Skip to main content
Glama

Windows Operations MCP

file_ops_prompts.md•6.53 kB
# File Operations Prompt Templates ## File Management ### Bulk File Operations ``` Help me manage files in bulk: - List all files in directory with specific extensions (.log, .tmp, .bak) - Find files older than 30 days in specified directories - Identify duplicate files by name or content - Calculate total size of files by type/extension - Generate file inventory with metadata ``` ### File Organization ``` Organize files systematically: - Sort files into directories by date, type, or size - Rename files with consistent naming conventions - Move files based on content or metadata - Create directory structures based on file analysis - Clean up empty directories ``` ### File Analysis ``` Analyze file contents and patterns: - Count lines, words, characters in text files - Extract metadata from various file types - Search for specific patterns across multiple files - Compare file contents and show differences - Generate file type distribution reports ``` ## Log File Processing ### Log Analysis ``` Process and analyze log files: - Parse Windows Event Logs for specific events - Extract error patterns from application logs - Summarize log entries by time period - Find correlations between different log sources - Generate log analysis reports ``` ### Log Monitoring ``` Monitor log files for specific conditions: - Watch log files for new error entries - Alert on specific log patterns or thresholds - Extract metrics from log data - Create log rotation and cleanup strategies - Track log file growth and disk usage ``` ## Configuration Management ### Configuration Files ``` Manage configuration files safely: - Read and parse JSON, XML, INI configuration files - Compare configuration files across environments - Extract specific settings from configuration files - Validate configuration syntax and structure - Create configuration backup strategies ``` ### Environment Configuration ``` Manage environment-specific configurations: - Read environment variables and system settings - Compare configurations across different systems - Export configuration for documentation - Validate configuration compliance - Track configuration changes over time ``` ## Data Processing ### Text Processing ``` Process text files and data: - Extract specific data from structured text files - Convert between different text formats - Clean and normalize text data - Merge multiple text files with common structure - Generate reports from processed text data ``` ### CSV and Data Files ``` Work with structured data files: - Read and analyze CSV files for data patterns - Extract specific columns or rows from data files - Convert between different data formats - Validate data integrity and consistency - Generate summary statistics from data files ``` ## Backup and Archive ### Backup Operations ``` Support backup and archival operations: - Create file inventories for backup planning - Identify files changed since last backup - Calculate backup storage requirements - Verify backup file integrity - Generate backup reports and summaries ``` ### Archive Management ``` Manage file archives and compression: - List contents of archive files - Extract specific files from archives - Analyze archive contents and compression ratios - Manage archive retention policies - Create archive organization strategies ``` ## Development Support ### Source Code Management ``` Support development file operations: - Analyze source code file structure and dependencies - Find files containing specific code patterns - Generate code documentation from file analysis - Track file changes and modifications - Create development environment file inventories ``` ### Project Management ``` Support project file management: - Organize project files by type and purpose - Create project templates and structures - Manage project dependencies and resources - Generate project documentation from file analysis - Track project file metrics and statistics ``` ## Security and Compliance ### File Security ``` Ensure file security and compliance: - Check file permissions and access controls - Identify files with sensitive content patterns - Audit file access and modification history - Validate file integrity with checksums - Generate security compliance reports ``` ### Data Privacy ``` Support data privacy and protection: - Scan files for personally identifiable information (PII) - Identify files requiring special handling - Create data classification reports - Support data retention policy compliance - Generate privacy impact assessments ``` ## Automation Examples ### Daily File Operations ``` Automate daily file management tasks: - Clean up temporary files and directories - Organize downloaded files by type - Archive old log files - Generate daily file system reports - Monitor disk space usage ``` ### Weekly Maintenance ``` Perform weekly file maintenance: - Deep scan for duplicate files - Analyze file system fragmentation - Update file inventories and catalogs - Review file access patterns - Generate maintenance reports ``` ### Monthly Reviews ``` Conduct monthly file system reviews: - Analyze file growth trends - Review storage utilization patterns - Identify optimization opportunities - Generate executive summary reports - Plan storage capacity requirements ``` ## Error Handling and Recovery ### File Recovery ``` Support file recovery operations: - Search for accidentally deleted files - Recover files from backup locations - Restore files from previous versions - Verify file recovery integrity - Document recovery procedures ``` ### Error Diagnostics ``` Diagnose file operation errors: - Identify permission and access issues - Troubleshoot file locking problems - Analyze disk space and quota issues - Check file system integrity - Generate error diagnostic reports ``` ## Best Practices ### Safe File Operations - Always create backups before modifying files - Use read-only operations when possible - Validate file operations before execution - Implement proper error handling - Log all significant file operations ### Performance Optimization - Use efficient file processing techniques - Minimize disk I/O operations - Process files in appropriate batch sizes - Monitor resource usage during operations - Implement progress feedback for large operations ### Security Guidelines - Respect file permissions and access controls - Avoid processing sensitive files unnecessarily - Use secure temporary file handling - Sanitize file paths and names - Follow data protection regulations

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/sandraschi/windows-operations-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server