- 30 Oct 2024
- 10 Minutes to read
- Print
- PDF
Use Case List
- Updated on 30 Oct 2024
- 10 Minutes to read
- Print
- PDF
Check out the list of available Use Cases.
Technology | Category | Use Case Name | Description |
---|---|---|---|
Active Directory | Active Directory Account | Extend Service Account Validity | Modifies the expiration date of a service account in Active Directory to ensure that it remains active for a longer period, preventing service disruptions. |
Modify User Attributes | Changes attributes of a user in Active Directory, such as title, department, or contact information. | ||
Extend AD Account | Extends the validity or expiration date of an Active Directory account, ensuring continued access for the user. | ||
Notify Service and Generic Account/Password Expiry | Alerts relevant parties of upcoming expirations for service and generic accounts, allowing timely renewal or changes. | ||
Active Directory Security Group | Provide Local PC Admin Access via AD Security Group | Grants administrative privileges on a local PC to users by adding them to a specific Active Directory group, enabling them to perform tasks that require elevated permissions. | |
Provide Access to AWS Account via AD Security Group | Facilitates access to an AWS account by assigning users to a specific Active Directory security group that is linked to AWS account permissions. | ||
Install Printer Driver on Laptops via Security Group | Distributes and installs printer drivers on laptops by assigning the devices to a security group in Active Directory, automating the deployment process. | ||
Manage Security Group Owners and Managers | Oversees and updates the owners and managers of security groups in Active Directory, ensuring that the right individuals have control over group membership and permissions. | ||
Install Software and Add Computer to Security Group | Installs software and adds a computer to a security group within Active Directory, ensuring proper access and configuration for the system. | ||
Modify Attributes of Security Group | Updates or changes attributes of a security group within Active Directory, such as description, scope, or membership. | ||
Manage Users in Active Directory Groups | Handles the addition, removal, and updating of users within Active Directory groups, ensuring accurate group membership. | ||
Ansible | Ansible | Trigger Ansible Playbook | Executes an Ansible playbook, automating IT tasks such as configuration management, application deployment, and orchestration. |
ArcSight | ArcSight | ArcSight Logger - Add New Server to Fetch Logs | Adds a new server to the ArcSight Logger system, enabling it to fetch and store logs from that server for monitoring and analysis. |
Create Amazon Elastic Container Service in AWS | Sets up a new Amazon Elastic Container Service (ECS) in AWS, allowing for the deployment and management of containerized applications. | ||
AWS | AWS | AWS Master & Transaction Data Sync | Synchronizes master and transaction data between AWS services, ensuring consistency and accuracy across the environment. |
Azure | Azure | Azure Master & Transaction Data Sync | Ensures synchronization of master and transaction data across Azure services, maintaining data integrity and consistency. |
Azure AD | Azure AD Security Group | Azure - Modify User Security Group Membership | Changes a user's membership in security groups within Azure, adjusting their access and permissions accordingly. |
Sync Azure AD | Synchronizes Active Directory data with Azure AD, ensuring that user and group information is consistent across on-premises and cloud environments. | ||
Azure SQL DB | Azure SQL DB | Create SQL Database on Azure | Provisions a new SQL database within Azure, enabling the storage and management of relational data. |
Azure | Azure VM | Cloud Management - Azure - VM Operations - Add Lock | Applies a lock to a virtual machine in Azure to prevent accidental deletion or modification. |
Cloud Management - Azure - VM Operations - AutoManage | Configures AutoManage for a virtual machine in Azure, automating best practices for monitoring, backup, and security. | ||
Cloud Management - Azure - VM Operations - Change Security Group | Modifies the security group associated with a virtual machine in Azure, altering its network access rules. | ||
Cloud Management - Azure - VM Operations - Change Resource Group | Moves a virtual machine to a different resource group in Azure, changing its organizational context. | ||
Cloud Management - Azure - VM Operations - Attach Network Interface | Attaches a new network interface to a virtual machine in Azure, adding additional network connectivity options. | ||
Cloud Management - Azure - VM Operations - Detach Network Interface | Removes a network interface from a virtual machine in Azure, reducing its network connectivity. | ||
Cloud Management - Azure - VM Operations - Add Tags | Adds metadata tags to a virtual machine in Azure, aiding in organization, billing, and management. | ||
Cisco | Cisco ISE | Add Mac Address to Whitelist in Cisco ISE | Includes a device's MAC address in the whitelist on Cisco Identity Services Engine (ISE), allowing it access to the network. |
Cisco UCSM | Cisco UCSM - Create a Service Profile using UCSM | Creates a new service profile in Cisco UCS Manager, defining the configuration and policies for a server. | |
Cisco UCSM - Associate Service Profile to the Server | Links a service profile to a physical server in Cisco UCS Manager, applying the profile's settings to the server. | ||
Cisco UCSM - Create and Attach a Boot Policy with SAN Boot Details | Develops a boot policy in Cisco UCS Manager and attaches it to a server, specifying boot options such as SAN boot. | ||
Cisco UCSM - Install the Operating System on the Physical Server | Deploys an operating system on a physical server through Cisco UCS Manager, preparing the server for use. | ||
Dell NetWorker | Dell NetWorker | Perform EMC Networker Backup | Executes a backup operation using EMC Networker, safeguarding data on a client or server. |
EMC Networker - Create a New Client | Registers a new client with EMC Networker, configuring it for backup and recovery operations. | ||
EMC Networker - Add Client or VM to Protection Groups, Pools & Update Other Attributes | Incorporates a client or virtual machine into protection groups and pools within EMC Networker, and updates its attributes. | ||
EMC Networker - Trigger an On-Demand Backup for the Client or VM | Initiates an immediate backup of a client or virtual machine using EMC Networker, ensuring its data is secured. | ||
End user Automation | End user Automation | Modify Time zone Settings | Changes the timezone configuration on a system, aligning it with the correct regional time. |
Configure Proxy Settings | Sets up or alters the proxy server settings on a system, directing network traffic through the proxy. | ||
IT Asset | Transfer Asset Location | Updates the recorded location of an asset within an inventory or asset management system. | |
Transfer Asset Ownership to Another Department | Changes the ownership of an asset from one department to another within an organization. | ||
Request Asset Location Transfer | Submits a request to move an asset from one physical location to another. | ||
Asset Owner Change Within Department | Modifies the recorded owner of an asset within the same department. | ||
Request Asset Owner Change to Different Department | Requests a change in asset ownership to a different department within an organization. | ||
Request Asset Owner Change Within Department | Requests a change in asset ownership within the same department. | ||
Deallocate Assets | Removes an asset from active use and updates its status in the asset management system. | ||
End user Automation | Manage Wi-Fi Access | Configures and manages access to a Wi-Fi network, including adding or removing users. | |
Manage Internet Special Access | Handles special access requests to the internet, granting or restricting access based on policies. | ||
Revoke External Email Access | Removes the ability of a user or group to send or receive emails from external domains. | ||
Register USB Devices | Registers USB devices for use within an organization, ensuring they comply with security policies. | ||
Configure PC Printers Using SummitAI ITAM Agent | Sets up printers on PCs using the SummitAI ITAM Agent, streamlining printer configuration. | ||
Google Cloud Platform | Google Cloud Platform | Google Cloud Master & Transaction Data Sync | Synchronizes master and transaction data within Google Cloud, maintaining data integrity across services. |
Google Workspace | Google Workspace | Google Workspace Data Sync | Synchronizes data across Google Workspace services, ensuring consistency and accuracy. |
Google Workspace Group | Google Workspace Group Modification | Alters the membership or settings of a group within Google Workspace. | |
Create Groups in Google Workspace | Sets up new groups within Google Workspace for organizing users and permissions. | ||
Google Workspace Users | Add User to Group in Google Workspace | Adds a user to a group within Google Workspace, managing their access to shared resources. | |
Google Workspace User Creation | Creates a new user account in Google Workspace, provisioning access to various services. | ||
Lotus Notes | Lotus Notes User account | Create User Accounts in Lotus Notes | Creates new user accounts within Lotus Notes, providing access to email and collaboration tools. |
Delete User Accounts in Lotus Notes | Removes user accounts from Lotus Notes, revoking access to email and other services. | ||
Microsoft Intune | Microsoft Intune | Azure Intune Application Data Sync | Synchronizes application data within Azure Intune, ensuring devices are properly managed. |
MS Exchange | Mailbox | Manage User Mailbox Settings on On-Premise Exchange | Adjusts the settings of user mailboxes hosted on an on-premise Microsoft Exchange server. |
Increase Mailbox Size in Exchange | Expands the storage capacity of a user's mailbox on an Exchange server, preventing issues with space limitations. | ||
Manage On-Premise Mailboxes | Handles various tasks related to on-premise Exchange mailboxes, such as creation, modification, and deletion. | ||
MyDay | MyDay | Integrate MyDay Application for Manual Tasks in Employee Onboarding | Configures the MyDay application to assist with manual tasks during employee onboarding processes. |
SAP SuccessFactors | SAP SuccessFactors | Integrate SAP SuccessFactors for Employee Onboarding | Sets up SAP SuccessFactors integration to streamline employee onboarding processes. |
SolarWinds IPAM | SolarWinds IPAM | Reserve IP Address in SolarWinds IPAM | Reserves a specific IP address in SolarWinds IP Address Manager (IPAM) for future use. |
Symantec Antivirus | Symantec Antivirus | Enable/Disable Symantec Antivirus Policy | Activates or deactivates antivirus policies within Symantec, controlling security settings. |
SymphonyAI Enterprise IT | SymphonyAI Enterprise IT - Asset Management | Copy Attributes from Service Requests to Assets During Allocation | Transfers attributes from service requests to assets when they are allocated, ensuring accurate tracking. |
SymphonyAI Enterprise IT - Service Management | Import Shift Roaster | Imports a shift roster into the system, automating schedule management. | |
SymphonyAI Enterprise IT - Service Management | Assign Service Requests to Workgroups Based on Configuration | Automatically assigns service requests to the appropriate workgroups based on predefined configurations. | |
SymphonyAI Enterprise IT - Service Management | Assign Incidents to Workgroups Based on Configuration | Automatically routes incidents to the correct workgroups according to predefined rules. | |
SymphonyAI Enterprise IT - Service Management | Create Multiple Service Requests from One Service Request | Generates multiple related service requests from a single original service request to handle complex tasks. | |
SymphonyAI Enterprise IT - Service Management | Create Service Requests When Resolving Related Service Requests | Automatically creates new service requests when resolving related requests, ensuring that all tasks are tracked. | |
SymphonyAI Enterprise IT - Incident Management | Update Incident Priority Based on Store Type, Location, and Month | Adjusts the priority of incidents dynamically based on factors such as store type, geographic location, and time of year. | |
SymphonyAI Enterprise IT - Users | Deactivate SummitAI Users from SummitAI Web Application | Disables user accounts within the SummitAI web application, preventing further access. | |
SymphonyAI Enterprise IT - Service Management | Upload Attachments in Summit ITSM Ticket | Adds files or documents as attachments to tickets within the Summit ITSM system. | |
SymphonyAI Enterprise IT - Service Management | Service Request - Customized Operations (WO Create/Resolve) | Performs customized operations on service requests, such as creating or resolving work orders. | |
SymphonyAI Enterprise IT - Service Management | Change Request Update based on Linked Service Request | Updates a change request automatically when a linked service request is modified. | |
Terraform | Terraform | Provision Cloud Resources Using Terraform - Azure VM Instance | Deploys virtual machine instances in Azure using Terraform scripts, automating infrastructure provisioning. |
Provision Cloud Resources Using Terraform - Azure Container | Creates container instances in Azure using Terraform, enabling containerized application deployment. | ||
Provision Cloud Resources Using Terraform - Azure Storage | Sets up storage resources in Azure using Terraform, automating the provisioning of storage accounts and blobs. | ||
Provision Cloud Resources Using Terraform - AWS EC2 | Launches EC2 instances in AWS using Terraform, automating the setup of virtual machines in the cloud. | ||
Provision Cloud Resources Using Terraform - AWS Container | Deploys containerized applications in AWS using Terraform scripts, streamlining container management. | ||
Provision Cloud Resources Using Terraform - AWS S3 Bucket | Creates S3 buckets in AWS using Terraform, automating the provisioning of storage resources. | ||
Provision Cloud Resources Using Terraform - GCP VM Instance | Provisions virtual machine instances in Google Cloud Platform (GCP) using Terraform, automating infrastructure setup. | ||
Provision Cloud Resources Using Terraform - GCP Container | Deploys container instances in GCP using Terraform, facilitating the management of containerized workloads. | ||
Provision Cloud Resources Using Terraform - GCP Bucket | Sets up storage buckets in GCP using Terraform, automating the creation and configuration of storage resources. | ||
VMware vCenter | VMware vCenter | Configure NIC Cards with Reserved IP Address for a VM on vCenter | Configures network interface cards with reserved IP addresses for virtual machines managed by vCenter. |
Configure Hard Disks for a VM on vCenter | Adjusts the configuration of hard disks for virtual machines on vCenter, managing storage allocations. | ||
Set Hostname for a VM on vCenter | Assigns or changes the hostname for a virtual machine on vCenter, ensuring correct network identification. | ||
Local Account Creation for a VM on vCenter | Creates local user accounts on virtual machines managed by vCenter, allowing for direct access. | ||
Page File Configuration for a VM on vCenter | Configures the page file settings for a virtual machine on vCenter, optimizing virtual memory usage. | ||
Domain Join for a VM on vCenter | Joins a virtual machine managed by vCenter to a domain, integrating it into the organization's network. | ||
Windows License Activation for a VM on vCenter | Activates the Windows operating system license for a virtual machine on vCenter, ensuring compliance. | ||
Windows | Windows | Create and Share Folder Using DFS | Sets up and shares folders using Distributed File System (DFS), enabling organized and accessible file storage. |
Free Up Disk Space on Windows Systems | Performs tasks to free up disk space on Windows systems, such as deleting temporary files and clearing caches. | ||
Grant Share Folder Access via DFS | Provides access to shared folders managed by DFS, ensuring users have the necessary permissions. | ||
Restart Windows Service (LPD service) | Restarts the Line Printer Daemon (LPD) service on a Windows system, resolving issues related to print services. | ||
Revoke Shared Folder Access | Removes user access to shared folders, revoking their ability to view or modify the contents. | ||
Yellow.ai | Yellow.ai | Integrate Yellow.ai with Employee Communication on WhatsApp | Sets up the integration between Yellow.ai and WhatsApp to facilitate employee communication through automated messaging. |