Use Case List
  • 30 Oct 2024
  • 10 Minutes to read
  • PDF

Use Case List

  • PDF

Article summary

Check out the list of available Use Cases.

Technology

Category

Use Case Name

Description

Active Directory

Active Directory Account

Extend Service Account Validity

Modifies the expiration date of a service account in Active Directory to ensure that it remains active for a longer period, preventing service disruptions.

Modify User Attributes

Changes attributes of a user in Active Directory, such as title, department, or contact information.

Extend AD Account

Extends the validity or expiration date of an Active Directory account, ensuring continued access for the user.

Notify Service and Generic Account/Password Expiry

Alerts relevant parties of upcoming expirations for service and generic accounts, allowing timely renewal or changes.

Active Directory Security Group

Provide Local PC Admin Access via AD Security Group

Grants administrative privileges on a local PC to users by adding them to a specific Active Directory group, enabling them to perform tasks that require elevated permissions.

Provide Access to AWS Account via AD Security Group

Facilitates access to an AWS account by assigning users to a specific Active Directory security group that is linked to AWS account permissions.

Install Printer Driver on Laptops via Security Group

Distributes and installs printer drivers on laptops by assigning the devices to a security group in Active Directory, automating the deployment process.

Manage Security Group Owners and Managers

Oversees and updates the owners and managers of security groups in Active Directory, ensuring that the right individuals have control over group membership and permissions.

Install Software and Add Computer to Security Group

Installs software and adds a computer to a security group within Active Directory, ensuring proper access and configuration for the system.

Modify Attributes of Security Group

Updates or changes attributes of a security group within Active Directory, such as description, scope, or membership.

Manage Users in Active Directory Groups

Handles the addition, removal, and updating of users within Active Directory groups, ensuring accurate group membership.

Ansible

Ansible

Trigger Ansible Playbook

Executes an Ansible playbook, automating IT tasks such as configuration management, application deployment, and orchestration.

ArcSight

ArcSight

ArcSight Logger - Add New Server to Fetch Logs

Adds a new server to the ArcSight Logger system, enabling it to fetch and store logs from that server for monitoring and analysis.

Create Amazon Elastic Container Service in AWS

Sets up a new Amazon Elastic Container Service (ECS) in AWS, allowing for the deployment and management of containerized applications.

AWS

AWS

AWS Master & Transaction Data Sync

Synchronizes master and transaction data between AWS services, ensuring consistency and accuracy across the environment.

Azure

Azure

Azure Master & Transaction Data Sync

Ensures synchronization of master and transaction data across Azure services, maintaining data integrity and consistency.

Azure AD

Azure AD Security Group

Azure - Modify User Security Group Membership

Changes a user's membership in security groups within Azure, adjusting their access and permissions accordingly.

Sync Azure AD

Synchronizes Active Directory data with Azure AD, ensuring that user and group information is consistent across on-premises and cloud environments.

Azure SQL DB

Azure SQL DB

Create SQL Database on Azure

Provisions a new SQL database within Azure, enabling the storage and management of relational data.

Azure

Azure VM

Cloud Management - Azure - VM Operations - Add Lock

Applies a lock to a virtual machine in Azure to prevent accidental deletion or modification.

Cloud Management - Azure - VM Operations - AutoManage

Configures AutoManage for a virtual machine in Azure, automating best practices for monitoring, backup, and security.

Cloud Management - Azure - VM Operations - Change Security Group

Modifies the security group associated with a virtual machine in Azure, altering its network access rules.

Cloud Management - Azure - VM Operations - Change Resource Group

Moves a virtual machine to a different resource group in Azure, changing its organizational context.

Cloud Management - Azure - VM Operations - Attach Network Interface

Attaches a new network interface to a virtual machine in Azure, adding additional network connectivity options.

Cloud Management - Azure - VM Operations - Detach Network Interface

Removes a network interface from a virtual machine in Azure, reducing its network connectivity.

Cloud Management - Azure - VM Operations - Add Tags

Adds metadata tags to a virtual machine in Azure, aiding in organization, billing, and management.

Cisco

Cisco ISE

Add Mac Address to Whitelist in Cisco ISE

Includes a device's MAC address in the whitelist on Cisco Identity Services Engine (ISE), allowing it access to the network.

Cisco UCSM

Cisco UCSM - Create a Service Profile using UCSM

Creates a new service profile in Cisco UCS Manager, defining the configuration and policies for a server.

Cisco UCSM - Associate Service Profile to the Server

Links a service profile to a physical server in Cisco UCS Manager, applying the profile's settings to the server.

Cisco UCSM - Create and Attach a Boot Policy with SAN Boot Details

Develops a boot policy in Cisco UCS Manager and attaches it to a server, specifying boot options such as SAN boot.

Cisco UCSM - Install the Operating System on the Physical Server

Deploys an operating system on a physical server through Cisco UCS Manager, preparing the server for use.

Dell NetWorker

Dell NetWorker

Perform EMC Networker Backup

Executes a backup operation using EMC Networker, safeguarding data on a client or server.

EMC Networker - Create a New Client

Registers a new client with EMC Networker, configuring it for backup and recovery operations.

EMC Networker - Add Client or VM to Protection Groups, Pools & Update Other Attributes

Incorporates a client or virtual machine into protection groups and pools within EMC Networker, and updates its attributes.

EMC Networker - Trigger an On-Demand Backup for the Client or VM

Initiates an immediate backup of a client or virtual machine using EMC Networker, ensuring its data is secured.

End user Automation

End user Automation

Modify Time zone Settings

Changes the timezone configuration on a system, aligning it with the correct regional time.

Configure Proxy Settings

Sets up or alters the proxy server settings on a system, directing network traffic through the proxy.

IT Asset

Transfer Asset Location

Updates the recorded location of an asset within an inventory or asset management system.

Transfer Asset Ownership to Another Department

Changes the ownership of an asset from one department to another within an organization.

Request Asset Location Transfer

Submits a request to move an asset from one physical location to another.

Asset Owner Change Within Department

Modifies the recorded owner of an asset within the same department.

Request Asset Owner Change to Different Department

Requests a change in asset ownership to a different department within an organization.

Request Asset Owner Change Within Department

Requests a change in asset ownership within the same department.

Deallocate Assets

Removes an asset from active use and updates its status in the asset management system.

End user Automation

Manage Wi-Fi Access

Configures and manages access to a Wi-Fi network, including adding or removing users.

Manage Internet Special Access

Handles special access requests to the internet, granting or restricting access based on policies.

Revoke External Email Access

Removes the ability of a user or group to send or receive emails from external domains.

Register USB Devices

Registers USB devices for use within an organization, ensuring they comply with security policies.

Configure PC Printers Using SummitAI ITAM Agent

Sets up printers on PCs using the SummitAI ITAM Agent, streamlining printer configuration.

Google Cloud Platform

Google Cloud Platform

Google Cloud Master & Transaction Data Sync

Synchronizes master and transaction data within Google Cloud, maintaining data integrity across services.

Google Workspace

Google Workspace

Google Workspace Data Sync

Synchronizes data across Google Workspace services, ensuring consistency and accuracy.

Google Workspace Group

Google Workspace Group Modification

Alters the membership or settings of a group within Google Workspace.

Create Groups in Google Workspace

Sets up new groups within Google Workspace for organizing users and permissions.

Google Workspace Users

Add User to Group in Google Workspace

Adds a user to a group within Google Workspace, managing their access to shared resources.

Google Workspace User Creation

Creates a new user account in Google Workspace, provisioning access to various services.

Lotus Notes

Lotus Notes User account

Create User Accounts in Lotus Notes

Creates new user accounts within Lotus Notes, providing access to email and collaboration tools.

Delete User Accounts in Lotus Notes

Removes user accounts from Lotus Notes, revoking access to email and other services.

Microsoft Intune

Microsoft Intune

Azure Intune Application Data Sync

Synchronizes application data within Azure Intune, ensuring devices are properly managed.

MS Exchange

Mailbox

Manage User Mailbox Settings on On-Premise Exchange

Adjusts the settings of user mailboxes hosted on an on-premise Microsoft Exchange server.

Increase Mailbox Size in Exchange

Expands the storage capacity of a user's mailbox on an Exchange server, preventing issues with space limitations.

Manage On-Premise Mailboxes

Handles various tasks related to on-premise Exchange mailboxes, such as creation, modification, and deletion.

MyDay

MyDay

Integrate MyDay Application for Manual Tasks in Employee Onboarding

Configures the MyDay application to assist with manual tasks during employee onboarding processes.

SAP SuccessFactors

SAP SuccessFactors

Integrate SAP SuccessFactors for Employee Onboarding

Sets up SAP SuccessFactors integration to streamline employee onboarding processes.

SolarWinds IPAM

SolarWinds IPAM

Reserve IP Address in SolarWinds IPAM

Reserves a specific IP address in SolarWinds IP Address Manager (IPAM) for future use.

Symantec Antivirus

Symantec Antivirus

Enable/Disable Symantec Antivirus Policy

Activates or deactivates antivirus policies within Symantec, controlling security settings.

SymphonyAI Enterprise IT

SymphonyAI Enterprise IT - Asset Management

Copy Attributes from Service Requests to Assets During Allocation

Transfers attributes from service requests to assets when they are allocated, ensuring accurate tracking.

SymphonyAI Enterprise IT - Service Management

Import Shift Roaster

Imports a shift roster into the system, automating schedule management.

SymphonyAI Enterprise IT - Service Management

Assign Service Requests to Workgroups Based on Configuration

Automatically assigns service requests to the appropriate workgroups based on predefined configurations.

SymphonyAI Enterprise IT - Service Management

Assign Incidents to Workgroups Based on Configuration

Automatically routes incidents to the correct workgroups according to predefined rules.

SymphonyAI Enterprise IT - Service Management

Create Multiple Service Requests from One Service Request

Generates multiple related service requests from a single original service request to handle complex tasks.

SymphonyAI Enterprise IT - Service Management

Create Service Requests When Resolving Related Service Requests

Automatically creates new service requests when resolving related requests, ensuring that all tasks are tracked.

SymphonyAI Enterprise IT - Incident Management

Update Incident Priority Based on Store Type, Location, and Month

Adjusts the priority of incidents dynamically based on factors such as store type, geographic location, and time of year.

SymphonyAI Enterprise IT - Users

Deactivate SummitAI Users from SummitAI Web Application

Disables user accounts within the SummitAI web application, preventing further access.

SymphonyAI Enterprise IT - Service Management

Upload Attachments in Summit ITSM Ticket

Adds files or documents as attachments to tickets within the Summit ITSM system.

SymphonyAI Enterprise IT - Service Management

Service Request - Customized Operations (WO Create/Resolve)

Performs customized operations on service requests, such as creating or resolving work orders.

SymphonyAI Enterprise IT - Service Management

Change Request Update based on Linked Service Request

Updates a change request automatically when a linked service request is modified.

Terraform

Terraform

Provision Cloud Resources Using Terraform - Azure VM Instance

Deploys virtual machine instances in Azure using Terraform scripts, automating infrastructure provisioning.

Provision Cloud Resources Using Terraform - Azure Container

Creates container instances in Azure using Terraform, enabling containerized application deployment.

Provision Cloud Resources Using Terraform - Azure Storage

Sets up storage resources in Azure using Terraform, automating the provisioning of storage accounts and blobs.

Provision Cloud Resources Using Terraform - AWS EC2

Launches EC2 instances in AWS using Terraform, automating the setup of virtual machines in the cloud.

Provision Cloud Resources Using Terraform - AWS Container

Deploys containerized applications in AWS using Terraform scripts, streamlining container management.

Provision Cloud Resources Using Terraform - AWS S3 Bucket

Creates S3 buckets in AWS using Terraform, automating the provisioning of storage resources.

Provision Cloud Resources Using Terraform - GCP VM Instance

Provisions virtual machine instances in Google Cloud Platform (GCP) using Terraform, automating infrastructure setup.

Provision Cloud Resources Using Terraform - GCP Container

Deploys container instances in GCP using Terraform, facilitating the management of containerized workloads.

Provision Cloud Resources Using Terraform - GCP Bucket

Sets up storage buckets in GCP using Terraform, automating the creation and configuration of storage resources.

VMware vCenter

VMware vCenter

Configure NIC Cards with Reserved IP Address for a VM on vCenter

Configures network interface cards with reserved IP addresses for virtual machines managed by vCenter.

Configure Hard Disks for a VM on vCenter

Adjusts the configuration of hard disks for virtual machines on vCenter, managing storage allocations.

Set Hostname for a VM on vCenter

Assigns or changes the hostname for a virtual machine on vCenter, ensuring correct network identification.

Local Account Creation for a VM on vCenter

Creates local user accounts on virtual machines managed by vCenter, allowing for direct access.

Page File Configuration for a VM on vCenter

Configures the page file settings for a virtual machine on vCenter, optimizing virtual memory usage.

Domain Join for a VM on vCenter

Joins a virtual machine managed by vCenter to a domain, integrating it into the organization's network.

Windows License Activation for a VM on vCenter

Activates the Windows operating system license for a virtual machine on vCenter, ensuring compliance.

Windows

Windows

Create and Share Folder Using DFS

Sets up and shares folders using Distributed File System (DFS), enabling organized and accessible file storage.

Free Up Disk Space on Windows Systems

Performs tasks to free up disk space on Windows systems, such as deleting temporary files and clearing caches.

Grant Share Folder Access via DFS

Provides access to shared folders managed by DFS, ensuring users have the necessary permissions.

Restart Windows Service (LPD service)

Restarts the Line Printer Daemon (LPD) service on a Windows system, resolving issues related to print services.

Revoke Shared Folder Access

Removes user access to shared folders, revoking their ability to view or modify the contents.

Yellow.ai

Yellow.ai

Integrate Yellow.ai with Employee Communication on WhatsApp

Sets up the integration between Yellow.ai and WhatsApp to facilitate employee communication through automated messaging.



Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.