Ask AI↑
AQtive Guard (AQG) integrates Ask AI, an AI-powered assistant that uses Retrieval-Augmented Generation (RAG) to provide support for understanding and resolving cryptographic issues by drawing from the AQG cryptography knowledge base.
Ask AI operates within a secure, isolated environment to ensure your questions and data remain confidential. Neither your questions nor the AI responses are used to train the model.
IMPORTANT
Ask AI is an optional feature. Its use is governed by the AQtive Guard terms of service, including Section 2.11 regarding optional features. By using Ask AI, you acknowledge that you have read, understood, and agreed to these terms.
Guidelines and limitations↑
Ask AI is a powerful tool. However, its responses are generated by an AI language model to provide general information and help you decide on next steps. Before proceeding, verify all information and seek professional guidance for your specific application.
CAUTION
Before taking any action, always consult organizational resources and adhere to up-to-date internal policies and industry regulations.
Getting started with Ask AI↑
To get started, select the Ask AI button at the bottom left of a relevant AQtive Guard screen. Enter your cryptography-related question into the chat box.
Tips for better responses↑
To ensure Ask AI provides the most accurate and helpful responses, craft clear and specific prompts. - Ask direct questions. Avoid general questions like “How do I fix this?” Phrase your prompts as clear questions to get direct and helpful answers. - Use AQtive Guard terminology. Ask AI responses rely heavily on AQG rule and knowledge base content, so using the same terminology you see on AQG screens will yield the most accurate results. - Iterate and refine. If the initial response isn’t what you need, try rephrasing your prompt or providing additional details.
IMPORTANT
Be specific, but careful. Include relevant details like inventory or asset types, but do not enter confidential information such as specific locations, network addresses, credentials, or encryption keys.