Ask AI↑
AQtive Guard integrates Ask AI, an AI-powered assistant, to provide support related to understanding and resolving cryptographic issues identified by AQG. Ask AI uses Retrieval-augmented generation (RAG) to respond to questions related to the AQG cryptography knowledge base.
Ask AI operates within a secure, isolated environment to ensure your questions and data remain confidential.
IMPORTANT
Ask AI is an optional feature and governed by the AQtive Guard terms of service, including Section 2.11 specific to optional features. By using Ask AI, you acknowledge that you have read, understood, and agreed to these terms.
Guidelines and limitations↑
While Ask AI is a powerful tool, its responses are generated by an AI language model to provide general information and help you decide on next steps. Before proceeding, verify all information and seek professional guidance for your specific application.
CAUTION
Before taking any action, always consult organizational resources and adhere to up-to-date internal policies and industry regulations.
Getting started with Ask AI↑
To ensure Ask AI provides the most accurate and helpful responses, it’s essential to craft clear and specific prompts. Here are some guidelines:
- Stick to the context of the documentation for the selected rule. Ask AI is instructed to provide you with accurate responses only from the screen text associated with the selected rule and issue.
- Ask direct questions. Avoid general questions like “How do I fix this?” Phrase your prompts as clear questions to get direct and helpful answers.
- Use AQtive Guard terminology. Ask AI responses rely heavily on AQG rule content, so using the same terminology you see in AQG will yield the most accurate results.
- Iterate and refine. If the initial response isn’t quite what you need, try rephrasing your prompt or providing additional details.
IMPORTANT
Be specific, but careful. Include relevant details like inventory or asset types, but do not enter confidential information such as specific locations, network addresses, credentials, or encryption keys.