Standard Version 0.2

·

·

0.2 Augmented with Roop Peterson contributions July 24, 2025

JSON available at https://github.com/nicolereineke/cat-mip

Access Point

Canonical Term: Access Point

Definition:

An Access Point is a network device that allows wireless-capable devices to connect to a wired network using Wi-Fi or other wireless standards. It acts as a bridge between wireless clients and the wired infrastructure, managing traffic, authentication, and radio frequency (RF) coverage. In MSP and IT environments, access points are centrally monitored and managed to ensure reliable wireless connectivity, performance, and security.

Recognized Synonyms:

* Wireless Access Point

* Wi-Fi AP

* AP

* Wireless Controller (context-specific)

* Hotspot (informal or public context)

Relationships:

* Access Point isConnectedTo Switch or Router

* Access Point serves Wireless Client or Endpoint

* Access Point isManagedBy Controller, Agent, or Cloud Console

* Access Point broadcasts SSID and enforces Wireless Policy

* Access Point isMonitoredFor Signal Strength, Client Load, or Interference

Prompt Examples:

* “List all access points at the Denver office and their client count.”

* “Restart the rooftop access point remotely due to packet loss reports.”

* “Which access points are using outdated firmware?”

* “Configure SSID and VLAN tagging on all indoor access points.”

Agent Execution:

When a prompt refers to an “Access Point,” the AI agent will:

* Locate the access point in the inventory or network topology

* Retrieve and report configuration, client associations, and health metrics

* Apply changes such as SSID updates, channel adjustments, or firmware upgrades

* Monitor real-time performance and connectivity issues

* Log all actions related to access point configuration and status for auditing

Account

Canonical Term: (Avoid using “Account”; use a more precise term such as Tenant, MSP, Distributor, or Customer)

Definition:
The term Account is discouraged due to its ambiguity. It can refer to multiple different roles in the N-able ecosystem, including:
• A Tenant (a customer managed by an MSP)
• An MSP (a partner of N-able)
• A Distributor Customer (a client of a distributor)
• A Billing Entity (used in financial systems)
Because of this ambiguity, using “Account” in prompts or documentation can cause confusion or incorrect agent actions.

Recognized Synonyms:
• Account (ambiguous – avoid)
• Client (ambiguous – avoid unless scoped)
• Partner (ambiguous – clarify as MSP or Distributor)

Relationships:
Do not use Account in relationships. Instead, use specific terms such as:
• Tenant belongsTo MSP
• MSP isPartnerOf N-able
• Customer isManagedBy Distributor
• BillingEntity paysFor Subscription

Prompt Examples (and corrections):
• INCORRECT: “Get a list of all accounts with over 100 devices.”
• CORRECT: “Get a list of all tenants with over 100 devices.”
• INCORRECT: “Which accounts are overdue on patch compliance?”
• CORRECT: “Which MSPs or tenants are overdue on patch compliance?”
• INCORRECT: “Send onboarding materials to new accounts.”
• CORRECT: “Send onboarding materials to new MSPs and distributors.”

Agent Execution:
When “Account” is used in a prompt, the AI agent will:
• Attempt to infer the intended object (Tenant, MSP, Customer, etc.)
• Prompt for clarification if multiple interpretations are possible
• If inference succeeds, resolve the term to the correct object type and execute accordingly
• This behavior increases the risk of misinterpretation and is not recommended

Agent

Canonical Term: Agent

Definition:
An Agent is a lightweight software component installed on a managed Device (Asset) that enables remote monitoring, management, automation, and communication with N-able or integrated systems. Agents collect telemetry, enforce policies, run scripts, initiate backups, and trigger alerts based on configured logic. In the MSP context, agents are essential for endpoint visibility, proactive issue resolution, and executing AI-assisted or automated workflows.

Recognized Synonyms:
• Monitoring Agent
• Management Agent
• Endpoint Agent

Relationships:
• Agent isInstalledOn Device
• Agent isManagedBy Product (e.g., N-central, Cove)
• Agent executes Script or Task
• Agent reportsTo Platform or OrchestrationService
• Agent monitors Performance, Security, and PolicyCompliance
• Agent enables Action or Automation

Prompt Examples:
• “Check if the N-central agent is online on device ‘HR-LT-003’.”
• “List all agents running outdated versions across the ‘Finance’ tenant.”
• “Trigger the backup task via the local agent on all Windows servers.”

Agent Execution:
When a prompt refers to an “Agent,” the AI agent will:
• Identify the installed agent on the specified device(s)
• Check health, version, and last check-in time
• Determine the agent’s capabilities (e.g., scripting, monitoring, backup)
• Initiate agent-driven tasks such as running scripts, collecting metrics, or applying policies
• Return results or errors from agent-initiated actions

AI Agent

Canonical Term: AI Agent

Definition:
An AI Agent is a software-based autonomous entity that interprets natural language prompts and executes multistep reasoning and actions using defined tools, APIs, and structured knowledge. AI Agents in the N-able context interact with the platform, devices, users, and other systems to perform tasks such as triage, reporting, automation, or decision support. AI Agents can chain tools, call scripts, and escalate issues, often acting on behalf of a technician or service provider.

Recognized Synonyms:
• Intelligent Agent
• Proactive Assistant
• Automation Agent
• GenAI Agent (in LLM-driven systems)

Relationships:
• AI Agent interprets Prompt
• AI Agent calls Action or Tool
• AI Agent queries DataSource or KnowledgeBase
• AI Agent interactsWith User, Device, or Platform
• AI Agent isEnabledBy Model Context Protocol (via MCP)
• AI Agent produces Result or SuggestedResolution

Prompt Examples:
• “AI Agent, why is device ‘ENG-LT-22’ running slowly this week?”
• “Summarize patch compliance across all tenants and suggest remediation for non-compliant devices.”
• “What backup risks exist for customers using Microsoft 365, and how should we address them?”

Agent Execution:
When a prompt is directed to an AI Agent, it will:
• Interpret the natural language request and identify intent
• Use structured terminology (from the MSP MCP Terminology Standard) to disambiguate terms like “asset” vs. “device”
• Call tools (e.g., APIs, scripts, workflows) to gather data or take action
• Reason over context (e.g., device health, policy violations, previous incidents)
• Return human-readable results or initiate further actions
• Optionally escalate, log, or interact with other AI Agents

API

Canonical Term: API

Definition:

API (Application Programming Interface) is a defined set of protocols and methods that allows software systems to communicate with each other. APIs expose functions, data, or services that can be accessed programmatically, enabling integration, automation, and extensibility across platforms. In MSP and IT environments, APIs are used for retrieving data, triggering actions, synchronizing systems, and building custom workflows.

Recognized Synonyms:

* Application Programming Interface

* Web API

* REST API

* Endpoint

* Integration Interface

Relationships:

* API isExposedBy Platform, Application, or Service

* API isCalledBy Script, Agent, or External System

* API exposes Endpoint, Method, and Payload

* API isSecuredBy Token, Key, or OAuth

* API mayTrigger Workflow, Alert, or Data Sync

Prompt Examples:

* “Call the backup API to retrieve job history for the last 7 days.”

* “Does the N-central API support device onboarding?”

* “List all third-party APIs integrated with our RMM system.”

* “Create a webhook that posts ticket updates to an external API.”

Agent Execution:

When a prompt refers to an “API,” the AI agent will:

* Identify the correct API endpoint and required authentication method

* Format and send a request using the appropriate HTTP method (e.g., GET, POST, PUT, DELETE)

* Parse the response data and handle errors or exceptions

* Take follow-up actions based on the API response, such as updating records or triggering alerts

* Log the API interaction for tracking, troubleshooting, or auditing

Asset (Device)

Canonical Term: Asset

Definition:
An Asset refers to any physical or logical entity managed by portfolio products. This includes, but is not limited to, endpoints (e.g., laptops, desktops, servers), edge systems, mobile devices, cloud resources, Entra (Azure AD) identities, and Microsoft 365 services. Assets represent the lowest-level managed object within a hierarchy. Use the canonical term Asset instead of “Device,” which is a limited synonym. Assets can exist in various environments—on-prem, cloud, hybrid—and across tenants, sites, and service organizations.

Recognized Synonyms:

  • Device
  • Endpoint
  • Node (legacy)
  • Laptop (ambiguous — use only when specifically identifying form factor)

Relationships:

  • Asset has Policy
  • Asset belongsTo Tenant
  • Asset isMonitoredBy Agent
  • Asset runs Script
  • Asset hasStatus HealthState
  • Asset contains Software
  • Asset has RiskScore

Prompt Examples:

  • “Reboot the asset named ‘ENG-WORKSTATION-03’ if it’s unresponsive.”
  • “What’s the patch compliance status of all assets in the ‘Sales’ department?”
  • “Run the disk cleanup script on all Windows 10 assets with over 80% disk usage.”

Audit Log

Canonical Term: Audit Log

Definition:

An Audit Log is a chronological record of system-generated entries that capture actions, events, or changes performed within a platform, application, or network. Each log entry typically includes a timestamp, actor (user or system), action type, and target object. Audit logs are used for accountability, traceability, compliance, security investigations, and operational transparency.

Recognized Synonyms:

* Audit Trail

* Activity Log

* Event Log (context-specific)

* Change Log

* System Log (partial overlap)

Relationships:

* Audit Log records Action performedBy User or Agent

* Audit Log appliesTo Object (e.g., Device, Policy, Ticket, File)

* Audit Log isStoredIn LogDatabase or SIEM

* Audit Log isQueriedFor Compliance, Forensics, or Reporting

* Audit Log mayTrigger Alert or Review

Prompt Examples:

* “Show all audit log entries for user ‘jsmith’ in the last 30 days.”

* “Export the audit log for all policy changes made this quarter.”

* “Did any agent scripts get modified without approval?”

* “Alert if audit logs indicate repeated failed login attempts.”

Agent Execution:

When a prompt refers to an “Audit Log,” the AI agent will:

* Access the appropriate audit logging source (e.g., N-central, RMM, backup system)

* Filter entries based on actors, actions, time ranges, or object types

* Format relevant data for review or export

* Detect anomalies or compliance breaches if configured

* Log the audit query or access action itself, if required by policy

Backup

Canonical Term: Backup

Definition:
A Backup is a secure, stored copy of data, system configuration, or application state, used to restore functionality or recover from data loss, corruption, or disaster. In the MSP and N-able context, backups may be scheduled, continuous, or event-triggered, and can target endpoints, servers, cloud services (e.g., Microsoft 365), or databases. Backup policies define the scope, frequency, retention, and storage destination of backup operations.

Recognized Synonyms:
• Data Backup
• System Image (if referring to full-machine backup)
• Snapshot (when describing state-based backups)
• Restore Point (when used for rollback)

Relationships:
• Backup isCreatedFor Device, Asset, Server, File, Database, or Service
• Backup isManagedBy BackupPolicy
• Backup isStoredIn Cove or Cloud Storage
• Backup isMonitoredBy Agent or Platform
• Backup isRestoredBy Restore Job
• Backup isOwnedBy Tenant or MSP

Prompt Examples:
• “When was the last successful backup for the server ‘NY-SQL-01’?”
• “List all failed backup jobs in the past 48 hours across the ‘Retail’ tenant.”
• “Restore the backup of user ‘jane.doe’ mailbox from last Monday.”

Agent Execution:
When a prompt refers to a “Backup,” the AI agent will:
• Locate the latest or requested backup instance based on entity, time, and scope
• Validate its status (successful, failed, in progress)
• Trigger restore actions if authorized, using the appropriate recovery method
• Check backup compliance with configured policies (frequency, retention)
• Generate audit logs or reports based on backup history and status

Certificate

Canonical Term: Certificate

Definition:
A Certificate is a digital credential that authenticates the identity of an entity (such as a user, device, or service) and facilitates secure communication through encryption. Certificates are issued by a Certificate Authority (CA) and are integral to Public Key Infrastructure (PKI). They ensure data integrity, confidentiality, and authenticity in digital communications.

Recognized Synonyms:
• Digital Certificate
• SSL/TLS Certificate
• X.509 Certificate
• Public Key Certificate

Relationships:
• Certificate isIssuedBy Certificate Authority
• Certificate isAssignedTo Device or User
• Certificate isUsedFor Authentication or Encryption
• Certificate hasValidityPeriod StartDate and EndDate
• Certificate isRevokedBy Certificate Authority
• Certificate isStoredIn Certificate Repository

Prompt Examples:
• “List all certificates expiring within the next 30 days.”
• “Check if the SSL certificate for ‘client-portal.example.com’ is valid.”
• “Revoke the compromised certificate assigned to device ‘ENG-LT-05’.”

Agent Execution:
When a prompt includes “Certificate,” the AI agent will:
• Identify the specific certificate(s) based on context (e.g., domain name, device ID).
• Retrieve certificate details such as issuer, subject, validity period, and status.
• Perform actions like validation checks, renewal processes, or revocation procedures.
• Update relevant systems or repositories with the current certificate status.

CLI

Canonical Term: CLI

Definition:

CLI (Command-Line Interface) is a text-based interface that allows users or systems to interact with software, operating systems, or devices by typing commands. The CLI provides direct access to system functions, configuration, and diagnostics without a graphical user interface. In MSP and IT environments, CLI tools are widely used for scripting, automation, remote troubleshooting, and advanced configuration.

Recognized Synonyms:

* Command Line

* Terminal

* Shell (context-specific)

* Console

* Prompt

Relationships:

* CLI isAccessedBy Technician, Script, or Remote Agent

* CLI executes Command or Script

* CLI interfacesWith OS, Application, or Network Device

* CLI isUsedFor Automation, Troubleshooting, or Configuration

* CLI mayBeLoggedIn Session History or Audit Log

Prompt Examples:

* “Run a CLI command to restart the DNS service on all Linux servers.”

* “Which CLI tool is available for managing VMware hosts?”

* “Log all CLI activity performed by admin accounts.”

* “Execute the patch deployment script via CLI on endpoints missing updates.”

Agent Execution:

When a prompt refers to “CLI,” the AI agent will:

* Identify the appropriate CLI environment based on the target system (e.g., Bash, PowerShell, Command Prompt)

* Execute the requested command or script using available permissions

* Capture output, errors, and system responses

* Validate results and proceed with next steps if part of a workflow

* Log all CLI interactions for auditing, error tracking, or rollback

Cloud

Canonical Term: Cloud
Definition:

Cloud refers to infrastructure, platforms, or services hosted in a remote, internet-accessible environment rather than on-premises. In the N-able context, “Cloud” is typically used to describe:
• N-able’s own cloud-native products (e.g., Cove, Cloud Commander, NC Hosted)
• Third-party integrations with public cloud providers (e.g., AWS, Azure, GCP)
• The hosting location or operational model for managed assets, policies, or storage
Because the term is broad, it should be accompanied by a qualifier (e.g., Cloud Backup, Cloud Integration, Cloud Device) to ensure clarity.

Recognized Synonyms:
• SaaS Platform (when referring to N-able-hosted tools)
• Hosted Environment
• Public Cloud (AWS, Azure, etc.)
• Cloud Service Provider (CSP)

Relationships:
• Cloud hosts Service or Product
• Cloud contains Asset or Instance
• Cloud isIntegratedWith N-able or ExternalVendor
• Cloud provides Storage or Compute
• Cloud runs Automation or ScheduledTask
• Cloud isAccessedBy Agent or User

Prompt Examples:
• INCORRECT: “Is this customer in the cloud?”
• CORRECT: “Is this customer using N-able Cove Cloud Backup?”
• INCORRECT: “Scan all cloud resources for vulnerabilities.”
• CORRECT: “Scan all Azure-hosted virtual machines for vulnerabilities.”
• CORRECT: “List all devices managed through Cloud User Hub that belong to tenant ‘BlueSteel LLC’.”

Agent Execution:
When a prompt includes “Cloud,” the AI agent will:

  • Attempt to classify the intended meaning:
    • Is it referencing a product (e.g., Cove)?
    • A hosting model (e.g., AWS-based device)?
    • A data source (e.g., cloud backup logs)?
  • Resolve actions or queries using the correct integration, platform, or cloud service context
  • Validate scope: Is the object hosted in the cloud? Is it managed via a cloud product?
  • Return results filtered by cloud product, provider, or hosting model

Credentials

Canonical Term: Credentials

Definition:

Credentials are a set of authentication details used to verify the identity of a user, device, or system when accessing resources, services, or data. Typically, credentials include usernames and passwords, but they may also involve tokens, API keys, certificates, or biometric factors. In MSP and IT environments, credentials are securely stored, managed, and used by agents or technicians to perform automated tasks, remote access, or integrations.

Recognized Synonyms:

* Login Information

* Access Credentials

* Authentication Details

* Account Info

* Secrets (in DevOps or automation contexts)

Relationships:

* Credentials areUsedBy Agent, Technician, or Script

* Credentials grantAccessTo Device, Application, or Service

* Credentials areStoredIn Vault, Credential Store, or Password Manager

* Credentials areManagedBy Policy or Role-Based Access Control

* Credentials mayBeRotated or Expired

Prompt Examples:

* “Update the admin credentials for all SNMP-enabled switches.”

* “Which scripts currently use stored credentials for authentication?”

* “Create a new set of credentials for backup service access.”

* “Audit failed login attempts using shared credentials.”

Agent Execution:

When a prompt refers to “Credentials,” the AI agent will:

* Locate the appropriate credential set based on context, role, or task

* Authenticate securely before executing any action that requires credentials

* Follow storage and access policies, including masking or redacting sensitive data in logs

* Trigger alerts or remediation steps if credential validation fails or is misused

* Record credential usage activity for auditing and compliance

Data

Canonical Term: Data
(Use with specificity—prefer concrete terms like Log, Metric, Event, or Configuration when possible)

Definition:
Data refers to any structured or unstructured information collected, stored, or generated by N-able systems and integrated tools. This includes telemetry, logs, metrics, configuration records, alerts, ticket history, and external feeds. While “Data” is technically accurate, it is too broad for effective agent interaction. Prompts should specify the type of data required to ensure accurate retrieval or action.

Recognized Synonyms:
• Information (too vague – avoid)
• Output (context-specific – use with care)
• Result (use for returned data from a function or query)

Relationships:
• Data isGeneratedBy N-able, MSP, Device, Script, or Integration
• Data isStoredIn Repository or Platform
• Data isConsumedBy Agent or Automation or Policy
• Data isTaggedWith Type (e.g., metric, alert, configuration)
• Data belongsTo N-able or MSP or Tenant or Site

Prompt Examples:
• INCORRECT: “Get all data for this tenant.”
• CORRECT: “Get performance metrics and alert logs for this tenant.”
• INCORRECT: “Analyze the data for policy violations.”
• CORRECT: “Analyze event logs and compliance reports for policy violations.”
• CORRECT: “Retrieve CPU and memory usage data for device ‘ENG-LT-05’ for the past 7 days.”

Agent Execution:
When “Data” is used in a prompt, the AI agent will:
• Attempt to infer the correct data type based on additional context (e.g., time range, source, object)
• Search available data sources (e.g., telemetry, logs, monitoring tools)
• Return multiple types if ambiguity remains, or issue a request for clarification
• Default to commonly accessed types (e.g., metrics and logs) if unspecified

Recommendation:
Avoid using the general term “Data” in prompts to AI Agents unless the context is unambiguous. Instead, specify:
• Metrics – for performance, usage, thresholds
• Logs – for events, errors, audit trails
• Alerts – for triggered thresholds or anomalies
• Configuration – for settings, policy states, software versions
• Ticket Data – for incident and service histories

Disk

Canonical Term: Disk

Definition:
A Disk is a physical or virtual storage component used by a device to persist data. Disks can be hard drives (HDD), solid-state drives (SSD), or virtual volumes (e.g., VHDs in cloud environments). In the N-able context, disk information is collected for monitoring storage capacity, performance, health, and lifecycle. Disks may be local (installed on a device) or network-attached, and are critical for system stability and application functionality.

Recognized Synonyms:
• Drive
• Storage Device
• Volume (when partitioned or virtualized)
• HDD / SSD (specific types of disks)

Relationships:
• Disk isPartOf Device
• Disk hasCapacity Size
• Disk hasUsedSpace / FreeSpace
• Disk hasHealthStatus
• Disk isMonitoredBy Agent
• Disk stores File or Software

Prompt Examples:
• “Check disk usage on all servers in the ‘Legal’ tenant.”
• “Alert me when any disk has less than 10% free space.”
• “List all devices with SSDs larger than 512GB.”

Agent Execution:
When a prompt refers to a “Disk,” the AI agent will:
• Retrieve storage information from device telemetry or system APIs
• Report on total capacity, free space, used percentage, and disk type
• Monitor for thresholds (e.g., low space, high I/O wait times)
• Trigger alerts or automated cleanup scripts as needed
• Differentiate between physical disks and logical partitions/volumes

Distributor

Canonical Term: Distributor

Definition:
A Distributor is an organization authorized by N-able to resell N-able products and services. Distributors may operate under their own branding, manage multiple MSPs or sub-distributors, and may either directly support their downstream entities or rely on N-able for support. Distributors typically have visibility and limited control over the environments of their managed MSPs.

Recognized Synonyms:

  • Partner (ambiguous – avoid unless context is clear)
  • Channel Partner
  • Aggregator (in legacy or specific sales contexts)
  • Reseller (not exact. do not use. Resellers do not typically support products or access interfaces)

Relationships:

  • Distributor resells Product
  • Distributor supports MSP
  • Distributor manages SubDistributor
  • Distributor has Visibility into Tenant
  • Distributor follows PolicyTemplate from N-able
  • Distributor isManagedBy N-able

Prompt Examples:

  • “List all MSPs under the distributor ‘AlphaTech’.”
  • “Does the distributor ‘EuroSecure’ manage support for its MSPs or is it handled by N-able?”
  • “Deploy the onboarding script to all new tenants under the distributor ‘CloudBridge’.”

Agent Execution:
When the term “Distributor” is used, the agent interprets the request as applying to an intermediary layer between N-able and one or more MSPs. The agent will:

  • Query the organizational hierarchy to identify associated MSPs or tenants
  • Check configuration settings to determine whether the Distributor or N-able owns support responsibilities
  • Determine available product sets, policies, or automation workflows that the Distributor can access or propagate
  • Restrict or allow actions based on permissions assigned at the Distributor level

Endpoint

Canonical Term: Endpoint

Definition:

An Endpoint is any device that connects to a network and communicates with other systems, services, or users. Common endpoints include laptops, desktops, servers, mobile devices, and virtual machines. In MSP and IT environments, endpoints are managed assets that may be monitored, secured, patched, and inventoried. Endpoints are often the target of policies, automation, alerts, and security controls.

Recognized Synonyms:

* Device

* Client Device

* Managed Asset

* Workstation (context-specific)

* Node (in network or monitoring contexts)

Relationships:

* Endpoint isMonitoredBy Agent or Probe

* Endpoint isPartOf Site, Network, or Tenant

* Endpoint receives Policy, Update, or Script

* Endpoint isTrackedIn Inventory or CMDB

* Endpoint mayGenerate Alert or Ticket

Prompt Examples:

* “List all endpoints that haven’t checked in within the last 48 hours.”

* “Deploy the antivirus policy to all unmanaged endpoints.”

* “Which endpoints have BitLocker encryption enabled?”

* “Group endpoints by OS version and patch status.”

Agent Execution:

When a prompt refers to an “Endpoint,” the AI agent will:

* Identify the device using inventory or monitoring data

* Retrieve endpoint-specific attributes such as hostname, IP address, OS, status, and last check-in time

* Apply relevant policies, automations, or scripts as requested

* Trigger monitoring actions or escalate issues based on endpoint health or configuration

* Record any actions taken in the system log or ticketing platform

External Vendor

Canonical Term: ExternalVendor

Definition:
An External Vendor is a third-party company that provides software, hardware, or services which integrate with N-able products. These vendors are typically integration partners and may offer functionality in areas such as security, backup, PSA (Professional Services Automation), billing, remote access, or threat detection. External Vendors participate in the N-able ecosystem by exposing APIs, actions, or event streams that can be called by or respond to AI Agents, scripts, and workflows.

Recognized Synonyms:

  • Vendor
  • Integration Partner
  • Third-Party Provider
  • Tool Vendor (context-specific)

Relationships:

  • ExternalVendor provides Integration
  • ExternalVendor owns ExternalSystem
  • ExternalVendor supports Action
  • ExternalVendor mayBeCertifiedBy N-able
  • ExternalVendor collaboratesWith MSP
  • ExternalVendor integratesWith Product

Prompt Examples:

  • “What actions are available from the external vendor ‘SentinelOne’ through its integration?”
  • “Is the external vendor ‘Acronis’ certified for cloud backup integrations with Cove?”
  • “Which external vendors support remediation workflows via API?”

Agent Execution:
When a prompt includes the name of an External Vendor, the agent will:

  • Search the N-able Integration Registry for known vendors
  • Retrieve associated integrations, available actions, and certified products
  • Determine integration status (enabled, not installed, in error) for the current MSP or Tenant
  • Route API calls or automation flows to the appropriate external system, respecting authentication and permission boundaries
  • Return actionable metadata such as supported event types, playbooks, or remediation capabilities

Firewall

Canonical Term: Firewall

Definition:
A Firewall is a security system—either hardware-based, software-based, or a combination of both—that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It serves as a barrier between trusted internal networks and untrusted external networks, such as the internet, to prevent unauthorized access and threats. In the DevOps Infrastructure Ontology, a firewall is categorized under network infrastructure components, emphasizing its role in network security management.

Recognized Synonyms:
• Network Firewall
• Security Gateway
• Packet Filter
• Application Firewall

Relationships:
• Firewall controlsAccessTo NetworkSegment
• Firewall isDeployedOn Device
• Firewall hasRuleSet AccessControlList
• Firewall monitorsTrafficFor Threat
• Firewall isManagedBy SecurityPolicy
• Firewall logsEventsTo MonitoringSystem

Prompt Examples:
• “List all firewalls deployed across the ‘Finance’ tenant’s network.”
• “Check the current rule set configured on the firewall protecting the ‘NYC-DataCenter’.”
• “Identify any unauthorized access attempts blocked by the firewall in the last 24 hours.”

Agent Execution:
When a prompt refers to a “Firewall,” the AI agent will:
• Identify the specific firewall instance(s) based on the context provided (e.g., tenant, location, device).
• Retrieve and analyze the firewall’s configuration, including rule sets and access control lists.
• Monitor and report on traffic patterns, highlighting any anomalies or blocked access attempts.
• Suggest or implement updates to firewall rules in response to detected threats or policy changes, if authorized.

File

Canonical Term: File

Definition:
A File is a discrete unit of digital data stored on a device or in the cloud. Files can represent executables, documents, logs, scripts, configurations, or any other form of structured or unstructured content. In the N-able context, files may be transferred, monitored, scanned for threats, or used as part of automation workflows. Files exist within file systems, storage volumes, or cloud containers, and may be associated with software, devices, or users.

Recognized Synonyms:
• Document (when referring to user-generated content)
• Artifact (in deployment or CI/CD contexts)
• Payload (in scripting or integration contexts)
• Object (in cloud storage – clarify when used)

Relationships:
• File isStoredOn Device or CloudStorage
• File isScannedBy AVEngine or SecurityTool
• File isGeneratedBy Script or Application
• File isModifiedBy User or Agent
• File isTaggedWith Label or Policy
• File isMonitoredBy Agent

Prompt Examples:
• “Scan all executable files on server ‘NY-EX01’ for known threats.”
• “Upload the installation file to the shared repository and notify the admin.”
• “Retrieve the most recent log file from the device ‘ENG-LT-05’.”

Agent Execution:
When a prompt refers to a “File,” the AI agent will:
• Resolve the file location (e.g., local device, cloud share, log directory)
• Perform the specified action (e.g., retrieve, scan, delete, move, check integrity)
• Use file metadata such as name, type, size, timestamp, and hash to identify the target
• Log actions and validate policy or security rules (e.g., blocking executable uploads in restricted environments)

Hardware

Canonical Term: Hardware

Definition:
Hardware refers to the physical components of an IT environment, including servers, laptops, desktops, networking gear, storage devices, and peripherals. In the N-able context, hardware is typically associated with managed Devices, and its properties (e.g., CPU type, RAM, disk size, serial number) are collected for inventory, health monitoring, and compliance tracking. Hardware may also include embedded systems and edge devices under MSP management.

Recognized Synonyms:
• Physical Asset
• Equipment
• Machine (context-specific – avoid)
• Host (when referring to physical servers)

Relationships:
• Hardware isPartOf Device
• Hardware hasComponent CPU, Memory, Disk, NIC, etc.
• Hardware isLocatedAt Site
• Hardware isMonitoredBy Agent
• Hardware hasWarrantyStatus or LifecycleStage
• Hardware supports Software

Prompt Examples:
• “List all hardware with less than 8GB RAM across the ‘Education’ tenant.”
• “What hardware components are failing on server ‘NY-DC-001’?”
• “Generate a hardware inventory report for all remote offices.”

Agent Execution:
When a prompt refers to “Hardware,” the AI agent will:
• Query the device inventory or telemetry sources to extract physical specs
• Identify hardware failures, warnings, or threshold violations
• Associate the hardware with the parent device and customer context
• Report lifecycle status (e.g., warranty expired, asset due for replacement)
• Trigger alerts or automations if hardware is underperforming or failing

Recommendation:
Use Hardware to refer to the physical layer of infrastructure. When possible, specify the component:
• Use CPU, Disk, Memory, Motherboard, Power Supply, etc.
• Differentiate between physical and virtual resources when managing hybrid environments
• Avoid vague phrases like “machine info” or “asset details” when directing AI agent actions

Integration

Canonical Term: Integration

Definition:
An Integration is a defined connection between an external vendor’s product or service and one or more N-able products. Integrations allow data exchange, automation, event handling, and workflow coordination across systems. They may be developed by N-able, by the external vendor, or by a partner, and can vary in complexity from simple scripts and API calls to deeply embedded multi-function toolsets.

Recognized Synonyms:

  • Plugin (legacy or context-specific)
  • Extension
  • Integration Module

Relationships:

  • Integration connects External Vendor to Product
  • Integration exposes Action
  • Integration calls N-able Action
  • Integration consumes Data or Event from External Vendor
  • Integration mayBeManagedBy N-able | Vendor | Partner

Prompt Examples:

  • “What integrations are available for ticketing systems like Autotask and ConnectWise?”
  • “Enable the Bitdefender integration for all MSPs under ‘Global IT Solutions’.”
  • “Does the SentinelOne integration support triggering remediation actions from within N-central?”

Agent Execution:
When a prompt refers to an “Integration,” the agent will:

  • Identify the integration metadata from the N-able Integration Catalog
  • Resolve the associated products, available actions, and required permissions
  • Determine whether the integration is installed, active, or requires onboarding
  • Enable or invoke integration-specific functionality, such as data syncs, policy mappings, or scripted triggers
  • Route follow-up actions to the proper toolset (e.g., PSA ticketing, security alert feed, reporting system)

Inventory

Canonical Term: Inventory

Definition:

Inventory refers to the complete, current list of assets such as devices, software, licenses, or users that are tracked and managed. Inventory systems typically collect metadata like status, version, location, ownership, and lifecycle state. Accurate inventory enables visibility, reporting, compliance, capacity planning, and automation.

Recognized Synonyms:

* Asset Inventory

* IT Inventory

* Resource List

* Configuration Inventory (context-specific)

* Inventory Database

Relationships:

* Inventory contains Device, Software, License, or User

* Inventory isMaintainedBy Discovery, Agent, or ManualEntry

* Inventory isQueriedBy AI Agent, Technician, or Policy

* Inventory feeds CMDB or Asset Management Platform

* Inventory isUsedFor Reporting, Compliance, or Automation

Prompt Examples:

* “List all Windows 11 devices in the inventory with less than 8 GB of RAM.”

* “When was the last time inventory was updated for the Chicago site?”

* “Export the full software inventory for client ‘GreenByte Solutions’.”

* “Identify unlicensed software in the current inventory.”

Agent Execution:

When a prompt refers to “Inventory,” the AI agent will:

* Query the relevant inventory system or asset database

* Filter or sort based on asset type, attributes, or compliance rules

* Identify gaps such as unmanaged devices or expired licenses

* Generate summaries, reports, or trigger remediation workflows

* Record any actions taken or inventory queries in the system log

IP

Canonical Term: IP Address

Definition:
An IP Address is a unique numerical identifier assigned to a device or interface within a network, facilitating communication between devices. IP addresses can be either IPv4 or IPv6 and are essential for routing data packets across networks. In the DevOps Infrastructure Ontology, an IP address is considered a fundamental component of network infrastructure, associated with devices, services, and network segments.

Recognized Synonyms:
• IP
• Internet Protocol Address
• Network Address (context-specific)
• Host Address (when referring to device-specific IPs)

Relationships:
• IP Address isAssignedTo Device or NetworkInterface
• IP Address belongsTo IPNetwork
• IP Address isUsedBy Service or Application
• IP Address isManagedBy NetworkManagementSystem
• IP Address hasType (e.g., Public, Private, Static, Dynamic)

Prompt Examples:
• “List all IP addresses assigned to the ‘Finance’ department’s servers.”
• “Check if the IP address 192.168.1.10 is currently active on the network.”
• “Identify any duplicate IP addresses within the ‘NYC Office’ subnet.”

Agent Execution:
When a prompt refers to an “IP Address,” the AI agent will:
• Retrieve the IP address details, including assignment, status, and associated device or service.
• Determine the network segment or subnet the IP address belongs to.
• Check for conflicts, such as duplicate assignments or unauthorized usage.
• Provide recommendations or actions, such as releasing, reassigning, or monitoring the IP address.

License

Canonical Term: License

Definition:
A License is a contractual or system-enforced right to use a product, service, or feature within defined terms (e.g., time, scope, seats, capabilities). In the MSP and N-able context, licenses are required for using specific N-able products (e.g., N-central, Cove) or features (e.g., Take Control, advanced reporting). Licenses may apply at the tenant, device, or user level and are tracked to ensure compliance, billing accuracy, and feature access.

Recognized Synonyms:
• Subscription (context-dependent — more common in SaaS)
• Entitlement
• Access Token (avoid unless referring to security/auth)
• Usage Right

Relationships:
• License appliesTo Product, Feature, or Service
• License isOwnedBy Tenant, MSP, or Distributor
• License isEnforcedBy Platform or BillingSystem
• License isConsumedBy Device or User
• License hasValidityPeriod StartDate–EndDate
• License isTrackedIn UsageReport or BillingRecord

Prompt Examples:
• “List all licenses assigned to tenant ‘SecureNet IT’.”
• “Which devices are consuming Take Control licenses?”
• “Alert me when a license is nearing expiration or usage threshold.”

Agent Execution:
When a prompt refers to a “License,” the AI agent will:
• Look up the license object and its associated terms (type, scope, duration, limits)
• Match usage (devices, users, features) to license consumption
• Report on current usage, available seats, or overages
• Trigger notifications for nearing capacity, expiration, or violations
• Enforce policy: enable/disable features based on license state

Recommendation:
Use License when discussing entitlement to use products or services. Be specific by indicating:
• The product or feature licensed
• The entity consuming it (tenant, MSP, device)
• Whether you’re checking usage, availability, or status
Avoid vague terms like “access” or “subscription” unless referring to SaaS billing explicitly.

Lifecycle

Canonical Term: Lifecycle

Definition:

A Lifecycle is the end-to-end sequence of stages that an asset, service, user, or process goes through—from creation or onboarding to retirement or decommissioning. Lifecycles help MSPs and IT professionals define, automate, and govern the expected progression of objects such as devices, tickets, users, backups, or software. Lifecycle stages typically include onboarding, active use, maintenance, and offboarding, with associated policies and triggers at each step.

Recognized Synonyms:

* Life Cycle (alternate spelling)

* Lifecycle State

* Operational Lifecycle

* Asset Lifecycle

* Service Lifecycle

Relationships:

* Lifecycle appliesTo Device, User, Ticket, Service, or Backup

* Lifecycle isManagedBy Policy or Automation

* Lifecycle includesStage Onboarding, Active, Suspended, Retired

* Lifecycle isTrackedIn CMDB or AssetInventory

* Lifecycle transitionsTrigger Alert, Action, or Notification

Prompt Examples:

* “What is the current lifecycle stage of all laptops deployed last quarter?”

* “Trigger offboarding automation when a user’s lifecycle status changes to ‘terminated’.”

* “Display all assets in the ‘End-of-Life’ stage.”

* “Automatically archive tickets once they reach the ‘Closed’ lifecycle stage for 90 days.”

Agent Execution:

When a prompt refers to a “Lifecycle,” the AI agent will:

* Identify the object type and its current lifecycle stage

* Retrieve associated policies, rules, or automations linked to that stage

* Determine if any transitions (e.g., from Active to Retired) are pending or triggered

* Execute applicable workflows (e.g., provisioning, patching, decommissioning)

* Log the lifecycle state and any related actions in the appropriate system (e.g., CMDB, Ticketing Platform)

Location

Canonical Term: Location

Definition:
Location refers to the physical or geographic place associated with an asset, user, or organization. It can represent where a Device is physically deployed, where a User typically operates, or where a Site is situated. While similar to a Site, “Location” focuses strictly on geography (e.g., city, region, country, GPS), whereas Site can be a logical grouping. Location data is useful for geofencing, compliance, asset tracking, threat analysis, and assigning regional policies.

Recognized Synonyms:

  • Geo (informal)
  • Physical Address
  • Office Location
  • Region (when scoped to country-level or zones)
  • Area (context-dependent — avoid unless defined)

Relationships:

  • Device isLocatedAt Location
  • Site isLocatedAt Location
  • User operatesFrom Location
  • Location belongsTo Tenant
  • Location mayHave RiskProfile or ComplianceZone
  • Location influences PolicyScope

Prompt Examples:

  • “List all devices currently located in Germany.”
  • “Apply the EU compliance policy to locations within the EMEA region.”
  • “Which locations show unusual login activity after business hours?”

Agent Execution:
When a prompt refers to a “Location,” the agent will:

  • Resolve the geographic identifier (e.g., country, city, GPS tag, custom label)
  • Filter relevant entities (devices, users, sites) assigned to or operating from that location
  • Consider location-aware policies (e.g., regional compliance rules, threat intelligence mappings)
  • Enable geolocation-sensitive workflows, alerts, or risk analysis
  • Return context-specific responses, such as compliance status, threat levels, or regional usage trends

MAC Address

Canonical Term: MAC Address

Definition:

A MAC Address (Media Access Control Address) is a unique hardware identifier assigned to a network interface card (NIC) used for communication on a local network segment. It is typically represented as a 12-digit hexadecimal value separated by colons or dashes (e.g., 00:1A:2B:3C:4D:5E). In MSP and IT operations, MAC addresses are used for device identification, inventory tracking, access control, and network diagnostics.

Recognized Synonyms:

* Physical Address

* Hardware Address

* NIC Address

* Ethernet Address

* Layer 2 Address

Relationships:

* MAC Address isAssignedTo NetworkInterface or Device

* MAC Address identifies Endpoint on LocalNetwork

* MAC Address isCollectedBy Discovery Tool or Agent

* MAC Address isUsedIn DHCP Reservations and Access Policies

* MAC Address mayBeMappedTo IP Address or Hostname

Prompt Examples:

* “Find the device with MAC address 00:1C:B3:09:85:15 on the network map.”

* “List all MAC addresses associated with managed endpoints at the Austin site.”

* “Block devices not recognized by MAC address in the guest network.”

* “Export a list of MAC addresses and IPs for all online printers.”

Agent Execution:

When a prompt refers to a “MAC Address,” the AI agent will:

* Search the device inventory, network discovery data, or ARP tables

* Match MAC addresses to known endpoints, vendors, or IP addresses

* Take action such as tagging, isolating, or blocking a device based on MAC identification

* Provide detailed reports or summaries including MAC-to-IP mapping

* Log any actions involving MAC-based identification or control

MSP

Canonical Term: MSP

Definition:
An MSP (Managed Service Provider) is a type of Partner responsible for delivering IT services to one or more customer environments (tenants). MSPs use N-able products to monitor, manage, secure, and automate infrastructure for their clients. They typically own the relationship with the end customer, administer devices, apply policies, run scripts, and handle service tickets.

Recognized Synonyms:

  • Partner (when the context is service delivery)
  • Service Provider
  • IT Provider
  • Admin Organization (rare/legacy — avoid)

Relationships:

  • MSP manages Tenant
  • MSP owns Asset | Device
  • MSP applies Policy
  • MSP runs Script
  • MSP isProvisionedBy Distributor or N-able
  • MSP isSupportedBy N-able or Distributor
  • MSP provides Service to End Customer
  • MSP has AccessControl for Agent

Prompt Examples:

  • “List all tenants managed by the MSP ‘BrightNet Solutions’.”
  • “Check for outdated antivirus software across all MSPs in the Western region.”
  • “What scripts are frequently used by the MSP ‘DataSecure’ during onboarding?”

Agent Execution:
When a prompt refers to an MSP, the agent identifies a Partner entity that actively delivers services to customer tenants. The agent will:

  • Resolve the MSP’s list of managed Tenants
  • Access the MSP’s configuration (e.g., available scripts, policies, tools)
  • Determine which Devices, Agents, and Users fall under the MSP’s control
  • Execute actions or retrieve data within the scope of that MSP’s environment only
  • Respect role-based access boundaries for visibility, control, and policy enforcement

N-able

Canonical Term: N-able

Definition:
The top-level platform node representing N-able as the vendor and service provider. This is a unique, singular entity in the model. It serves as the source of platform-wide policies, agent frameworks, product definitions, and integration standards. All tenants, services, and tools exist beneath or are associated with this node.

Recognized Synonyms:

  • Platform
  • Vendor
  • Parent org (avoid — use N-able)
  • Global provider (context-dependent)

Relationships:

  • N-able provides Product
  • N-able defines Terminology Standard
  • N-able publishes Template
  • N-able manages Partner
  • N-able supports Partner
  • N-able manages Distributor
  • N-able owns AI Agent Framework

Prompt Examples:

  • “What monitoring tools does N-able provide for remote access?”
  • “Does N-able have a default patching policy template?”
  • “List all automation policies published by N-able.”

Agent Execution:
When the term “N-able” is used in a prompt, the agent interprets it as a query against global or platform-wide definitions that originate from the N-able platform node. The agent resolves requests by:

  • Accessing the centralized N-able catalog of tools, templates, and product definitions
  • Filtering results not tied to any specific tenant or MSP configuration
  • Returning default (global) policies, tools, scripts, or documentation
  • Providing N-able-wide metadata rather than tenant-specific data

Network

Canonical Term: Network

Definition:
A Network is a collection of interconnected devices, systems, and services that communicate using standard protocols. In the DevOps Infrastructure Ontology, it includes both physical infrastructure (e.g., routers, switches, cabling) and logical constructs (e.g., IP subnets, VLANs, virtual networks). In the MSP and N-able context, networks are monitored for availability, performance, security, and connectivity, often segmented by customer, site, or service.

Recognized Synonyms:
• LAN / WAN (context-specific — use when defining scope)
• Segment
• Subnet
• Virtual Network (when hosted in cloud environments)

Relationships:
• Network connects Device or Service
• Network isMonitoredBy Agent or NMS (Network Monitoring System)
• Network contains IPAddressRange
• Network isSecuredBy Firewall or AccessControlList
• Network isAssociatedWith Site or Tenant
• Network hasTopology including Nodes and Links

Prompt Examples:
• “Check for latency issues in the network segment at the Dallas site.”
• “List all devices connected to the ‘Guest Wi-Fi’ network.”
• “Is the backup network isolated from production traffic in tenant ‘HealthBridge’?”

Agent Execution:
When a prompt refers to a “Network,” the AI agent will:
• Identify the relevant network(s) based on name, address range, or associated site/tenant
• Retrieve monitoring metrics (latency, packet loss, uptime, etc.)
• Determine what devices or services are connected to or dependent on the network
• Identify policy violations or anomalies (e.g., unauthorized access, unencrypted traffic)
• Trigger diagnostics, isolation, or notification workflows if thresholds are breached

Network Map

Canonical Term: Network Map

Definition:

A Network Map is a visual or structured representation of devices, endpoints, and interconnections within a networked environment. It provides topology awareness, showing how elements such as routers, switches, firewalls, servers, and workstations are linked—often including metadata like IP addresses, MAC addresses, status, and roles. Network maps support monitoring, diagnostics, capacity planning, and security audits.

Recognized Synonyms:

* Network Topology Map

* Device Map

* Infrastructure Map

* Logical Map

* Physical Map (context-specific)

Relationships:

* Network Map includes Device, Interface, and Connection

* Network Map isGeneratedBy Discovery or Monitoring Tool

* Network Map isUpdatedBy NetworkScan or Agent

* Network Map isViewedBy Technician or AI Agent

* Network Map mayInclude VLAN, Subnet, or WirelessSegment

Prompt Examples:

* “Show the network map for the Dallas site with device health overlays.”

* “Highlight all unmanaged devices on the current network map.”

* “Regenerate the network map after onboarding new switches.”

* “Export the network map with IP and MAC address details for compliance reporting.”

Agent Execution:

When a prompt refers to a “Network Map,” the AI agent will:

* Retrieve or regenerate the latest topology data from discovery tools or agents

* Organize devices and connections into a logical or physical layout

* Overlay relevant metrics (e.g., status, alert state, bandwidth) if requested

* Identify gaps, unmanaged assets, or policy violations

* Present the map visually (if supported), or provide a structured summary as output

Notification

Canonical Term: Notification

Definition:
A Notification is a message or alert generated by a system, policy, or agent to inform a user, technician, or administrator of an event, condition, or required action. Notifications may be triggered by monitoring thresholds, policy violations, automation results, or system events. They can be delivered through various channels such as email, SMS, in-app alerts, or PSA integrations.

Recognized Synonyms:
• Alert (when real-time or critical — use with care)
• Message (too broad — avoid unless contextualized)
• Prompt (in user-interface contexts)
• Signal (not typically used — avoid)

Relationships:
• Notification isTriggeredBy Event, Policy, or Agent
• Notification isDeliveredTo User, Group, or IntegrationEndpoint
• Notification describes Condition or Result
• Notification isPartOf AlertingPolicy or EscalationWorkflow
• Notification isLoggedIn NotificationHistory

Prompt Examples:
• “Send a notification to the admin group when disk usage exceeds 90%.”
• “What notifications were generated during last night’s patching window?”
• “Suppress non-critical notifications for tenant ‘Acme Legal’ during maintenance.”

Agent Execution:
When a prompt refers to a “Notification,” the AI agent will:
• Identify the trigger context (event, threshold, policy action, etc.)
• Determine the appropriate recipients and delivery channel
• Format the message using configured templates or dynamic event data
• Deliver the message and log the notification event
• Optionally suppress, escalate, or bundle notifications based on configuration

OID

Canonical Term: OID

Definition:

OID (Object Identifier) is a globally unique identifier used in SNMP (Simple Network Management Protocol) to represent a specific piece of data that can be queried or monitored on a managed device. OIDs follow a hierarchical dotted-decimal notation (e.g., 1.3.6.1.2.1.1.3.0) and correspond to specific metrics or attributes such as uptime, CPU usage, or interface status. In MSP and IT environments, OIDs are essential for polling devices and triggering alerts based on performance or health data.

Recognized Synonyms:

* Object Identifier

* SNMP OID

* MIB Entry

* SNMP Metric

* OID Path

Relationships:

* OID isPartOf MIB (Management Information Base)

* OID isQueriedBy SNMP Tool or Agent

* OID represents Metric or Status

* OID isDefinedBy Vendor or Standard Body

* OID mayTrigger Alert or Threshold Violation

Prompt Examples:

* “What is the OID for memory usage on Cisco routers?”

* “Poll OID 1.3.6.1.2.1.25.1.1.0 for system uptime on all SNMP-enabled devices.”

* “Map custom OIDs to human-readable labels in the monitoring dashboard.”

* “Set a threshold alert for the CPU load OID on VMware hosts.”

Agent Execution:

When a prompt refers to an “OID,” the AI agent will:

* Look up the OID in the device’s MIB or internal catalog

* Use SNMP to query the corresponding value from the target device

* Interpret the result based on expected data type (e.g., integer, string, gauge)

* Compare against thresholds if defined, and trigger alerts or actions

* Log the OID query, result, and any subsequent actions in the monitoring system

Organization (See Service Organization)

Canonical Term: Organization

Definition:
This term should probably be avoided due to ambiguity. An Organization is a general-purpose container representing any structured business or entity within the N-able ecosystem. It may refer to a Distributor, MSP, Tenant, or even N-able itself, depending on context. “Organization” is primarily used in internal models, system hierarchies, or data structures to abstract the roles of different actors in the platform. In end-user contexts, the more specific terms (MSP, Tenant, etc.) are preferred.

Recognized Synonyms:

  • Org (internal shorthand)
  • Business Unit (when referring to internal structures)
  • Entity (generic or API-level use)
  • Account (ambiguous – avoid unless referring to billing)

Relationships:

  • Organization mayBe N-able | Distributor | MSP | Tenant
  • Organization has SubOrganization
  • Organization manages Users
  • Organization owns Devices | Assets
  • Organization applies Policy
  • Organization has AccessLevel

Prompt Examples:

  • “Which organizations have more than 50 active scripts deployed?”
  • “List all organizations managed by the distributor ‘TechBridge Global’.”
  • “Does this organization have access to the advanced automation catalog?”

Agent Execution:

When a prompt refers to an “Organization,” the agent interprets it as a flexible node in the hierarchy. It resolves the entity’s role based on its metadata:

  • If it’s at the top of the hierarchy with publishing rights → N-able
  • If it resells to others → Distributor
  • If it delivers services → MSP
  • If it receives services → Tenant

Package (see also Patch)

Canonical Term: Package

Definition:
A Package is a discrete unit of software that can be installed, upgraded, or removed on a device or system. It typically contains executable code, configuration files, and metadata needed to deploy software. Packages are distributed through package managers (e.g., MSI, RPM, DEB, EXE) and may represent full applications, libraries, agents, or drivers. In MSP environments, packages are often deployed via scripts, automation workflows, or remote management tools.
Code which is an update may also be referred to as a Patch.

Recognized Synonyms:
• Installer
• Module (when part of a larger software system)
• Software Package
• (UNCLEAR, but here we seem to use it interchangeably with PATCH)
• Deployment Artifact (technical)
• Patch (when part of an explicit update to deployed software)

Relationships:
• Package installs Software
• Package isDeployedTo Device
• Package isManagedBy Script or Automation Policy (or Template?)
• Package hasVersion
• Package isSignedBy Vendor
• Package isHostedIn Repository

Prompt Examples:
• “Install the package for Microsoft Edge on all Windows 11 devices.”
• “Which packages are waiting to be deployed on the ‘Sales-Laptops’ site?”
• “Has the antivirus agent package been successfully installed on device ‘HR-LT-002’?”

Agent Execution:
When a prompt refers to a “Package,” the AI agent will:
• Look up package metadata, including name, version, and vendor signature
• Validate compatibility with the target device (e.g., OS, architecture)
• Trigger installation, upgrade, rollback, or removal actions
• Log the outcome and update inventory or compliance records

Patch

Canonical Term: Patch

Definition:
A Patch is a specific update package intended to correct known issues, fix vulnerabilities, or improve functionality in existing software. Patches may be distributed by vendors as part of regular update cycles (e.g., Microsoft Patch Tuesday), or released ad hoc in response to critical security flaws. In the MSP context, patches are applied across multiple tenants, devices, or sites using automation policies, schedules, or manual triggers.

Recognized Synonyms:
• Update (use only when not referring to feature upgrades)
• Hotfix
• Security Fix
• Software Update (general)

Relationships:
• Patch isAppliedTo Device or Software
• Patch isPublishedBy Vendor
• Patch isPartOf UpdatePolicy
• Patch isMonitoredBy ComplianceEngine
• Patch hasSeverity Level
• Patch isScheduledBy AutomationPolicy

Prompt Examples:
• “Apply all high-severity patches to servers in the ‘Finance’ tenant before Friday.”
• “What patches failed to install on the devices at the Boston site?”
• “Generate a report of missing security patches for all Windows 11 laptops.”
• “Patch the application Foo immediately for tenant Jonson & Jonson”

Agent Execution:
When a prompt refers to a “Patch,” the AI agent will:
• Identify the relevant patch based on vendor, product, severity, or classification
• Determine installation status on applicable devices
• Schedule or trigger patch installation (immediate, deferred, or staged)
• Log results, including success/failure per device, and update compliance reports
• If applicable, check for required reboots or follow-up tasks

Performance

Canonical Term: Performance

Definition:
Performance refers to the operational efficiency and responsiveness of a system, device, or application. It is typically measured through metrics such as CPU usage, memory consumption, disk I/O, network throughput, and latency. In the MSP and N-able context, performance is used to assess the health of devices, detect bottlenecks, and determine whether systems are operating within acceptable thresholds.

Recognized Synonyms:
• System Health (ambiguous – use when referring to overall status)
• Responsiveness (context-specific – use when referring to end-user experience)
• Efficiency (too vague – avoid in prompts)

Relationships:
• Performance isMeasuredBy Metric
• Performance affects UserExperience
• Performance isMonitoredBy Agent or MonitoringPolicy
• Performance isReportedIn Dashboard or Report
• Performance triggers Alert or Automation

Prompt Examples:
• “Check the performance of device ‘ENG-LT-05’ and flag any CPU or memory spikes.”
• “Generate a performance report for all servers in the ‘West Coast’ site over the last 7 days.”
• “What performance metrics are being tracked for the tenant ‘SecureNet’?”

Agent Execution:
When a prompt refers to “Performance,” the AI agent will:
• Retrieve relevant metrics such as CPU load, memory usage, disk activity, and network traffic
• Evaluate current values against historical baselines and configured thresholds
• Detect anomalies or degradation (e.g., sustained high CPU, low available RAM)
• Recommend or trigger remediation actions (e.g., restart service, notify admin, scale resources)
• Optionally summarize trends in reports or dashboards

Recommendation:
Use Performance when you want a general assessment across multiple resource categories. For specific actions or automation, refer directly to the metric type:
• CPU usage, Memory utilization, Disk I/O, Network latency, etc.
• Avoid vague terms like “slowness” unless you pair it with a concrete object or metric.

Port

Canonical Term: Port

Definition:

A Port is a logical or physical interface used for communication between devices or applications. In networking, a port refers to a numbered endpoint in the transport layer (TCP/UDP) that identifies specific processes or services on a device (e.g., port 22 for SSH, port 443 for HTTPS). In hardware, a port can also refer to a physical connection point on a switch, router, or server. In MSP and IT environments, ports are monitored, managed, and filtered for performance, availability, and security.

Recognized Synonyms:

* Network Port (logical)

* TCP/UDP Port

* Switch Port (physical)

* Interface (context-specific)

* Service Port

Relationships:

* Port isUsedBy Service, Protocol, or Application

* Port isOpenedOn Device, Firewall, or OS

* Port isMonitoredFor Status, Traffic, or Security Risk

* Port isBlockedBy Firewall or Policy

* Port isMappedTo Internal Resource or Endpoint

Prompt Examples:

* “List all open TCP ports on the Windows server in the lab subnet.”

* “Alert if port 3389 is accessible from external networks.”

* “Disable unused switch ports for security hardening.”

* “Which ports are used by the remote monitoring agent?”

Agent Execution:

When a prompt refers to a “Port,” the AI agent will:

* Determine whether the request refers to a logical network port or physical hardware port

* Scan, query, or retrieve configuration and status for the specified port

* Evaluate port activity against policies, known vulnerabilities, or usage patterns

* Trigger alerts or remediations for suspicious or unauthorized port usage

* Log port-related actions, including scans, changes, or access attempts

Product

Canonical Term: Product

Definition:
A Product is a tangible or intangible item offered by a vendor, encompassing software applications, hardware devices, or services. In the DevOps Infrastructure Ontology, a product is an entity that can be deployed, configured, and managed within an IT environment. Products are often associated with specific versions, configurations, and may be part of a larger service offering.

Recognized Synonyms:
• Offering
• Solution
• Application (when referring to software products)
• Service (in the context of service products)

Relationships:
• Product isProvidedBy Vendor
• Product hasVersion Version
• Product isDeployedOn Device or Infrastructure
• Product isConfiguredBy Configuration
• Product isPartOf ServiceOffering
• Product hasDependency on other Products

Prompt Examples:
• “List all products deployed in the ‘Healthcare’ tenant.”
• “Check the current version of the antivirus product on all endpoints.”
• “Identify any products with known vulnerabilities in the ‘Finance’ department.”

Agent Execution:
When a prompt refers to a “Product,” the AI agent will:
• Identify the specific product(s) based on name, version, or associated vendor.
• Retrieve deployment and configuration details across the infrastructure.
• Assess compliance with organizational policies and identify any discrepancies.
• Provide recommendations for updates, patches, or reconfigurations as needed.

Recommendation:
Use Product when referring to distinct offerings from vendors that are deployed and managed within the IT environment. Be specific by including:
• The product name and version.
• The associated vendor or provider.
• The deployment context (e.g., which devices or services it’s part of).

Remote Browser

Canonical Term: Remote Browser

Definition:

A Remote Browser is a virtualized or cloud-hosted web browser session that runs on a remote server rather than the local device. It allows users to interact with web content securely without exposing their endpoint or internal network. In MSP and security-focused environments, remote browsers are used for isolating risky web activity, protecting against zero-day threats, and enforcing browsing policies without compromising the local system.

Recognized Synonyms:

* Remote Browser Session

* Isolated Browser

* Cloud Browser

* Browser Isolation

* Virtual Browser

Relationships:

* Remote Browser isHostedOn Remote Server or Virtual Machine

* Remote Browser isAccessedBy User, Technician, or Agent

* Remote Browser isUsedFor Secure Browsing or Isolation

* Remote Browser isManagedBy Policy or Security Platform

* Remote Browser mayBeLoggedIn Audit Log or Session History

Prompt Examples:

* “Launch a remote browser session to safely inspect the suspicious URL.”

* “Restrict remote browser use to technicians only during incident investigations.”

* “Log all activity performed via the remote browser in the audit trail.”

* “Which clients have remote browser isolation enabled as part of their security policy?”

Agent Execution:

When a prompt refers to a “Remote Browser,” the AI agent will:

* Initiate or locate a cloud-hosted browser session based on the user’s role and policy

* Route the requested URL through the remote browser and relay the visual interface to the user

* Enforce any content filtering, domain restrictions, or recording requirements

* Monitor session activity and store logs for audit or compliance

* Terminate or isolate the session automatically based on timeout, policy, or threat detection

Report

Canonical Term: Report

Definition:
A Report is a structured output that presents data collected from systems, policies, or agents over a defined time period. Reports are used for analysis, auditing, compliance, customer communication, or internal performance tracking. In the MSP and N-able context, reports may include information on device health, backup status, patch compliance, license usage, or automation outcomes. Reports can be generated on demand or scheduled, and may be exported in formats such as PDF, CSV, or JSON.

Recognized Synonyms:
• Summary (if high-level — clarify intent)
• Export (context-specific — only when referring to file generation)
• Dashboard (use when referring to real-time visual views)

Relationships:
• Report summarizes Data or Metrics
• Report isGeneratedBy Product, Agent, or MonitoringTool
• Report isDeliveredTo User, MSP, or Tenant
• Report isFilteredBy TimeRange, Entity, or Policy
• Report isConfiguredIn ReportingPolicy or Schedule

Prompt Examples:
• “Generate a weekly patch compliance report for tenant ‘SecureTech’.”
• “What reports are available for backup status over the past 30 days?”
• “Email the executive summary report to all distributors by Monday.”

Agent Execution:
When a prompt refers to a “Report,” the AI agent will:
• Retrieve relevant data sources based on the requested topic and filters
• Aggregate, format, and organize the information into the specified report type
• Apply branding, formatting, and delivery settings (if configured)
• Export the report to a file or deliver it through email, UI, or third-party systems
• Log the report generation and delivery for traceability

Resource

Canonical Term: Resource

Definition:
A Resource is a general term that refers to any manageable object within the N-able ecosystem. This includes physical or virtual components such as devices, users, software, network elements, storage, and compute instances. In internal models (and in the DevOps Infrastructure Ontology), “Resource” is often used as an abstract class or grouping term for things that can be monitored, configured, automated, or queried. It is not recommended for use in AI prompts due to its vagueness.

Recognized Synonyms:
• Asset (if referring to devices – use “Device” instead)
• Object (generic – avoid unless technically scoped)
• Entity (context-specific – avoid in human prompts)

Relationships:
• Resource mayBe a Device, Server, User, Process, Script, or NetworkComponent
• Resource has Status
• Resource isManagedBy Agent
• Resource belongsTo Site or Tenant
• Resource isTaggedWith Label or Category

Prompt Examples:
• INCORRECT: “Check the health of all resources in the customer ‘Brightline’.”
• CORRECT: “Check the health of all devices in the customer ‘Brightline’.”
• INCORRECT: “What resources are consuming the most bandwidth?”
• CORRECT: “What devices or servers are consuming the most bandwidth?”

Agent Execution:
When the term “Resource” is used, the agent:
• Attempts to infer the intended object type based on context (e.g., device, server, user)
• Groups results across multiple types unless otherwise specified
• May return an ambiguous or overly broad result, reducing the usefulness of the output
• Logs a semantic warning if the target object class is unclear

Recommendation:
Avoid using the term “Resource” in end-user prompts or agent-facing commands. Instead:
• Use Device, Server, Script, Policy, User, etc., to specify the object type
• Reserve “Resource” for internal system modeling or development documentation where abstraction is required

Role

Canonical Term: Role

Definition:

A Role is a predefined set of permissions, responsibilities, or access rights assigned to a user, system, or agent within an IT or MSP environment. Roles are used to control access to systems, features, or data based on job function or context. They enable policy enforcement, least-privilege access, and streamlined onboarding by grouping permissions into reusable access profiles.

Recognized Synonyms:

* Access Role

* User Role

* Permission Group

* Access Profile

* Security Role

Relationships:

* Role isAssignedTo User, Agent, or API Client

* Role grantsAccessTo System, Feature, or Dataset

* Role isDefinedBy Access Policy or Admin

* Role isStoredIn Directory, Identity System, or RBAC Engine

* Role influences Credential Use and Audit Visibility

Prompt Examples:

* “Assign the ‘Technician’ role to all new users in the MSP portal.”

* “What permissions are included in the ‘Backup Admin’ role?”

* “Revoke elevated roles from users inactive for more than 30 days.”

* “List all roles with access to credential management features.”

Agent Execution:

When a prompt refers to a “Role,” the AI agent will:

* Identify the role definition and its associated permissions

* Determine who or what currently holds the role

* Modify role assignments, if requested, while validating scope and security policies

* Audit role-related changes and flag violations of least-privilege principles

* Reference roles when determining what actions an agent or user is allowed to perform

Router

Canonical Term: Router

Definition:

A Router is a network device that forwards data packets between computer networks, directing traffic based on destination IP addresses. Routers connect local networks (LANs) to external networks (such as the internet) and can also route traffic between VLANs or subnets. Routers are critical infrastructure components often managed remotely for monitoring, configuration, and policy enforcement.

Recognized Synonyms:

* Network Router

* Edge Router

* Gateway (context-specific)

* Routing Device

* WAN Router

Relationships:

* Router connects Network, Site, or Subnet

* Router isMonitoredBy Probe, Agent, or SNMP

* Router isConfiguredBy Technician or Automation

* Router mayGenerate Alert or LogEntry

* Router isTrackedIn Inventory or Network Map

Prompt Examples:

* “Restart the router at the Denver branch after applying the firmware update.”

* “List all routers with SNMP polling enabled and CPU load over 80 percent.”

* “Add a static route to the guest VLAN on the main office router.”

* “Identify any routers that have not checked in during the last 24 hours.”

Agent Execution:

When a prompt refers to a “Router,” the AI agent will:

* Locate the router in the network inventory or topology map

* Retrieve configuration, performance, and health metrics

* Apply configuration changes, firmware updates, or routing rules as authorized

* Monitor connectivity and generate alerts for failures or anomalies

* Record all actions and configuration changes in the audit log

Script

Canonical Term: Script

Definition:
A Script is a predefined, executable set of instructions used to automate actions on devices, services, or platforms. In the MSP context, scripts are widely used for tasks such as remediation, deployment, configuration, and monitoring. Scripts can be written in various languages (e.g., PowerShell, Bash, Python) and are executed manually, on a schedule, or as part of automation policies triggered by events or conditions.

Recognized Synonyms:
• Automation Script
• Command Script
• Routine
• Playbook (in some contexts — clarify use)

Relationships:
• Script isExecutedOn Device or CloudResource
• Script isTriggeredBy Event or Schedule
• Script isOwnedBy MSP or N-able
• Script isPartOf AutomationPolicy or Workflow
• Script produces OutputData or modifies Configuration

Prompt Examples:
• “Run the disk cleanup script on all Windows servers in the ‘Finance’ tenant.”
• “List all scripts that have failed in the last 24 hours.”
• “Schedule the user offboarding script for every Friday at 6 PM.”

Agent Execution:
When a prompt refers to a “Script,” the AI agent will:
• Locate the script in the approved script repository or library
• Validate execution scope (target devices, permissions, timing)
• Trigger the script as requested (immediate, scheduled, or conditional)
• Monitor for success/failure, capture output, and log results
• Enforce execution limits or policy constraints (e.g., tenant isolation, script approval)

Recommendation:
Use Script when referring to automatable, repeatable task logic. For accuracy:
• Specify script name, language, and execution scope
• Indicate whether it’s a one-time action or part of a policy
• Include execution timing or trigger conditions when relevant

Serial Number

Canonical Term: Serial Number

Definition:

A Serial Number is a unique identifier assigned to a specific hardware or software asset by the manufacturer or vendor. It is used to distinguish one physical or virtual item from another for purposes such as inventory tracking, warranty management, licensing, and support. In MSP and IT environments, serial numbers are commonly used to manage devices like laptops, servers, network hardware, and backup appliances.

Recognized Synonyms:

* Hardware ID

* Device ID

* Product Serial

* Asset Tag (informal)

* S/N

Relationships:

* Serial Number identifies Device or Component

* Serial Number isCollectedBy Discovery, Agent, or ManualEntry

* Serial Number isStoredIn Inventory or CMDB

* Serial Number isUsedFor Warranty Check or Support Lookup

* Serial Number mayBeMappedTo Asset Record or Purchase Info

Prompt Examples:

* “Retrieve the serial numbers of all Dell laptops at the Toronto office.”

* “Check if the serial number 9B2K3T1 is still under manufacturer warranty.”

* “Export a list of serial numbers for all backup appliances with errors this month.”

* “Which devices in the inventory are missing serial numbers?”

Agent Execution:

When a prompt refers to a “Serial Number,” the AI agent will:

* Search the inventory or asset database for matching serial numbers

* Validate the uniqueness and format of the serial number

* Retrieve related data such as device model, location, status, and warranty info

* Trigger workflows related to warranty validation, asset tracking, or vendor escalation

* Record actions involving serial number lookups or updates in the system log

Server

Canonical Term: Server

Definition:
A Server is a physical or virtual computing resource designed to provide services, applications, or data to other devices or clients. In the DevOps Infrastructure Ontology, a Server is a subclass of devopscore:Resource and is characterized by its role in hosting software components, managing workloads, and facilitating networked operations. Servers are integral to IT infrastructures, supporting various functions such as web hosting, database management, and application deployment.

Recognized Synonyms:
• Host
• Node (context-dependent)
• Compute Instance
• VM (Virtual Machine)
• Physical Server

Relationships:
• Server hosts SoftwareComponent
• Server hasHardwareComponent Hardware
• Server isLocatedIn DataCenter
• Server connectsTo Network
• Server dependsOn PowerSupply
• Server isManagedBy SystemAdministrator

Prompt Examples:
• “List all servers hosting the ‘Customer Relationship Management’ application.”
• “What is the current CPU utilization of servers located in the ‘East Coast Data Center’?”
• “Deploy the latest security patch to all web servers running Apache HTTP Server.”

Agent Execution:
When processing prompts involving “Server,” the AI agent will:

  1. Identify Server Instances:
    o Query the infrastructure inventory to retrieve all entities classified under the Server category.
  2. Filter Based on Attributes:
    o Apply filters such as location (isLocatedIn), hosted software (hosts), or hardware specifications (hasHardwareComponent) to narrow down the relevant servers.
  3. Perform Actions:
    o Execute the requested operations, such as retrieving performance metrics, deploying software updates, or modifying configurations on the identified servers.
  4. Ensure Compliance and Logging:
    o Verify that actions comply with organizational policies and log activities for auditing purposes.

Service

Canonical Term: Service

Definition:
A Service is a functional capability delivered through software, infrastructure, or human operations. In the DevOps Infrastructure Ontology, a service may be a system-level process (e.g., a daemon or microservice), a cloud-hosted API, or a business-facing offering (e.g., backup service, monitoring service). In the MSP context, services may be IT services provided to tenants (e.g., endpoint protection), or software-based services running on devices or in the cloud.

Recognized Synonyms:
• System Service (for processes running on devices)
• Managed Service (for offerings delivered by MSPs)
• API Service (when referring to remote callable interfaces)
• Feature (in software product context — use with caution)

Relationships:
• Service isHostedOn Device or Cloud
• Service isProvidedBy Product or Vendor
• Service isMonitoredBy Agent
• Service isPartOf ServiceOffering or SLA
• Service dependsOn Software or Configuration
• Service isConsumedBy User or Tenant

Prompt Examples:
• “Check if the backup service is running on all servers in the ‘Legal’ tenant.”
• “List all services provided to the customer ‘BrightPath Health’.”
• “Which services are failing health checks in the ‘EU Data Center’?”

Agent Execution:
When a prompt refers to a “Service,” the AI agent will:
• Determine whether the service is a system-level process or a business-level offering
• Identify the devices, tenants, or environments associated with that service
• Query service status (running, failed, degraded, stopped)
• Correlate with configuration, dependencies, or SLA status
• Take remediation steps if authorized (e.g., restart, notify, escalate)

Recommendation:
Use Service when referring to ongoing functional components — whether system-based (e.g., “AV scan service”) or offering-based (e.g., “managed patching service”).
• Clarify the scope: running software or delivered offering
• Include name, location, and context (e.g., product, tenant, device)
• Avoid overloading the term “service” for unrelated tasks or generic support

Service Organization

Canonical Term: Service Organization

Definition:
A Service Organization is a hierarchical container used within on-premises N-central deployments to group and manage multiple customer environments under a single Partner (MSP or IT Pro). It acts as an intermediary layer between the Partner and the Customer (Tenant) and allows for administrative separation, reporting, and delegation of services across logically distinct client accounts. Service Organizations are primarily used for internal structuring of accounts, enabling MSPs to manage multiple customers without cross-contamination of access or policy.

Recognized Synonyms:

  • Sub-Customer (legacy or colloquial)
  • Organization Unit (in internal structuring discussions)
  • Client Organization (context-dependent)
  • Department or Branch (when mapping internal clients or sites)

Relationships:

  • Service Organization isManagedBy Partner
  • Service Organization contains Customer (Tenant)
  • Service Organization groups Devices, Policies, and Users
  • Service Organization inherits or overrides Policies from Partner
  • Service Organization isLoggedInTo by AssignedUser or Admin

Prompt Examples:

  • “List all service organizations under ‘CoreTech Systems’.”
  • “Deploy the updated monitoring policy to all customers in the ‘Gov Services’ service organization.”
  • “Which users have access to more than one service organization within ‘SecureOps MSP’?”

Agent Execution:
When a prompt includes the term “Service Organization,” the AI Agent will:

  • Resolve the organizational hierarchy: Partner → Service Organization → Customer
  • Identify all objects (devices, users, policies) scoped to the Service Organization
  • Apply or evaluate configuration or automation at the Service Org level
  • Enforce boundary conditions (e.g., policy inheritance, user access isolation)
  • Return filtered results or execute actions within the correct hierarchy node

Recommendation:
Use Service Organization when referring to an internal logical grouping layer in N-central’s on-prem environments. Always specify:

  • The owning MSP or IT Pro
  • Whether you are targeting all customers within the org or a specific subset
  • The scope of action (reporting, policy application, access control)

Site

Canonical Term: Site

Definition:
A Site is a physical or logical subdivision within a Tenant (Customer). It may represent a physical location (e.g., office, data center), a virtual group (e.g., cloud region, department), or any operational boundary used for organizing and managing Devices | Assets. Sites provide structure for automation, reporting, and policy scoping beneath the customer level.

Recognized Synonyms:

  • Location
  • Office (when physical)
  • Department (when logical)
  • Subtenant (rare — avoid)

Relationships:

  • Site belongsTo Tenant
  • Site contains Device | Asset
  • Site has Policy
  • Site mayContain Subsite (if nested modeling is supported)

Prompt Examples:

  • “Check if the New York site for ‘Harbor Industries’ has any offline devices.”
  • “Apply the new compliance policy to all sites in the customer ‘CityGov’.”
  • “List software installed on devices in the Finance department site.”

Agent Execution:
When a prompt refers to a “Site,” the agent:

  • Resolves the site within the scope of the specified or inferred Tenant
  • Filters Devices, Policies, and Scripts to those associated with the Site
  • Applies actions (e.g., scans, updates, reports) only to entities within the Site boundary
  • If no Site is specified, defaults to all Sites under the Tenant unless scoped otherwise

SNMP

Canonical Term: SNMP

Definition:

SNMP (Simple Network Management Protocol) is a widely used protocol for monitoring and managing devices on IP networks. It enables IT systems to collect data from network devices such as routers, switches, firewalls, servers, and printers. SNMP agents expose device metrics, statuses, and configurations, which can be queried or acted upon by monitoring tools. In MSP environments, SNMP is essential for device discovery, health checks, and alerting.

Recognized Synonyms:

* Simple Network Management Protocol

* SNMP Polling

* SNMP Trap

* Network Monitoring Protocol

Relationships:

* SNMP isEnabledOn Device or Interface

* SNMP isUsedBy Probe or Monitoring Tool

* SNMP exposes OID, Metric, or Status

* SNMP mayTrigger Alert or Script

* SNMP communicatesVia Port 161 (Polling) or 162 (Traps)

Prompt Examples:

* “Poll all SNMP-enabled switches for current interface utilization.”

* “List devices that failed SNMP authentication in the last 24 hours.”

* “Trigger an alert when SNMP reports a fan failure on any core router.”

* “What is the OID for CPU usage on Fortinet firewalls using SNMP?”

Agent Execution:

When a prompt refers to “SNMP,” the AI agent will:

* Query SNMP-enabled devices using the appropriate OIDs and community strings

* Collect and interpret metrics such as uptime, bandwidth, temperature, or error rates

* Handle SNMP traps or unsolicited messages and route them to the alerting system

* Apply any configured thresholds or escalation rules for SNMP-derived data

* Record SNMP poll results and triggered actions in the monitoring system or audit log

Software

Canonical Term: Software

Definition:
Software refers to any executable program, application, or system component that performs functions on a computing platform. In the DevOps Infrastructure Ontology, Software is a subclass of devopscore:Resource and encompasses entities such as operating systems, applications, services, and scripts. Software can be installed on physical or virtual devices and is essential for enabling various IT operations and services.

Recognized Synonyms:
• Application
• Program
• Service (when referring to software-based services)
• Package (in the context of software packages)

Relationships:
• Software isInstalledOn Device
• Software dependsOn other Software
• Software isManagedBy Agent
• Software canBe Patched
• Software hasVersion Version
• Software isConfiguredBy Configuration

Prompt Examples:
• “List all software installed on device ‘ENG-LT-05’.”
• “Update the antivirus software to the latest version on all servers.”
• “Check if the CRM application is running on the New York site.”

Agent Execution:
When a prompt refers to “Software,” the AI agent will:
• Identify the specific software entity based on name, version, or other attributes.
• Determine the devices or environments where the software is installed.
• Perform actions such as installation, update, configuration, or status checks.
• Ensure that dependencies and configurations are managed appropriately.

SSH

Canonical Term: SSH

Definition:

SSH (Secure Shell) is a cryptographic network protocol used to securely access and manage remote systems over an unsecured network. SSH provides encrypted command-line access, secure file transfer, and tunneling capabilities. In MSP and IT environments, SSH is commonly used for remote administration of Linux servers, network devices, and virtual machines.

Recognized Synonyms:

* Secure Shell

* SSH Session

* Remote Shell

* Terminal Access (context-specific)

* Command-Line Login

Relationships:

* SSH connects Technician or Agent to Remote Device

* SSH isSecuredBy Public Key or Password Authentication

* SSH isUsedFor Script Execution, Troubleshooting, or Configuration

* SSH isLoggedIn Audit Log or Session History

* SSH mayBeRestrictedBy Firewall, Policy, or Role

Prompt Examples:

* “Initiate an SSH session to the Ubuntu server for patch verification.”

* “List all devices with SSH enabled and open on port 22.”

* “Disable password-based SSH access and enforce key authentication.”

* “Record all SSH activity for compliance reporting.”

Agent Execution:

When a prompt refers to “SSH,” the AI agent will:

* Authenticate to the target system using configured credentials or key pairs

* Establish a secure terminal session for executing remote commands

* Optionally run predefined scripts or commands based on the task

* Capture session activity, output, and any resulting changes or errors

* Log the session details and actions taken for audit and security purposes

Storage

Canonical Term: Storage

Definition:
Storage refers to the physical or virtual infrastructure used to persist data, including backups, logs, software, configurations, and operating system files. In the MSP and N-able context, storage may include local disk drives, network-attached storage (NAS), cloud storage services (e.g., AWS S3), or specialized backup storage vaults. Storage is a critical resource that supports data retention, recovery, and compliance.

Recognized Synonyms:
• Storage Device (when physical)
• Storage Vault (in backup contexts)
• Repository
• Volume (when partitioned or virtualized)

Relationships:
• Storage contains File, Backup, or Image
• Storage isAttachedTo Device or Site
• Storage isProvisionedBy CloudProvider or MSP
• Storage isMonitoredBy Agent or StoragePolicy
• Storage hasCapacity and UsageThreshold
• Storage isUsedBy Product or Service

Prompt Examples:
• “How much storage is currently available in the backup vault for ‘Tenant-Alpha’?”
• “Alert me when storage usage exceeds 85% on any devices.”
• “List all cloud storage accounts used by the Cove backup service.”

Agent Execution:
When a prompt refers to “Storage,” the AI agent will:
• Query current capacity, usage, and health metrics from telemetry or provider APIs
• Identify the storage type (local, NAS, SAN, cloud) and associated devices or services
• Apply configured policies for thresholds, scaling, or cleanup
• Trigger alerts, archive operations, or storage expansions if needed
• Track usage by tenant, device group, or product to ensure licensing and compliance alignment

Syslog

Canonical Term: Syslog

Definition:

Syslog is a standard protocol used to capture and transmit log or event messages from network devices, servers, applications, or operating systems to a central log management system. Syslog messages include structured or semi-structured data that describe system events, warnings, errors, or informational messages. Syslog is commonly used to centralize logs for auditing, monitoring, security incident detection, and compliance.

Recognized Synonyms:

* System Log

* Event Log (context-specific)

* Logging Protocol

* Syslog Message

Relationships:

* Syslog isGeneratedBy Device, Application, or OperatingSystem

* Syslog isSentTo SyslogServer or SIEM

* Syslog contains Severity, Timestamp, and MessageContent

* Syslog isParsedBy LogAnalyzer or AI Agent

* Syslog mayTrigger Alert or Workflow

Prompt Examples:

* “Show all syslog entries from firewalls in the last 12 hours.”

* “Filter syslog messages for SSH login failures on Linux servers.”

* “Forward all syslog messages to the SIEM platform and apply geo-IP tagging.”

* “What syslog events triggered critical alerts this week?”

Agent Execution:

When a prompt refers to “Syslog,” the AI agent will:

* Access the syslog data store or forwarding pipeline

* Parse and normalize syslog messages for timestamp, source, facility, and severity

* Filter or correlate logs based on the prompt (e.g., keyword, device, severity)

* Surface relevant entries or summaries, and optionally initiate an action (e.g., alert, script execution, ticket creation)

* Record any action taken based on syslog analysis in an audit or incident log

Task

Canonical Term: Task

Definition:
A Task is an individual, executable unit of work within a larger Workflow. Tasks perform discrete actions such as running a script, checking system status, applying a patch, or sending a notification. In the DevOps Infrastructure Ontology, a task is an atomic operation that contributes to the overall goal of a workflow or automation policy. Tasks may be triggered manually, scheduled, or invoked automatically based on conditions.

Recognized Synonyms:
• Job (context-specific — use in batch or scheduling contexts)
• Step (when referring to a task’s place in a sequence)
• Action (when execution is immediate or user-triggered)
• Unit Operation (less common — use in complex automation flows)

Relationships:
• Task isPartOf Workflow
• Task isExecutedBy Agent or Platform
• Task isExecutedBy Task Manager
• Task isTriggeredBy Event or Condition
• Task modifies or queries Resource (e.g., Device, Policy, Service)
• Task hasResult Success, Failure, or Output
• Task mayDependOn PreviousTask

Prompt Examples:
• “Create a task to restart all printers in the ‘Admin’ department every Sunday.”
• “Which tasks failed during last night’s patching workflow?”
• “Log the output of every task run as part of the onboarding process.”

Agent Execution:
When a prompt refers to a “Task,” the AI agent will:
• Identify the specific task definition, either standalone or as part of a workflow
• Validate prerequisites and execution context (permissions, scope, triggers)
• Execute the action associated with the task
• Capture results, return outputs, and handle exceptions if configured

Telnet

Canonical Term: Telnet

Definition:

Telnet is a legacy network protocol used to provide text-based, remote command-line access to devices over TCP. Unlike SSH, Telnet does not encrypt the session, making it insecure for use over untrusted networks. In MSP and IT environments, Telnet may still be used for legacy systems, internal diagnostics, or device configuration, but it is generally replaced by more secure alternatives.

Recognized Synonyms:

* Telnet Session

* Remote Terminal (legacy context)

* Unencrypted CLI Access

* TCP Port 23 Access

Relationships:

* Telnet connects User or Script to Remote Device

* Telnet isEnabledOn Router, Switch, or Legacy System

* Telnet mayBeBlockedBy Firewall or Policy

* Telnet isUsedFor Configuration or Testing

* Telnet isReplacedBy SSH in Secure Environments

Prompt Examples:

* “Test connectivity to port 25 using Telnet for SMTP troubleshooting.”

* “List all devices with Telnet services still enabled.”

* “Disable Telnet on all managed switches and enforce SSH-only access.”

* “Use Telnet to access the legacy PBX system for a configuration check.”

Agent Execution:

When a prompt refers to “Telnet,” the AI agent will:

* Attempt to establish a session to the target IP and port using Telnet

* Execute diagnostic or configuration commands if access is successful

* Warn if Telnet is being used over insecure channels or in non-compliant environments

* Recommend or initiate migration to secure alternatives like SSH

* Log Telnet usage events for audit or deprecation planning

Template

Canonical Term: Template

Definition:
A Template is a reusable configuration object that defines a set of settings, rules, or characteristics to be applied to one or more assets, such as devices, scripts, users, or policies. Templates are commonly used to enforce consistency across environments and to streamline the deployment of standardized configurations. In N-able products, templates may be used for onboarding, automation, security settings, or monitoring configurations.

Recognized Synonyms:
• Profile
• Blueprint (informal)
• Configuration Template
• Policy Template (specific case – see separate term)

Relationships:
• Template appliesTo Device
• Template defines Settings
• Template isOwnedBy MSP or N-able
• Template mayBeAssignedTo Site or Tenant
• Template isBasedOn Policy or Script

Prompt Examples:
• “Apply the Windows onboarding template to all new laptops at the Boston site.”
• “List all templates owned by the MSP ‘CoreNet Services’.”
• “Does the antivirus compliance template include real-time protection settings?”

Agent Execution:
When a prompt refers to a “Template,” the AI agent will:
• Retrieve the template definition, including its scope, settings, and owner
• Determine eligible targets (e.g., Devices, Sites, Tenants)
• Apply the settings defined in the template to those targets, unless overridden by policy exceptions
• Log any deviations or errors during application

Tenant (customer)

Canonical Term: Tenant

Definition:
A Customer is an organization or individual that receives IT services from an MSP. In technical terms, this is represented as a Tenant — a logically isolated environment within an MSP’s management system. Each Tenant contains its own devices, users, policies, and configuration, and does not have visibility into other tenants. “Customer” is the business-facing term; “Tenant” is the system-facing canonical term.

Recognized Synonyms:

  • Customer
  • Client
  • End Customer
  • Site (legacy or context-specific)

Relationships:

  • Tenant isManagedBy MSP
  • Tenant has Device
  • Tenant has Sites
  • Tenant has Policy
  • Tenant isMonitoredBy Agent
  • Tenant has SLA or ServiceAgreement
  • Tenant belongsTo Distributor (indirectly, via MSP)

Prompt Examples:

  • “Which customers haven’t checked in within the last 24 hours?”
  • “Apply the new antivirus policy to all tenants in the finance sector.”
  • “List all devices owned by the customer ‘Lighthouse Legal Group’.”

Agent Execution:
When the prompt includes “Customer,” the agent maps this to a Tenant object in the system. It will:

  • Resolve the correct tenant based on name or ID
  • Scope queries or actions to that tenant’s isolated environment
  • Retrieve or apply policies, scripts, or configurations owned by the MSP
  • Enforce data and action boundaries so one tenant cannot affect another

Traffic

Canonical Term: Traffic

Definition:

Traffic refers to the flow of data packets transmitted across a network between devices, services, or endpoints. It includes both inbound and outbound communication and can represent various protocols (e.g., HTTP, DNS, SSH) and applications. In MSP and IT operations, monitoring traffic is essential for performance analysis, bandwidth management, anomaly detection, and security threat identification.

Recognized Synonyms:

* Network Traffic

* Data Flow

* Packet Stream

* Bandwidth Usage (context-specific)

* Throughput (technical measure)

Relationships:

* Traffic originatesFrom SourceDevice or Endpoint

* Traffic isSentTo DestinationDevice or ExternalService

* Traffic isMonitoredBy Firewall, NetworkProbe, or AI Agent

* Traffic mayBeClassifiedAs Normal or Suspicious

* Traffic influences Bandwidth, Latency, or QoS

* Traffic mayTrigger Alert or PolicyAction

Prompt Examples:

* “Analyze outbound traffic from the finance VLAN over the past 24 hours.”

* “Block all traffic to known malicious IPs using the firewall policy.”

* “Summarize HTTP traffic patterns by device for the last 7 days.”

* “Detect unusual traffic spikes to external DNS servers.”

Agent Execution:

When a prompt refers to “Traffic,” the AI agent will:

* Query network flow data, packet captures, or traffic logs from monitoring tools

* Aggregate or filter traffic by protocol, source, destination, port, or time window

* Detect anomalies or threshold violations (e.g., unusual spikes, unauthorized destinations)

* Correlate traffic patterns with known risks or baseline behaviors

* Trigger appropriate actions such as alerting, blocking, throttling, or logging based on configured policies

User

Canonical Term: User

Definition:
A User is an individual identity that interacts with or is managed by the ecosystem. The term User may refer to two distinct but related concepts. In the DevOps Infrastructure Ontology, a User is typically a human actor who interacts with resources and services, often through a UI, command line, or API. A user may represent different roles depending on the context, including an MSP administrator, IT technician, end user (someone logging into a managed device), or N-able support personnel. A user may also be a leaf node representing a person managed as part of a customer environment. Users can be associated with specific tenants, organizations, roles, or permissions, and their activities may be logged, audited, and constrained by policies.
It is not recommended to use the term User without additional context.

Recognized Synonyms:
• Admin (when referring to privileged users)
• Technician (for operational users)
• End User (device or service consumer)
• Operator (in automation/DevOps contexts)
• Identity (generic — use carefully)

Relationships:
• User isAssignedTo Tenant, MSP, or Site
• User hasRole (e.g., Admin, Viewer, Operator, Support)
• User isAuthenticatedBy IdentityProvider or DirectoryService
• User performs Action or Task
• User accesses Product or Platform
• User isLoggedInVia Asset | Device or WebSession

Prompt Examples:
• “List all users with admin access to tenant ‘BlueNet Solutions’.”
• “Has the end user ‘alex.jordan’ logged in from multiple locations recently?”
• “Disable the user account for ‘tech.msmith’ across all N-central-managed environments.”

Agent Execution:
When a prompt refers to a “User,” the AI Agent will:
• Resolve the identity context (e.g., MSP admin, end user, support tech)
• Look up associated permissions, roles, tenant ownership, and login history
• Take actions such as listing access, modifying roles, disabling users, or flagging suspicious activity
• Use multi-tenant scoping rules to ensure actions are authorized and logged appropriately
• Disambiguate prompts like “user logged into the asset” vs. “user with N-able product access”

Version

Canonical Term: Version

Definition:

A Version is a specific state or release of a software application, configuration, operating system, firmware, or document that reflects its development or deployment stage. Versions are used to track changes, ensure compatibility, and manage updates across environments. In MSP and IT operations, versioning is critical for patching, compliance, supportability, and rollback planning.

Recognized Synonyms:

* Release

* Build (context-specific)

* Revision

* Software Version

* Firmware Version

Relationships:

* Version appliesTo Software, Device, OS, Policy, or Script

* Version isTrackedIn Inventory, Patch Manager, or CMDB

* Version isComparedTo RequiredVersion or LatestVersion

* Version mayTrigger Update, Alert, or Compatibility Check

* Version isReportedIn Device Summary or Compliance Report

Prompt Examples:

* “List all devices running a version of Chrome older than 115.”

* “Is the backup agent version compatible with the current OS version?”

* “Update all endpoints to the latest version of the RMM agent.”

* “Which scripts have multiple versions saved in the automation library?”

Agent Execution:

When a prompt refers to a “Version,” the AI agent will:

* Identify the current version of the referenced object

* Compare it to known baselines, approved versions, or available updates

* Initiate version-specific actions such as patching, blocking, or rollback

* Surface compatibility warnings or compliance gaps when mismatched

* Log version changes, comparisons, and actions for auditing or reporting

VMware

Canonical Term: VMware

Definition:

VMware is a widely used virtualization and cloud infrastructure platform that enables the creation, management, and operation of virtual machines (VMs) and virtualized environments. VMware products support server, desktop, and network virtualization, allowing multiple workloads to run on shared physical hardware. In MSP and IT environments, VMware is often integrated for infrastructure management, backup, monitoring, and automation.

Recognized Synonyms:

* VMware Platform

* ESXi Host (context-specific)

* vSphere Environment

* Virtualization Stack

* VMware Infrastructure

Relationships:

* VMware hosts Virtual Machine

* VMware isManagedBy vCenter or API

* VMware isMonitoredBy Agent, Probe, or SNMP

* VMware integratesWith Backup, Discovery, and Patch Tools

* VMware exposes Metrics, Inventory, and ConfigurationData

Prompt Examples:

* “List all VMware hosts with over 80 percent CPU usage.”

* “Backup all virtual machines in the VMware cluster nightly.”

* “Which VMware guest VMs are running outdated tools?”

* “Add the new ESXi host to the existing VMware inventory group.”

Agent Execution:

When a prompt refers to “VMware,” the AI agent will:

* Connect to the VMware environment via vSphere API or integration endpoint

* Retrieve inventory and configuration data on hosts, VMs, and resource usage

* Monitor performance metrics and status indicators for virtualization health

* Execute tasks such as backup, VM tagging, or automated provisioning

* Log interactions and changes for audit and compliance reporting

Vulnerability

Canonical Term: Vulnerability

Definition:
A Vulnerability is a weakness or flaw in software, hardware, or configuration that could be exploited to compromise system security, data integrity, or availability. Vulnerabilities are typically assigned a unique identifier (e.g., CVE ID), a severity score (e.g., CVSS), and may be associated with known exploits. In the MSP context, vulnerabilities are detected through scans, threat intelligence feeds, or vendor advisories and are often tracked and mitigated using patching, configuration changes, or compensating controls.

Recognized Synonyms:
• CVE (Common Vulnerabilities and Exposures identifier – use when known)
• Security Flaw
• Exploit (note: an exploit is a tool/technique, not the vulnerability itself)
• Weakness (less specific – avoid unless referring to misconfiguration)

Relationships:
• Vulnerability affects Software or Device
• Vulnerability isIdentifiedBy VulnerabilityScanner or ThreatFeed
• Vulnerability hasSeverity Score
• Vulnerability isRemediatedBy Patch or ConfigurationChange

Prompt Examples:
• “List all critical vulnerabilities detected on devices in the ‘Healthcare West’ tenant.”
• “Has the CVE-2024-23978 vulnerability been patched across all cloud servers?”
• “Generate a vulnerability report for third-party software used in finance-related sites.”

Agent Execution:
When a prompt refers to a “Vulnerability,” the AI agent will:
• Look up the vulnerability using known identifiers (e.g., CVE IDs) or descriptive keywords
• Query vulnerability scan results or correlated security event data
• Map the vulnerability to affected software, devices, or configurations
• Check remediation status: patched, mitigated, or unaddressed
• Recommend or trigger remediation actions if authorized (e.g., apply patch, isolate device)

Warranty

Canonical Term: Warranty
Definition:
A Warranty refers to the contractual period during which a hardware asset (e.g., server, laptop, disk) is covered for repairs, replacements, or support by the manufacturer or vendor. In the MSP context, warranty information helps inform lifecycle management, asset planning, and service prioritization. Tracking warranty status enables technicians to escalate hardware issues appropriately and manage risk around unsupported devices.
Recognized Synonyms:
• Hardware Coverage
• Support Agreement (may overlap with broader services – use carefully)
• Manufacturer Service Contract
Relationships:
• Warranty isAssociatedWith Hardware or Device
• Warranty has StartDate and EndDate
• Warranty isProvidedBy Vendor or Manufacturer
• Warranty affects ReplacementPlan or LifecycleStage
• Warranty isTrackedIn AssetInventory
Prompt Examples:
• “Which devices have warranties expiring in the next 30 days?”
• “Is the disk in device ‘HR-LT-004’ still under warranty?”
• “List all out-of-warranty servers in the ‘EMEA’ region.”
Agent Execution:
When a prompt includes “Warranty,” the AI agent will:
• Look up asset metadata to determine the warranty start and end dates
• Flag any expired or soon-to-expire warranties
• Associate warranty status with asset age, performance issues, or incident trends
• Suggest replacement recommendations or notify stakeholders based on policy
• Optionally pull warranty verification from vendor portals (if integrated)

Webhook

Canonical Term: Webhook

Definition:

A Webhook is a user-defined HTTP callback that automatically sends real-time data or event notifications from one system to another when a specified condition is met. Unlike APIs that require polling, webhooks push information immediately to an external endpoint. In MSP and IT environments, webhooks are often used to trigger workflows, sync systems, log events, or alert technicians based on changes in tickets, devices, backups, or policies.

Recognized Synonyms:

* HTTP Callback

* Event Hook

* Outbound Webhook

* Notification Endpoint

* Real-Time Trigger

Relationships:

* Webhook isTriggeredBy Event or StateChange

* Webhook sendsDataTo External System or Agent

* Webhook isConfiguredIn Platform, Policy, or Integration

* Webhook mayContain Payload with JSON or XML Format

* Webhook isLoggedIn Audit Log or Integration History

Prompt Examples:

* “Create a webhook to notify the external ticketing system when a device goes offline.”

* “List all active webhooks configured for backup failure events.”

* “Disable the webhook that posts alerts to the incident response Slack channel.”

* “What payload does the policy webhook send when a patch job completes?”

Agent Execution:

When a prompt refers to a “Webhook,” the AI agent will:

* Retrieve the webhook configuration, including trigger event, URL, and payload format

* Monitor for relevant events and evaluate webhook triggering conditions

* Send structured data to the designated external endpoint

* Handle success or failure responses and retry logic if applicable

* Log webhook activity, errors, and payload content for audit and troubleshooting

WMI

Canonical Term: WMI

Definition:

WMI (Windows Management Instrumentation) is a Microsoft technology that provides a standardized interface for accessing and managing data about Windows-based systems. It allows scripts, agents, and monitoring tools to query system information such as hardware status, software inventory, services, processes, and configuration settings. In MSP environments, WMI is widely used for device discovery, performance monitoring, remote execution, and automation.

Recognized Synonyms:

* Windows Management Instrumentation

* WMI Query

* WMI Provider

* WMI Service

Relationships:

* WMI isEnabledOn Windows Device

* WMI isQueriedBy Agent, Script, or Monitoring Tool

* WMI exposes SystemInfo, Metrics, or ConfigurationData

* WMI mayBeUsedIn Discovery, Alerting, or Reporting

* WMI isSecuredBy User Permissions and Firewall Rules

Prompt Examples:

* “Query WMI for disk health and available storage on all domain-joined devices.”

* “Which devices have WMI disabled or returning errors?”

* “Use WMI to collect a list of installed applications across the fleet.”

* “Alert if WMI reports CPU usage over 90 percent for 10 minutes.”

Agent Execution:

When a prompt refers to “WMI,” the AI agent will:

* Establish a connection to the target Windows device using proper credentials and network access

* Execute the WMI query to retrieve requested information (e.g., Win32_OperatingSystem, Win32_Service)

* Parse and format results for reporting, monitoring, or policy evaluation

* Log WMI query outcomes, including failures or access issues

* Respect configured permissions, throttling rules, and audit requirements for WMI usage

Workflow

Canonical Term: Workflow

Definition:
A Workflow is a structured sequence of tasks or activities designed to accomplish a specific objective within a system or process. In the DevOps Infrastructure Ontology, a workflow represents the orchestration of actions, often automated, that manage and control various aspects of IT infrastructure and software development. Workflows are essential for ensuring consistency, efficiency, and repeatability in operations.

Recognized Synonyms:
• Process Flow
• Automation Sequence
• Task Pipeline
• Operational Procedure

Relationships:
• Workflow consistsOf Actions or Tasks
• Workflow isTriggeredBy Event or Condition
• Workflow isManagedBy OrchestrationTool or AutomationPlatform
• Workflow interactsWith Resources such as Devices, Services, or Applications
• Workflow hasOutcome Result or StateChange

Prompt Examples:
• “Initiate the onboarding workflow for a new employee in the ‘Sales’ department.”
• “What workflows are currently active for patch management across all servers?”
• “Modify the backup workflow to include encryption before data transfer.”

Agent Execution:
When a prompt refers to a “Workflow,” the AI agent will:
• Identify the specific workflow based on context and naming conventions.
• Execute the defined sequence of tasks, ensuring each step is completed successfully.
• Monitor the workflow’s progress and handle exceptions or errors as defined.
• Log the execution details for auditing and compliance purposes.
• Provide feedback or notifications upon completion or if intervention is required.



Leave a Reply

Your email address will not be published. Required fields are marked *