Skip to main content
All CollectionsHow To Guides
Building Your Report Outline
Building Your Report Outline

From outline to insights, crafting your report

Heather Perez avatar
Written by Heather Perez
Updated over 5 months ago

How To Structure Your Report

The report outline acts as your roadmap, guiding the flow of information. It breaks your report into clear, customizable sections.

When creating a new report, a preset outline will be provided for you. This outline can be customized to your needs either by adding, deleting, or editing sections. You can also add subsections and move them in the order you would like Indago to build your report.

In Indago, section/subsection titles in the outline double as prompts! Write them with specific formatting instructions (e.g., "in list format" or "with footnote sources in MLA format") to tailor your report layout and get the most out of your data.

Adding Sections

To add a new section, select Add Section in the upper right-hand corner above the outline. To create a subsection, select Add Section and move the box underneath the main section indenting it to the right.

Deleting Sections

To delete a section, select the dots to the right of the section and hit delete or the trash can icon.

Editing Sections

To edit a section, double-click within the section box and begin typing your instructions or prompts.


Example Reporting Outlines

Example Outline for a Cyber-Intelligence Report:

  • Section 1: Executive Summary

    • Subsection: Overview of the main findings and recommendations with no more than two concise and unbiased paragraphs.

  • Section 2: Key Findings written in 5 concise bullet points.

  • Section 3: Trend Analysis

    • Subsection: Generate a list of the most common cyber threats in the past [date range], including details on malware types and targeted sectors, with footnote sources in MLA format.

  • Section 4: Threat Actor Analysis

    • Subsection: Generate a list of the most common threat actors in the past year, including their tactics, techniques, and procedures, with footnote sources in MLA format.

  • Section 5: Incident Report

    • Subsection: Summarize recent significant cyber incidents, the exploited vulnerabilities, the impact on the entities, and the response strategies used, with footnote sources in MLA format.

  • Section 6: Potential Mitigation Strategies

    • Subsection: Review and suggest cybersecurity best practices and defensive measures that have been effective against the identified threats sectors.

  • Section 8: Conclusion

    • Subsection: Summary of key points and actionable insights.

Example Outline for a Bias Assessment

  • Section 1: Provide an assessment of the bias in each of the articles provided.

  • Section 2: Rank the authors in order of least to most bias.

  • Section 3: Provide a short 1 paragraph summary of the overall bias in these articles.

Example Outline for a Threat Intelligence Report

Purpose: Provide the Scope and Objective of your report.

  • Section 1: Executive Summary: Overview of the main findings and recommendations.

  • Section 2: Threat Landscape: Overview of the current threat environment, highlighting significant recent incidents.

  • Section 3: Threat Analysis: Detailed analysis of specific threats (i.e., cyber, physical, and insider threats).

  • Section 4: Mitigation Strategies: Provide recommended actions to mitigate identified threats in list format.

  • Section 5: Conclusion: Summary of key points and actionable insights.

  • Section 6: Source all Articles in MLA Format.

Fun Tip

Get clear, concise answers quickly using the Indago outline as your co-analyst to analyze your collections, including uploaded content. Utilize the outline to create questions and prompts in order to address any inquiries you may have regarding a specific topic or the documents/collections you have compiled.

For example:

  • Need a summary? Ask, "Summarize this document."

  • Need briefing points? Ask, “Provide five concise and unbiased briefing points.”

  • Uploaded a foreign language document? Ask for a detailed summary and/or its impact on a specific topic. (Prompt 1) Provide a detailed summary of the contents of this article; (Prompt 2) How do the contents of this article impact US national security?

  • Need to find specific user posts in chat logs? Use "Show messages from [username]."

Did this answer your question?