System Agents
The One Agents ships with four pre-built system agents that activate automatically with every new account. They represent The One Stack's opinionated best practices for MSP operations — the automation that every MSP should have running on day one.
System agents are read-only. You can pause them, override them per-event with a custom agent, or clone them to create a customized version. You cannot edit or delete the originals.
Dispatch Agent
ID: agent_system_dispatch
Trigger: psa:ticket.created (fires on every new PSA ticket)
Category: Service Desk
Default model: Standard (GPT-4o mini, 20 credits/ticket)
The Dispatch Agent is the backbone of your service desk automation. Every time a new ticket is created, Dispatch runs a three-step workflow:
What It Does
Step 1 — AI Classification (Standard, 20 credits) Analyzes the ticket subject, type, description, and client context. Returns a structured classification:
priority— Re-scores the ticket priority. If a client submitted a P3 ticket that reads like a P1 (e.g., "The whole office can't print" vs. "Ransomware spreading across the network"), Dispatch corrects it.category—network,security,hardware,software,user_access, orgeneralrequired_skill—senior,network,security, orgeneral— used to route to the right technician queueurgency_notes— Brief explanation of the routing decisiondraft_response— A professional first-response email ready to send to the client
Step 2 — Update Ticket
Calls the PSA API to apply the AI-determined priority, category, and marks the ticket as ai_classified: true. Your technicians see a pre-triaged ticket — no manual triage queue.
Step 3 — Add First Response Posts Dispatch's drafted first-response email as a public note on the ticket. Your client receives an immediate, professional acknowledgment. Technicians can edit and send, or let it go out automatically if your PSA is configured for auto-response.
Impact
At 100 tickets per week, Dispatch:
- Eliminates manual triage for 100 tickets
- Drafts 100 first-response emails
- Catches misclassified priorities before they breach SLA
- Costs 2,000 credits/week — 8,000/month
Customizing Dispatch
Clone the Dispatch Agent if you want to:
- Add a Branch step that routes security-category tickets to a dedicated security queue
- Add a Notification step that pages a specific technician for hardware failures at a particular client
- Modify the AI prompt to match your organization's ticket categories exactly
- Change the model to
quick(5 credits) for simple request-type tickets only
Guardian Agent
ID: agent_system_guardian
Trigger: defend:alert.fired (fires on every Defend security alert)
Category: Security
Default model: Standard (GPT-4o mini, 20 credits/alert)
The Guardian Agent bridges your EDR and your service desk. When Defend detects a threat, Guardian ensures it becomes a trackable, actionable work item — not a notification that gets lost.
What It Does
Step 1 — AI Alert Enrichment (Standard, 20 credits) Analyzes the alert description, severity, MITRE tactic, device, and client context. Returns a structured analysis:
severity— Re-scored priority (p1–p4) reflecting the business impact, not just the raw detection scoreshould_page_oncall—truefor P1/P2 alertsshould_isolate_device—trueonly for confirmed ransomware or active breach scenariosticket_subject/ticket_description— Human-readable ticket content built from the technical alert dataclient_notification— Optional client-facing communication if the situation warrants it
Step 2 — Create PSA Ticket
Creates a security incident ticket in PSA with the AI-generated subject and description. Sets the source to defend_alert and links the original alert ID for cross-product traceability.
Step 3 — Page On-Call
If should_page_oncall is true, creates an incident in The One On-Call, automatically paging the current on-call technician.
should_isolate_device in the ticket for human review. Clone the agent and add an Approval Gate step if you want to add supervised device isolation to the workflow.Customizing Guardian
The security response walkthrough in Building Custom Agents shows how to extend Guardian with device isolation, approval gates, and ransomware recovery steps.
Advisor Agent
ID: agent_system_advisor
Trigger: Schedule — 0 8 * * MON-FRI (8 AM weekdays)
Category: Client Success
Default model: Quick (GPT-4o mini, 5 credits/run)
The Advisor Agent is your MSP's morning briefing. Every weekday morning at 8 AM, it generates a digest covering the things your team needs to know before the day starts.
What It Does
Step 1 — Build Morning Digest (Quick, 5 credits) Using the accumulated client context from all managed clients, Advisor generates a digest with:
- Clients needing attention — overdue tickets, clients approaching SLA breach, new P1/P2 incidents from the last 24 hours
- Financial alerts — overdue invoices, expiring contracts, recent payment failures
- Security posture changes — clients whose compliance or posture scores dropped overnight, recent high-severity Defend alerts
- Recommended actions — the top 3–5 things your team should prioritize today
The digest is delivered as a concise (under 300 word) push notification or email to all active technicians.
Cost
At 5 credits per run, 261 weekday runs per year, Advisor costs 1,305 credits annually — effectively free within any subscription tier.
Customizing Advisor
Clone Advisor to:
- Add a Branch step that sends a separate urgent notification when the digest includes P1 items
- Route the digest to a specific Slack channel via Relay rather than push notification
- Change the schedule to include weekends for 24/7 MSPs
Client Context Builder
ID: agent_system_context_builder
Trigger: psa:ticket.created (and expands to other triggers as it matures)
Category: Operations
Default model: None (no AI steps — pure data aggregation)
The Context Builder is the intelligence layer that makes all other agents smarter. It maintains a living profile for every managed client and injects that profile into every AI Reason step across the platform.
What It Does
When a new PSA ticket is created for a client, the Context Builder fetches the latest client data and refreshes the profile stored in the client_context container:
- Open tickets and recent resolution history
- Active Defend alerts and current security posture score
- Device inventory and health status from RMM
- Outstanding invoices and contract status from Books
- Compliance status and recent findings from Security
- CRM relationship health and upcoming renewals
- On-Call schedule and recent incident history
This profile is available to all subsequent AI Reason steps as implicit context — agents don't need to query each product individually. When the Guardian Agent analyzes a Defend alert, it knows the client's security posture score, their Defend enrollment status, and whether they have outstanding security findings. When Dispatch drafts a first response, it knows the client's service history and contract tier.
Zero Credits
The Context Builder runs no AI steps. It's pure data aggregation via Product Action steps. It costs zero credits to run.
Why It Matters
Without client context, an AI classifying a ticket knows only what's in the ticket. With context, it knows the client has had 3 P1 incidents this month, their compliance score dropped 11 points last week, and their Defend subscription lapsed 2 days ago. The quality of AI reasoning — and thus the quality of every automated action — depends entirely on the richness of the context available.