AI Prompts for IT
10 copy-paste AI prompts for IT teams, covering incident playbooks, KB articles, vendor evaluation, security policies, and change management documentation.
Key Insight
Customize every variable with specific context. Generic inputs produce generic output. Iterate on the first response to refine tone, detail, and format for your exact use case.
How to Get Better Results from These Prompts
Replace every variable in curly braces with your specific context. More detail in the variables produces more useful output. After the first response, iterate: ask the AI to adjust tone, expand a section, or reformat for a different audience. These prompts work with ChatGPT, Claude, Gemini, or ClickUp Brain.
When to Use AI Prompts vs Full Automation
Use prompts for tasks that need human review and judgment. Automate tasks that follow predictable rules. Start with prompts to learn what AI handles well for your team, then identify the workflows worth automating.
How to AI Prompts for IT in 10 Steps
- 1 Write a Knowledge Base Article
- 2 Create an Incident Response Playbook
- 3 Build a Vendor Evaluation Matrix
- 4 Draft a Security Awareness Training Module
- 5 Write a System Migration Checklist
- 6 Create an IT Budget Justification
- 7 Draft an Access Control Policy
- 8 Generate a Disaster Recovery Test Plan
- 9 Write a Change Management Request
- 10 Create an SLA Performance Report
1
Write a Knowledge Base Article
You are an IT support specialist. Create a knowledge base article from the following resolved ticket. Ticket summary: {TICKET_SUMMARY} Resolution steps: {RESOLUTION_STEPS} Affected system: {SYSTEM} User role: {USER_ROLE} Frequency: {HOW_OFTEN_REPORTED} Write an article that: - Title: Action-oriented ("How to..." or "Fix...") - Problem description: What the user experiences (symptoms, error messages) - Root cause: Brief explanation of why this happens - Solution: Step-by-step instructions with screenshots placeholder notes - Prevention: How to avoid this in the future - Related articles: {RELATED_TOPICS} Write for the end user, not IT. No jargon without explanation. Under 500 words.
2
Create an Incident Response Playbook
You are an IT operations manager. Create an incident response playbook for {INCIDENT_TYPE} (e.g., DDoS attack, data breach, service outage, ransomware). Environment: {ENVIRONMENT} Critical systems: {SYSTEMS} Team structure: {TEAM_ROLES} Escalation contacts: {CONTACTS} SLA requirements: {SLA} Include: 1. Detection criteria (how do we know this is happening?) 2. Severity classification matrix 3. Immediate response actions (first 15 minutes) 4. Investigation steps (15 to 60 minutes) 5. Mitigation actions by severity level 6. Communication templates (internal, customer, executive) 7. Recovery procedures 8. Post-incident review checklist 9. Regulatory notification requirements Each step should name the responsible role and estimated time.
3
Build a Vendor Evaluation Matrix
You are an IT procurement specialist. Create a vendor evaluation matrix for {PRODUCT_CATEGORY}. Business requirements: {REQUIREMENTS} Technical requirements: {TECHNICAL_REQS} Budget: {BUDGET} Timeline: {TIMELINE} Vendors to evaluate: {VENDOR_1}, {VENDOR_2}, {VENDOR_3} Create a matrix with: 1. Evaluation criteria (10 to 15 items across functionality, security, integration, support, pricing) 2. Weight for each criterion (totaling 100%) 3. Scoring rubric (1 to 5 scale with definitions for each score) 4. RFP questions for each criterion 5. Reference check questions 6. Total cost of ownership calculation framework 7. Decision recommendation template Include criteria for data security, compliance, and exit strategy.
4
Draft a Security Awareness Training Module
You are a security awareness trainer. Create a training module on {SECURITY_TOPIC} (e.g., phishing, password hygiene, social engineering, data handling). Audience: {AUDIENCE} (all employees, executives, developers) Industry: {INDUSTRY} Recent incidents: {RELEVANT_INCIDENTS} Compliance requirement: {COMPLIANCE} Provide: 1. Learning objectives (3 to 5) 2. Key concepts with real-world examples 3. Interactive scenario: present a realistic situation and ask what the correct action is 4. Common mistakes and why people make them 5. Quick reference card (fit on one page) 6. Quiz questions (5 multiple choice with explanations) 7. Resources for further reading Tone: Practical, not condescending. Employees tune out fear-based security training.
5
Write a System Migration Checklist
You are a systems engineer planning a migration. Create a comprehensive migration checklist for {MIGRATION_TYPE} (e.g., email to Microsoft 365, on-prem to AWS, legacy CRM to Salesforce). Source system: {SOURCE} Target system: {TARGET} Users affected: {USER_COUNT} Data volume: {DATA_VOLUME} Downtime window: {DOWNTIME_WINDOW} Integrations: {INTEGRATIONS} Checklist phases: 1. Pre-migration (assessment, backup, communication) 2. Data migration (extraction, transformation, loading, validation) 3. Configuration (settings, permissions, integrations) 4. Testing (functional, performance, user acceptance) 5. Cutover (go-live steps in order) 6. Post-migration (monitoring, support, cleanup) 7. Rollback plan (triggers and steps) For each item: owner, estimated time, dependency, and verification method.
6
Create an IT Budget Justification
You are an IT director. Write a budget justification for {INITIATIVE}. Initiative: {INITIATIVE_DESCRIPTION} Requested budget: {AMOUNT} Timeline: {TIMELINE} Current state: {CURRENT_STATE} Proposed state: {PROPOSED_STATE} Alternatives considered: {ALTERNATIVES} Provide: 1. Executive summary (3 sentences) 2. Problem statement with business impact (quantified) 3. Proposed solution with scope 4. Cost breakdown (hardware, software, labor, training) 5. Expected ROI with timeline 6. Risk of not investing (quantified if possible) 7. Implementation timeline with milestones 8. Success metrics Speak in business outcomes, not technical specifications. CFOs approve business cases, not architecture diagrams.
7
Draft an Access Control Policy
You are an IT security manager. Draft an access control policy for {COMPANY_NAME}. Company size: {COMPANY_SIZE} Industry: {INDUSTRY} Compliance requirements: {COMPLIANCE} Identity provider: {IDP} Critical systems: {SYSTEMS} Include sections for: 1. Policy purpose and scope 2. Access request and approval process 3. Role-based access control (RBAC) framework 4. Least privilege principle implementation 5. Privileged access management 6. Access review cadence (quarterly, annual) 7. Offboarding and access revocation (timeline requirements) 8. Service account management 9. Third-party and vendor access 10. Monitoring and audit logging 11. Exceptions process 12. Violations and consequences
8
Generate a Disaster Recovery Test Plan
You are a business continuity manager. Create a disaster recovery test plan for {SYSTEM_OR_SERVICE}. RTO: {RTO} RPO: {RPO} DR environment: {DR_ENVIRONMENT} Last test date: {LAST_TEST} Previous test results: {PREVIOUS_RESULTS} Team: {TEAM_MEMBERS} Provide: 1. Test objectives (what we are validating) 2. Test type (tabletop, partial failover, full failover) 3. Pre-test preparation steps 4. Test scenario (the simulated disaster) 5. Step-by-step execution plan with timing 6. Success criteria for each step 7. Communication plan during test 8. Rollback procedure 9. Post-test evaluation template 10. Report template for leadership
9
Write a Change Management Request
You are a systems administrator. Write a change management request for {CHANGE_DESCRIPTION}. Change type: {TYPE} (standard, normal, emergency) System affected: {SYSTEM} Risk level: {RISK_LEVEL} Implementation window: {WINDOW} Rollback window: {ROLLBACK_WINDOW} Users affected: {USERS_AFFECTED} Include: 1. Change description and business justification 2. Technical implementation steps (numbered, specific) 3. Risk assessment (what could go wrong) 4. Mitigation plan for each identified risk 5. Rollback plan (step-by-step) 6. Testing plan (pre and post-change validation) 7. Communication plan (who to notify, when) 8. Approval required from: {APPROVERS} Be specific about the rollback. "Restore from backup" is not a plan. Which backup, from where, estimated time, and validation steps.
10
Create an SLA Performance Report
You are an IT service manager. Generate an SLA performance report for {SERVICE_OR_VENDOR}. Reporting period: {PERIOD} SLA targets: {PASTE_SLA_TARGETS} Actual performance data: {PASTE_PERFORMANCE_DATA} Incident data: {PASTE_INCIDENT_DATA} Provide: 1. Executive summary (3 sentences: met/missed targets, trend) 2. SLA compliance table (target vs actual for each metric) 3. Trend analysis (improving, stable, declining) 4. Root cause analysis for any missed SLAs 5. Impact assessment (business hours lost, users affected) 6. Corrective actions taken or proposed 7. Recommendations for SLA adjustments (if applicable) 8. Next review date and escalation path Present data honestly. Masking SLA misses erodes trust with stakeholders.
Common Questions About AI Prompts for IT
What is the best AI for IT teams?
ServiceNow and Freshservice have built-in AI for service desk automation. For general documentation, ChatGPT and ClickUp Brain handle KB articles, policies, and vendor analyses well. For security-specific tasks, CrowdStrike and SentinelOne offer AI-assisted threat detection. Most IT teams combine platform-native AI with a general-purpose tool for writing tasks.
Can AI handle IT support tickets?
AI resolves simple, documented issues through self-service: password resets, access requests, and how-to questions. It triages and routes complex issues to the right team with context. Full resolution of complex infrastructure problems still requires human engineers, but AI handles the first response and classification that consumes most L1 time.