✏️Prompts

IT & Security Prompts to Save Time On Repetitive Tasks

40 prompts

Triage security alerts by severity and false positive likelihood. Assess indicators, context, and business impact.

IT & Ops

Build chronological incident timeline from logs. Normalize timestamps, identify first malicious action, map lateral movement.

IT & Ops

Build decision framework for escalating to IR, threat intel, or law enforcement based on alert characteristics.

IT & Ops

Create repeatable playbooks for common alerts with roles, data collection, investigation checks, escalation triggers.

IT & Ops

Investigate false positive triggers. Identify legitimate activities to whitelist. Tune baselines and thresholds.

IT & Ops

Create standard handoff template for handing incidents to IR: summary, timeline, evidence, IOCs, open questions.

IT & Ops

Design standardized shift handoff reports: closed incidents, ongoing investigations, escalations, tool issues, alert changes.

IT & Ops

Design patch management process with clear SLAs, test environments, rollback plans, compliance reporting.

IT & Ops

Implement centralized certificate lifecycle management with automation, monitoring, and revocation procedures.

IT & OpsDeveloper

Assess audit readiness by documenting controls, gathering evidence, identifying gaps, preparing audit team.

IT & Ops

Design secure password reset with identity verification, complexity enforcement, session invalidation, logging.

IT & Ops

Create process for receiving and triaging phishing reports: capture details, immediate action, containment, feedback.

IT & Ops

Create troubleshooting guide for VPN and remote access issues with step-by-step user instructions.

IT & Ops

Create device hardening checklist for provisioning: encryption, antivirus, firewall, updates, VPN, backup.

IT & Ops

Create procedure for recognizing security-relevant incidents and escalating to security team while preserving evidence.

IT & Ops

Triage vulnerabilities by CVSS, business context, mitigating controls, and risk. Assign SLAs based on risk score.

IT & Ops

Investigate false positive scan findings to confirm whether vulnerability is actually exploitable.

IT & Ops

Manage application dependencies: inventory SBOM, scan for vulnerabilities, prioritize updates, test, track metrics.

IT & OpsDeveloper

Showing 18 of 40

Filters
40 prompts