Compile recent security audit results for [System], including a comprehensive list of identified vulnerabilities, weaknesses, and compliance gaps found during the audit
Generate an email template for notifying users about a scheduled maintenance window for [Service], ensuring that the content is clear, concise, and highlights the potential impact on user access
Retrieve compliance documentation for [Regulation], including a comprehensive overview of the regulatory requirements, guidelines, and standards that need to be adhered to for [Organization]
Analyze access control logs for [User] in [System] over the past [Time Period]. Include records of all successful and failed login attempts, listing the specific [IP Address] or [Device ID] and authentication method
Locate vulnerability reports for [Software]. For each vulnerability, provide specific details on the affected components and include the severity ratings