How To Structure Your Report
The report outline acts as your roadmap, guiding the flow of information. It breaks your report into clear, customizable sections.
When creating a new report, a preset outline will be provided for you. This outline can be customized to your needs either by adding, deleting, or editing sections. You can also add subsections and move them in the order you would like Indago to build your report.
In Indago, section/subsection titles in the outline double as prompts! Write them with specific formatting instructions (e.g., "in list format" or "with footnote sources in MLA format") to tailor your report layout and get the most out of your data.
Adding Sections
To add a new section, select Add Section in the upper right-hand corner above the outline. To create a subsection, select Add Section and move the box underneath the main section indenting it to the right.
Deleting Sections
To delete a section, select the dots to the right of the section and hit delete or the trash can icon.
Editing Sections
To edit a section, double-click within the section box and begin typing your instructions or prompts.
Example Reporting Outlines
Example Outline for a Cyber-Intelligence Report:
Section 1: Executive Summary
Subsection: Overview of the main findings and recommendations with no more than two concise and unbiased paragraphs.
Section 2: Key Findings written in 5 concise bullet points.
Section 3: Trend Analysis
Subsection: Generate a list of the most common cyber threats in the past [date range], including details on malware types and targeted sectors, with footnote sources in MLA format.
Section 4: Threat Actor Analysis
Subsection: Generate a list of the most common threat actors in the past year, including their tactics, techniques, and procedures, with footnote sources in MLA format.
Section 5: Incident Report
Subsection: Summarize recent significant cyber incidents, the exploited vulnerabilities, the impact on the entities, and the response strategies used, with footnote sources in MLA format.
Section 6: Potential Mitigation Strategies
Subsection: Review and suggest cybersecurity best practices and defensive measures that have been effective against the identified threats sectors.
Section 8: Conclusion
Subsection: Summary of key points and actionable insights.
Example Outline for a Bias Assessment
Section 1: Provide an assessment of the bias in each of the articles provided.
Section 2: Rank the authors in order of least to most bias.
Section 3: Provide a short 1 paragraph summary of the overall bias in these articles.
Example Outline for a Threat Intelligence Report
Purpose: Provide the Scope and Objective of your report.
Section 1: Executive Summary: Overview of the main findings and recommendations.
Section 2: Threat Landscape: Overview of the current threat environment, highlighting significant recent incidents.
Section 3: Threat Analysis: Detailed analysis of specific threats (i.e., cyber, physical, and insider threats).
Section 4: Mitigation Strategies: Provide recommended actions to mitigate identified threats in list format.
Section 5: Conclusion: Summary of key points and actionable insights.
Section 6: Source all Articles in MLA Format.
Fun Tip
Get clear, concise answers quickly using the Indago outline as your co-analyst to analyze your collections, including uploaded content. Utilize the outline to create questions and prompts in order to address any inquiries you may have regarding a specific topic or the documents/collections you have compiled.
For example:
Need a summary? Ask, "Summarize this document."
Need briefing points? Ask, “Provide five concise and unbiased briefing points.”
Uploaded a foreign language document? Ask for a detailed summary and/or its impact on a specific topic. (Prompt 1) Provide a detailed summary of the contents of this article; (Prompt 2) How do the contents of this article impact US national security?
Need to find specific user posts in chat logs? Use "Show messages from [username]."