AI Tools for Systems Administrators

AI tools for sysadmins to audit infrastructure security, monitor system health, automate documentation, and stay current on best practices.

Get started for free

Works in Chat, Cowork and Code

SSH Key Exposure
2 servers with authorized_keys containing expired admin keys
TLS Configuration
TLSv1.0 still enabled on 3 servers — upgrade to TLSv1.2+
Unpatched Kernel
Kernel 5.15.0 — CVE-2024-1085 unpatched on web-03
Unnecessary Services
rpcbind and avahi-daemon running on 4 servers — not required
Firewall Rules
Missing egress rules on db-01, db-02, app-03

Infrastructure security audit

Scan your systems for security vulnerabilities, misconfigurations, and compliance violations.

Audit all my production servers for security issues, weak passwords, and unnecessary services

Found 14 issues: SSH key exposure, weak TLS, unpatched kernel, unnecessary services running, missing firewall rules on 3 servers.

ToolRouter scan_app
SSH Key Exposure
2 servers with stale authorized_keys entries — remove immediately
Weak TLS
TLSv1.0 enabled on web-01, web-02, web-03 — upgrade required
Unpatched Kernel
CVE-2024-1085 unpatched on web-03 — CVSS 9.8 · patch available
Unnecessary Services
rpcbind running on 4 servers · avahi-daemon on 3 — disable both
Missing Firewall Rules
No egress rules on db-01, db-02, app-03 — lateral movement risk

Vulnerability tracking and patching

Monitor for CVEs affecting your infrastructure and plan patching windows.

Show me all critical CVEs for Ubuntu 22.04 and Windows Server 2022 from the last 3 months

Found 12 critical CVEs total. 8 in Linux kernel, 4 in Windows services. Includes CVSS scores and available patches.

ToolRouter search_cves
CveOsCvss
CVE-2024-1085Ubuntu 22.049.8
CVE-2024-21413Windows Server 20229.8
CVE-2024-26593Ubuntu 22.049.1
CVE-2024-21338Windows Server 20227.8
12 critical CVEs total · 8 Ubuntu · 4 Windows · patches available for all

System administration documentation and troubleshooting

Find best practices, configuration guides, and troubleshooting steps for your systems.

Show me how to set up SSH hardening and key management on Ubuntu servers following security best practices

Found official Ubuntu security documentation: SSH key generation, /etc/ssh/sshd_config hardening, certificate-based authentication.

ToolRouter search_docs
Step 1 — Key Generation
ssh-keygen -t ed25519 · disable RSA-1024 keys entirely
Step 2 — sshd_config
PasswordAuthentication no · PermitRootLogin no · MaxAuthTries 3
Step 3 — Certificate Auth
Deploy SSH CA for fleet-wide key management — eliminates manual rotation
Step 4 — Fail2ban
Install fail2ban · ban after 5 failed attempts · 10 minute lockout
Step 5 — Audit
Run `sshd -T` to verify config · test from separate session before closing current one

Suspicious access detection

Investigate access logs and identify suspicious IP addresses and geographic patterns.

Look up the geolocation for these 5 suspicious IPs from my VPN logs: 203.0.113.5, 198.51.100.10, etc.

IP 203.0.113.5: Beijing, China. IP 198.51.100.10: Unknown VPN provider. 3 others: legitimate office locations.

ToolRouter lookup_ip
Ip addressCountryCity
203.0.113.5ChinaBeijing
198.51.100.10UnknownUnknown
192.0.2.22United StatesAustin, TX
203.0.114.8United KingdomLondon
5 IPs analyzed · 2 flagged for review · 3 legitimate

Disaster recovery planning

Research and design business continuity and disaster recovery strategies.

Design a disaster recovery plan for our critical systems with RTO of 4 hours and RPO of 1 hour

Compiled strategies: active-active replication, database shadowing, automated failover, runbooks, and testing procedures.

ToolRouter research
Database Replication
Synchronous streaming replication to warm standby — 1hr RPO met
Application Failover
Automated health check + DNS failover within 10 minutes
Backup Schedule
Hourly snapshots to off-site S3 · daily full backup retained 30 days
Runbook Coverage
Runbooks required for each critical system — RTO depends on documentation quality
Testing Cadence
Monthly tabletop exercise · quarterly full failover test recommended

Ready-to-use prompts

Security audit

Create a comprehensive Linux server security audit checklist covering: firewall rules, SSH configuration, user access, patches, and monitoring.

Find critical CVEs

Search for all critical (CVSS 8.0+) and high (CVSS 7.0+) CVEs for Red Hat Enterprise Linux 9 from the past 6 months

Hardening guide

Look up best practices and step-by-step guides for hardening Windows Server 2022 following CIS benchmarks

IP investigation

Identify the geographic location, ISP, and risk level of these suspicious IPs from my firewall logs

Backup strategy

Design a backup and disaster recovery strategy for 50+ servers with daily backups and 4-hour RTO requirement

Patch management

Create a patch management plan for mixed Windows and Linux infrastructure with minimal downtime

Tools to power your best work

165+ tools.
One conversation.

Everything systems administrators need from AI, connected to the assistant you already use. No extra apps, no switching tabs.

Security hardening sprint

Conduct a security audit, identify vulnerabilities, research best practices, and create a hardening roadmap.

1
Security Scanner icon
Security Scanner
Scan all systems for security issues
2
Vulnerability Database icon
Vulnerability Database
Check for CVEs in installed software versions
3
Library Docs icon
Library Docs
Look up hardening guides for your operating systems
4
Deep Research icon
Deep Research
Research industry best practices and compliance requirements

Incident response and forensics

Investigate suspicious access, identify compromised systems, and respond to security incidents.

1
IP Geolocation icon
IP Geolocation
Investigate suspicious IPs and geographic patterns
2
Security Scanner icon
Security Scanner
Scan potentially compromised servers
3
Vulnerability Database icon
Vulnerability Database
Check if any known CVEs were exploited

Disaster recovery planning

Design a comprehensive DR plan, document procedures, and establish regular testing schedules.

1
Deep Research icon
Deep Research
Research DR strategies and technologies
2
Library Docs icon
Library Docs
Review documentation for your backup and replication tools
3
Deep Research icon
Deep Research
Create detailed runbooks and test procedures

Frequently Asked Questions

How often should I scan my infrastructure for vulnerabilities?

Best practice: continuous scanning on every deployment, weekly for your entire infrastructure, and monthly deep audits. More frequent scans catch configuration drift and unpatched systems early.

Will the security scanner find all vulnerabilities?

Security Scanner detects common misconfigurations, weak access controls, unpatched software, exposed credentials, and known vulnerable versions. It won't find sophisticated attacks, zero-days, or logical flaws.

How accurate is IP geolocation data?

IP geolocation is 85-95% accurate at the country level, 70-80% at the city level. Accuracy varies by ISP and VPN usage. Use it to identify suspicious patterns, not as sole evidence of compromise.

Can Library Docs help with Windows system administration?

Yes. Library Docs includes official Microsoft Windows Server documentation, Active Directory best practices, PowerShell guides, and group policy documentation.

How should I prioritize patching when there are many CVEs?

Prioritize by: CVSS score (critical first), exploitability (actively exploited first), business impact (critical systems first), and affected systems count. Use the vulnerability database to track which systems are affected.

More AI tools by profession

Give your AI superpowers.

Get started for free

Works in Chat, Cowork and Code