ITOM Visibility and CMDB tables
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- ITOM Visibility
ITOM Visibility manages and uses CMDB tables. Several ServiceNow products benefit from and add value to ITOM Visibility.
Tables that ITOM Visibility manages

- Mapped application service tables
The tables that ITOM Visibility manages depend on the method used to map the application service. You can use the Application Service wizard to populate an application service.
- Map the application service using top-down discovery of CI connections. This method requires Service Mapping, the sm_admin role, and the current domain must be a leaf domain. This is the best option for accuracy and complete mapping. ITOM Visibility manages the Mapped Application Service table [cmdb_ci_service_discovered]
- Map the application service using a tag list or tag family. This method requires Service Mapping and is preferred for public or private cloud where tags are typically used. ITOM Visibility manages the tag-based maps table [cmdb_ci_service_by_tags].
- Manually map the application service. This method requires that you select specific CIs — no automation is used. ITOM Visibility manages the service maps table [cmdb_ci_service_manual].
- Use Dynamic Service to synchronize manually-created CI relationships to a Service Map view.
- Configuration items (CIs) tables [cmdb_ci_*]
- Application table [cmdb_ci_appl]
- Server table [cmdb_ci_server]
- Virtual machines table [cmdb_ci_vm_instance]
- Load balancer table [cmdb_ci_lb]
- Network gear table [cmdb_ci_netgear]
Tables that ITOM Visibility uses
- Dynamic CI Group table [cmdb_ci_query_based_service]
- Product model tables (for Technology Portfolio Management [TPM]) software and hardware models

Products that benefit from ITOM Visibility
- IT Service Management
- Customer Service Management (CSM)
- Event Management
- Cloud Management
- Asset Management (Hardware Asset Management and Software Asset Management)
- Strategic Portfolio Management (Financial Management — Showback statements, Application Portfolio Management [ APM ])
- Security Operations (Incident Response, software vulnerability management)
Implementing CMDB data
For details on implementing CMDB data to conform with the CSDM framework, see Implementing the CSDM framework in stages.