Curated Use-cases

Curated use-cases provide predefined, guided chat scenarios for common network operations and troubleshooting workflows. They are designed to simplify day-to-day tasks, accelerate issue resolution, and deliver actionable insights across your network.

NCP supports a wide range of use cases. However, your access to specific use-cases may vary based on your current license tier. If you see a use-case that's not available to you, you can request access through your administrator

Available Use-Cases

Basic NetOps

Perform day-to-day operational checks and health validation across the network.

  • Inspect device and interface details

  • Monitor recent reboots, link-down events, and configuration changes

  • Track recent software upgrades and validate upgrade status

  • Analyze hardware and OS distribution using visual summaries

  • Review CPU and memory utilization for targeted devices

  • Identify free and available ports across the network

Flow Analytics

Analyze and visualize network traffic to understand usage patterns and detect anomalies.

  • Identify peak traffic periods and top talkers

  • Analyze application and protocol distribution

  • Track traffic trends using historical and real-time data

  • Optimize capacity and performance

Inventory Insights

Quickly answer inventory-related questions across your infrastructure.

  • List all devices and their roles

  • View vendor, model, and OS versions

  • Analyze hardware types and CPU/memory distribution

  • Supports both real-time data and offline uploads (Excel / CSV / JSON)

Knowledge Base

Query internal and external knowledge sources to support operations and planning.

  • Retrieve playbooks, SOPs, and onboarding guides

  • Track known issues, advisories, and lifecycle milestones

  • Identify applicable CVEs and vendor notifications

Security Audit

Perform security and compliance checks across the network.

  • Validate access controls and authentication settings

  • Detect policy violations and misconfigurations

  • Identify outdated firmware, expired certificates, or rogue devices

  • Generate audit reports for compliance reviews

Upgrade Compliance

Monitor and validate software upgrade progress across devices.

  • Track OS upgrade history

  • Identify non-compliant devices

  • Compare pre- and post-upgrade states

  • Generate compliance and audit reports

Last updated

Was this helpful?