service Delivery Emergency Response Management Emergency Exposure Management Identify potentially exposed users

    Identify potentially exposed users

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Identify potentially exposed users

    When a user has indicated a health condition on a self-report, use Emergency Exposure Management to identify other users who might have come in contact with the affected user. You can analyze multiple data sources, such as location, meetings, workspace reservations, badge scans, and Wi-Fi access data of the affected user to identify potentially exposed users.

    Before you begin

    To query through multiple data sources, the Emergency Exposure Management requires the following applications, plugins, and configurations available on your instance.
    Microsoft Office 365
    Register and configure to scan Microsoft Outlook meeting data.
    Workplace Safety Management
    Scans workspace reservation data.
    Contact Tracing
    Badge reader scan, user daily contact log, Wi-Fi access log, handheld or wearable device proximity data, and visitor data.
    Employee Health Screening and Contact Tracing
    Scans visitor data.
    Field Service Management (com.snc.work_management)
    Scans field service task data.
    Important:

    If you are an on-premise customer with Microsoft Office 365 and you need assistance in configuring Emergency Exposure Management, contact your sales representative or contact ServiceNow Technical Support at https://support.servicenow.com/.

    Role required: sn_imt_diagnosis.diagnostics_admin or admin

    About this task

    Note: You cannot create or run a diagnostic request for affected users who have not consented to use their data for contact tracing. For more information, see User privacy consent for Contact Tracing.

    Procedure

    1. Navigate to Emergency Exposure Management > Create New.
      The Report generation status field is set to Not Initiated and the Active check box is selected.
    2. From the Affected user field, select the user's name.
    3. Click the lock icon (lock icon) in the Tracing system field and select one or more tracing system options to query corresponding data sources.
      You can select multiple sources together for better identification of potentially impacted users.
      Table 1.
      Tracing system

      (Required application/plugin)

      Query
      Location Users co-located with the affected user, for example, on the same floor or building.
      Outlook meetings

      (Microsoft Office 365)

      Users who accepted the same meetings as the affected user during the specified time period.
      Workplace reservations

      (Workplace Safety Management)

      Users who had reservations for the same shifts as the affected user during the specified time period.
      Badge reader

      (Contact Tracing)

      Users who swiped their badge on the same badge reader devices as the affected user, during the specified time period.
      Employee daily log

      (Contact Tracing)

      The list of users with whom the affected users interacted during the specified time period.
      Visitor log

      (Contact Tracing and Employee Health Screening)

      The list of visitors who interacted with the affected user during the specified time period. Visitors who are invited by the affected user and have been screened through and let in are queried.
      Wi-Fi access log

      (Contact Tracing)

      Users who used the same Wi-Fi access points as the affected user during the specified dates.

      Wi-Fi access log data used to identify potentially impacted users depends on the Wi-Fi location preferences and the available integrations.

      For more information, see Retrieving Wi-Fi access log data.

      Note: Data received via a real-time API will be for a period based on the data retention policy of your Wi-Fi service provider.
      Handheld/Wearables

      (Contact Tracing)

      Users using handheld or wearable devices in the close proximity with the affected user for more than the permissible time during the specified time period.
      Field service

      (Field Service Management)

      Customers attended by an affected field agent during the specified time period. Also queries other field agents who interacted with the affected agent or visited the same customer as the affected agent during the specified time period.
    4. When required for a selected tracing system, provide the start and end dates.
      1. In the Start date field, provide the estimated date of infection.

        Because the infection window that you're concerned about may vary, pick a start date such as 14 days prior to the date of reported symptoms.

      2. In the End date field, provide the date of reported symptoms, at least one day prior to today.
    5. Click Save.
      Related lists appear that are filled in after you run a diagnostics report.
    6. Click Run Diagnostics.
      A scheduled job fetches potentially impacted user data from the selected sources and loads the data in corresponding related lists. Refresh a list to see the potentially impacted users immediately.

      If you selected the Handheld/Wearables option, a diagnostic request task is created. Follow the instructions in the task to fetch the potentially exposed users.

      If you selected the Wi-Fi access log option, the Wi-Fi data queried is based on the location preference set for the affected user's location. The available options are:
      • Mist Systems integration: The Wi-Fi data is fetched from Mist Systems when you run the diagnostic request.

        If the site network is Bluetooth LE-enabled and the organization has provided users with a BLE device, the Wi-Fi access using the BLE devices is used to identify potentially exposed users.

      • Cisco DNA Spaces integration: The Wi-Fi data is available based on the Cisco tier value set in the sn_imt_tracing.wifi_log_cisco_tier property:
        • If the wifi_log_report value is set, the data is imported from the Wi-Fi access data files for the specified days from the SFTP server and queried by the location path to identify potentially exposed users.
        • If the proximity_report value is set, a diagnostic request task is created to fetch the potentially exposed users. Follow the instructions in the task to fetch data on potentially impacted users from the selected data source. For more information, see Fetch potentially exposed user data from a data source.
      • Manual import: The Wi-Fi data is imported from a Microsoft Excel spreadsheet into the Wi-Fi Access Register table.
    7. (Optional) Add manually the potentially affected users, for example, users who visited a location with an affected user.
      1. In the Impacted users added manually list, click New.
      2. Select the potentially affected user.
      3. (Optional) Add comments about why you added the user.
        Entering comments helps identify other users who might be potentially impacted by this user if this user starts to show symptoms.
      4. Click Submit.
      The user appears in the Impacted users added manually related list.

    Result

    The related lists display potentially impacted users. The Impacted visitors, Impacted customers, and Impacted field agents related lists appear only if relevant users exist.
    Note: Users who have not consented to use their data are filtered out from the list of potentially impacted users. However, you can add them to the potentially impacted users list manually.
    Table 2.
    Related list Description
    All Impacted users All users who might have been potentially exposed. This list is a combination of all the records in the other related lists.

    Under the Tracing system column, you can see the source of the exposure for an user.

    Impacted users added manually This list is empty unless a user with the sn_imt_diagnosis.diagnostics_admin role manually adds additional potentially impacted users.
    Impacted visitors Visitors invited by the affected user who cleared the health screening and interacted with the affected user during the specified time period.
    Impacted customers Customers added from the field service work order analysis. Potentially impacted customers are determined by the work orders attended by an affected field agent between the specified dates.
    Impacted field agents Field agents added from the field service work order analysis. Potentially impacted field agents are determined if they interacted with an affected agent or visited the same customer as the affected agent between the specified dates.

    If the diagnostics fail to run, click the Show related jobs link to check the status of all jobs that have been launched. You can view the details, including the log message, to determine the reason of failure.

    Note: Failed jobs are automatically retried three times, the default setting in the Emergency Exposure Management properties. To retry the job after you fix the issue, click Reprocess.

    What to do next

    Depending on the applications and plugins installed, you can take the following actions:
    • Click Download Report to download a spreadsheet listing all affected users. The report includes the email address and location of each user, and the source of identification, such as location, workplace reservation, collaboration, badge reader data, or field service work orders. For manually added users, the comment is included.
    • Click Download Visitor Report to download a spreadsheet listing all potentially exposed visitors who met the affected user. The report includes the email address and name of each visitor.
      Note:

      The button is available only when you have selected the Visitor log tracing system.

    • The case manager can create a case for the affected user and add potentially impacted users from the related list to the case to follow up on their health status. For more information, see Create a case for an affected employee.
    • The manager of the affected field agents can take further actions such as blocking their future work order assignments. For more information, see Emergency Exposure Management for field service agents.

    • Fetch potentially exposed user data from a data source

      Work on the diagnostic request task to get information about potentially impacted users from a selected data source and populate the corresponding related lists on the Diagnostic Request form.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Identify potentially exposed users

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Identify potentially exposed users

      When a user has indicated a health condition on a self-report, use Emergency Exposure Management to identify other users who might have come in contact with the affected user. You can analyze multiple data sources, such as location, meetings, workspace reservations, badge scans, and Wi-Fi access data of the affected user to identify potentially exposed users.

      Before you begin

      To query through multiple data sources, the Emergency Exposure Management requires the following applications, plugins, and configurations available on your instance.
      Microsoft Office 365
      Register and configure to scan Microsoft Outlook meeting data.
      Workplace Safety Management
      Scans workspace reservation data.
      Contact Tracing
      Badge reader scan, user daily contact log, Wi-Fi access log, handheld or wearable device proximity data, and visitor data.
      Employee Health Screening and Contact Tracing
      Scans visitor data.
      Field Service Management (com.snc.work_management)
      Scans field service task data.
      Important:

      If you are an on-premise customer with Microsoft Office 365 and you need assistance in configuring Emergency Exposure Management, contact your sales representative or contact ServiceNow Technical Support at https://support.servicenow.com/.

      Role required: sn_imt_diagnosis.diagnostics_admin or admin

      About this task

      Note: You cannot create or run a diagnostic request for affected users who have not consented to use their data for contact tracing. For more information, see User privacy consent for Contact Tracing.

      Procedure

      1. Navigate to Emergency Exposure Management > Create New.
        The Report generation status field is set to Not Initiated and the Active check box is selected.
      2. From the Affected user field, select the user's name.
      3. Click the lock icon (lock icon) in the Tracing system field and select one or more tracing system options to query corresponding data sources.
        You can select multiple sources together for better identification of potentially impacted users.
        Table 1.
        Tracing system

        (Required application/plugin)

        Query
        Location Users co-located with the affected user, for example, on the same floor or building.
        Outlook meetings

        (Microsoft Office 365)

        Users who accepted the same meetings as the affected user during the specified time period.
        Workplace reservations

        (Workplace Safety Management)

        Users who had reservations for the same shifts as the affected user during the specified time period.
        Badge reader

        (Contact Tracing)

        Users who swiped their badge on the same badge reader devices as the affected user, during the specified time period.
        Employee daily log

        (Contact Tracing)

        The list of users with whom the affected users interacted during the specified time period.
        Visitor log

        (Contact Tracing and Employee Health Screening)

        The list of visitors who interacted with the affected user during the specified time period. Visitors who are invited by the affected user and have been screened through and let in are queried.
        Wi-Fi access log

        (Contact Tracing)

        Users who used the same Wi-Fi access points as the affected user during the specified dates.

        Wi-Fi access log data used to identify potentially impacted users depends on the Wi-Fi location preferences and the available integrations.

        For more information, see Retrieving Wi-Fi access log data.

        Note: Data received via a real-time API will be for a period based on the data retention policy of your Wi-Fi service provider.
        Handheld/Wearables

        (Contact Tracing)

        Users using handheld or wearable devices in the close proximity with the affected user for more than the permissible time during the specified time period.
        Field service

        (Field Service Management)

        Customers attended by an affected field agent during the specified time period. Also queries other field agents who interacted with the affected agent or visited the same customer as the affected agent during the specified time period.
      4. When required for a selected tracing system, provide the start and end dates.
        1. In the Start date field, provide the estimated date of infection.

          Because the infection window that you're concerned about may vary, pick a start date such as 14 days prior to the date of reported symptoms.

        2. In the End date field, provide the date of reported symptoms, at least one day prior to today.
      5. Click Save.
        Related lists appear that are filled in after you run a diagnostics report.
      6. Click Run Diagnostics.
        A scheduled job fetches potentially impacted user data from the selected sources and loads the data in corresponding related lists. Refresh a list to see the potentially impacted users immediately.

        If you selected the Handheld/Wearables option, a diagnostic request task is created. Follow the instructions in the task to fetch the potentially exposed users.

        If you selected the Wi-Fi access log option, the Wi-Fi data queried is based on the location preference set for the affected user's location. The available options are:
        • Mist Systems integration: The Wi-Fi data is fetched from Mist Systems when you run the diagnostic request.

          If the site network is Bluetooth LE-enabled and the organization has provided users with a BLE device, the Wi-Fi access using the BLE devices is used to identify potentially exposed users.

        • Cisco DNA Spaces integration: The Wi-Fi data is available based on the Cisco tier value set in the sn_imt_tracing.wifi_log_cisco_tier property:
          • If the wifi_log_report value is set, the data is imported from the Wi-Fi access data files for the specified days from the SFTP server and queried by the location path to identify potentially exposed users.
          • If the proximity_report value is set, a diagnostic request task is created to fetch the potentially exposed users. Follow the instructions in the task to fetch data on potentially impacted users from the selected data source. For more information, see Fetch potentially exposed user data from a data source.
        • Manual import: The Wi-Fi data is imported from a Microsoft Excel spreadsheet into the Wi-Fi Access Register table.
      7. (Optional) Add manually the potentially affected users, for example, users who visited a location with an affected user.
        1. In the Impacted users added manually list, click New.
        2. Select the potentially affected user.
        3. (Optional) Add comments about why you added the user.
          Entering comments helps identify other users who might be potentially impacted by this user if this user starts to show symptoms.
        4. Click Submit.
        The user appears in the Impacted users added manually related list.

      Result

      The related lists display potentially impacted users. The Impacted visitors, Impacted customers, and Impacted field agents related lists appear only if relevant users exist.
      Note: Users who have not consented to use their data are filtered out from the list of potentially impacted users. However, you can add them to the potentially impacted users list manually.
      Table 2.
      Related list Description
      All Impacted users All users who might have been potentially exposed. This list is a combination of all the records in the other related lists.

      Under the Tracing system column, you can see the source of the exposure for an user.

      Impacted users added manually This list is empty unless a user with the sn_imt_diagnosis.diagnostics_admin role manually adds additional potentially impacted users.
      Impacted visitors Visitors invited by the affected user who cleared the health screening and interacted with the affected user during the specified time period.
      Impacted customers Customers added from the field service work order analysis. Potentially impacted customers are determined by the work orders attended by an affected field agent between the specified dates.
      Impacted field agents Field agents added from the field service work order analysis. Potentially impacted field agents are determined if they interacted with an affected agent or visited the same customer as the affected agent between the specified dates.

      If the diagnostics fail to run, click the Show related jobs link to check the status of all jobs that have been launched. You can view the details, including the log message, to determine the reason of failure.

      Note: Failed jobs are automatically retried three times, the default setting in the Emergency Exposure Management properties. To retry the job after you fix the issue, click Reprocess.

      What to do next

      Depending on the applications and plugins installed, you can take the following actions:
      • Click Download Report to download a spreadsheet listing all affected users. The report includes the email address and location of each user, and the source of identification, such as location, workplace reservation, collaboration, badge reader data, or field service work orders. For manually added users, the comment is included.
      • Click Download Visitor Report to download a spreadsheet listing all potentially exposed visitors who met the affected user. The report includes the email address and name of each visitor.
        Note:

        The button is available only when you have selected the Visitor log tracing system.

      • The case manager can create a case for the affected user and add potentially impacted users from the related list to the case to follow up on their health status. For more information, see Create a case for an affected employee.
      • The manager of the affected field agents can take further actions such as blocking their future work order assignments. For more information, see Emergency Exposure Management for field service agents.

      • Fetch potentially exposed user data from a data source

        Work on the diagnostic request task to get information about potentially impacted users from a selected data source and populate the corresponding related lists on the Diagnostic Request form.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login