Overview
A nonprofits knowledge base drifted out of date and was hard to search. Articles lived in multiple wikis and the ITSM knowledge module, naming was inconsistent, and publishing relied on whoever remembered to update a page. Intelligex implemented a governed article lifecycle with clear ownership and expirations, added a permissions?aware AI search that cites source pages, and routed every publish through subject?matter expert (SME) approvals. Repeated questions to the helpdesk fell away, self?service became reliable, and compliance reviewers could see who approved whatwhile the existing ITSM, wiki, and collaboration tools stayed in place.
Client Profile
- Industry: Nonprofit (program services and shared operations)
- Company size (range): Central IT with regional program teams and volunteers
- Stage: ServiceNow for IT Service Management (ITSM) with basic knowledge enabled; Confluence and SharePoint hosting team content; search limited to site?specific boxes; no unified governance for knowledge
- Department owner: IT & Infrastructure (Service Management and Platform Engineering)
- Other stakeholders: Helpdesk, Security and Privacy, Program Operations, HR, Communications, Compliance/Audit
The Challenge
People could not find answers they trusted. Password reset steps differed by page, VPN instructions were specific to older clients, and program staff followed outdated onboarding checklists they found in search results. Articles used different titles and tags for the same task, and internal versus public guidance was intermixed. Helpdesk agents escalated simple tickets because the first page they found was stale or incomplete.
Publishing and maintenance were ad hoc. Anyone could create a page in a wiki or draft an article in the ITSM tool, but there was no standard review, no owner metadata, and no expiration date to trigger periodic checks. When fixes were made during incident response, those updates rarely reached the knowledge base with proper citations. Compliance teams asked for evidence that articles impacting privacy or safety were reviewed by SMEs, and the team stitched together emails and change tickets to show intent.
Why It Was Happening
Root causes were content fragmentation and a lack of governance. Teams wrote and stored knowledge wherever it felt natural, and search results reflected where content lived rather than what users needed. Article templates and tags were inconsistent, so similar topics had different titles and keywords. There was no lifecycle that moved content from draft to review to publish to retire, and no binding between approvals and what ultimately went live.
Search fluency varied. Agents and staff who knew the right keywords could find a usable page; everyone else relied on bookmarks or asked the helpdesk. The ITSM knowledge search only indexed its own articles, and wiki searches did not respect the same permissions or metadata. Without a federated, permission?aware search and a governed publishing path, the knowledge base could not keep pace with daily operations.
The Solution
Intelligex built a governed knowledge lifecycle and a unified search experience that cited source material. The lifecycle introduced article ownership, templated content, SME approvals before publish, and expirations with reminders. The search layer federated queries across ServiceNow Knowledge, Confluence, and SharePoint; applied the requesters permissions; and used retrieval?augmented generation (RAG) to summarize steps with inline citations back to source pages. Feedback from tickets fed directly into article updates, and every publish carried an approvers name and rationale. Design choices aligned with knowledge management best practices in the clients ITSM and RAG patterns as described by Microsoft (Retrieval?Augmented Generation). Where needed, platform features followed vendor guidance (for example, ServiceNow Knowledge Management and Confluence workflows: ServiceNow Docs, Confluence Cloud).
- Integrations: ServiceNow Knowledge for IT articles; Confluence and SharePoint for team content; unified index and search portal; identity provider for Single Sign?On (SSO) and permissions; ITSM tickets for feedback and article linking.
- Article lifecycle: Draft, review, publish, and retire states; owner and SME fields; effective dates, expiration, and reminders; change history tied to approvals.
- Templates and tagging: Standard templates for how?to, troubleshooting, and policy pages; required tags for service, audience, and sensitivity; linkbacks to related incidents and changes.
- Permissions?aware AI search: Federated search with RAG summaries; results constrained by the requesters access; answers include citations to source pages and last?reviewed dates.
- Feedback loop: Inline thumbs?up/down and comments routed to owners; ticket?to?article linking; suggestions promoted to draft automatically with context.
- Approvals and evidence: Maker?checker reviews for sensitive topics; approval records linked to the published version; audit exports for compliance reviews.
- Localization and accessibility: Support for regional variants where policy required; alt text and readability checks in templates.
- Dashboards: Article freshness, orphaned content, search?to?ticket deflection, and review queue aging; owner performance views with trends.
Implementation
- Discovery: Cataloged existing knowledge sources and top search terms; sampled tickets with repeatable resolutions; identified sensitive topics needing SME oversight; reviewed current permissions and privacy constraints; gathered audit requirements for approvals and retention.
- Design: Defined article templates and metadata; authored lifecycle states and transitions; mapped approver tiers by topic sensitivity; selected sources for the unified index; designed RAG prompts and citation formats; planned dashboards and evidence exports; documented localization and accessibility standards.
- Build: Configured ServiceNow Knowledge workflows; enabled Confluence page approvals where needed; implemented the unified search index with permission checks; deployed the RAG layer to summarize and cite; built feedback capture tied to ITSM tickets; created dashboards and audit logging.
- Testing/QA: Ran in shadow mode: compared portal search against native tools; validated that RAG respected permissions and cited properly; piloted article templates and lifecycle with a subset of services; seeded expirations and ensured reminders and queues behaved as expected.
- Rollout: Onboarded high?traffic topics first (access, VPN, collaboration tools); required SME approval for new and revised content; redirected legacy search boxes to the new portal; kept native searches as a fallback during early cycles; expanded coverage to program?specific content after stable results.
- Training/hand?off: Delivered clinics for helpdesk agents and content owners on templates, lifecycle, and search; published writer guides with examples; updated SOPs to require article updates as part of incident closure; transferred ownership of lifecycles, templates, and dashboards to Service Management under change control.
- Human?in?the?loop review: Stood up a monthly review board for sensitive topics, stale content, and low?confidence search answers; recorded decisions with rationale and effective dates; fed outcomes back into governance and templates.
Results
Self?service became dependable. Users and agents found a single, permission?aware search portal that surfaced the right article with a clear last?reviewed date and citations. Repetitive tickets dropped because pages were current and consistent, and ticket comments fed updates back into the lifecycle instead of spawning parallel guides.
Publishing gained rigor without slowing down. Owners worked from templates, SME approvals were recorded against the specific version that went live, and expirations prompted refreshes before content went stale. Compliance and audit reviews pulled exports that tied article changes to approvals and related incidents. Tools remained familiar; the change was a governance layer and a search front door that made the existing knowledge base coherent.
What Changed for the Team
- Before: Articles varied in format and quality. After: Templates enforced structure, tags, and readability across topics.
- Before: Publishing was a best?effort exercise. After: A governed lifecycle with SME approvals and expirations managed freshness.
- Before: Search results depended on the site you used. After: A unified, permission?aware portal returned answers with citations.
- Before: Ticket fixes rarely updated knowledge. After: Tickets linked to articles, and feedback routed edits to owners.
- Before: Compliance asked who approved a page. After: Approvals and version history were attached to published content.
- Before: Outdated guides confused staff and volunteers. After: Expiration and review queues surfaced stale pages before they misled users.
Key Takeaways
- Govern the lifecycle; define owners, approvals, and expirations so content stays accurate.
- Standardize content; templates and tags make articles findable and consistent.
- Make search permission?aware; federate results and cite sources so users can trust answers.
- Close the loop; capture feedback from tickets and route changes to owners with context.
- Start where volume is; fix high?traffic topics first, then expand to specialized areas.
- Integrate, dont replace; keep ITSM, wikis, and collaboration toolsadd governance and a unified search layer.
FAQ
What tools did this integrate with? The solution used the clients existing knowledge sources and ITSM. ServiceNow Knowledge handled IT articles and workflows (see ServiceNow Docs), team content remained in Confluence and SharePoint (Confluence Cloud), and a unified index with a RAG layer provided permission?aware search and citations (RAG overview). SSO enforced identity and access across sources.
How did you handle quality control and governance? Each article carried an owner, SME approver, effective date, and expiration. Publishing followed draft?review?publish with maker?checker for sensitive topics. Required templates and tags enforced structure, and all changes recorded rationale and approver names. Dashboards tracked stale content and review queue aging, and exports supported audit.
How did you roll this out without disruption? The portal ran in shadow mode while native searches continued. High?traffic topics were onboarded first with SME sign?off, and legacy search boxes pointed to the new portal once confidence grew. Content remained in its original tools; the new layer indexed and governed it without forcing a migration.
How did you ensure AI answers were accurate and safe? The RAG component retrieved only content the user could access, summarized conservatively, and always cited source pages. Low?confidence answers were flagged for review, and templates encouraged precise, step?by?step instructions to reduce ambiguity.
What about sensitive or regulated content? Topics touching privacy, safety, or policy used stricter approver tiers, shorter expirations, and additional review by Compliance. Permissions were enforced end?to?end, and exports redacted fields not needed for audit.
How did feedback from users and agents feed updates? Users rated and commented on articles, and agents linked tickets to knowledge entries. Feedback created draft updates with context and routed them to owners, who could accept changes, request SME review, or retire the page.
Did you support multiple audiences (staff, volunteers, public)? Yes. Tags and permissions distinguished audiences, and the portal respected those boundaries. Public content remained public; internal content required sign?in. Articles could have audience?specific variants where policy differed.
Department/Function: Human Resources & People OpsIT & InfrastructureLegal & Compliance
Capability: Enterprise Search & Knowledge Management
Get a FREE
Proof of Concept
& Consultation
No Cost, No Commitment!


