Investigations
Investigations provide a centralized workspace for tracking security incidents within RunReveal. Each investigation collects related artifacts—queries, alerts, chat conversations, and notes—into a single timeline, enabling teams to collaborate on complex incidents and maintain a comprehensive audit trail.

Feature Flag Required: Investigations & Automated Investigations are currently gated behind a feature flag. Contact RunReveal support to request access.
Why Investigations?
- Centralized evidence: Link queries, alerts, AI chat sessions, and notes to a single investigation timeline
- Audit trail: Every status change and artifact addition is automatically tracked with timestamps and user attribution
- Collaborative workflow: Share investigation links with team members; everyone sees the same context
- Persistent context: Investigations persist across sessions, enabling multi-day incident response
What Can You Do with Investigations?
- Track incidents from initial alert through resolution
- Document root cause analysis with timestamped notes
- Link related detections and queries for evidence preservation
Common Use Cases
Setup Guide
Navigate to Investigations
Go to Investigations in the sidebar and click Open Investigation.
Configure Investigation Details
Provide the following:
- Title: Descriptive name (required, 1-100 characters)
- Description: Context for what you’re investigating
- Severity:
low,medium,high, orcritical - Status:
open(default),investigating, orclosed - Tags: Custom labels for categorization and filtering
Start Investigating
Click Create Investigation. An initial status artifact is automatically added to the timeline. Begin adding artifacts as you work through the incident.
Investigation Properties
| Property | Values | Description |
|---|---|---|
| Status | open, agent-triage, investigating, closed | Current investigation state (agent-triage used by AI auto-triage) |
| Severity | low, medium, high, critical | Priority level for triage |
| Tags | Custom strings | Flexible labels for filtering |
| Resolution | Free text | Required when closing; documents outcome |
Artifact Types
Investigations support 10 artifact types that can be added to the timeline:
| Type | Description | How to Add |
|---|---|---|
| Note | Text comments and observations | Add Comment section on investigation page |
| Query | Links to specific queries | ”Add to Investigation” from query results |
| Query Result | Captured query results with field filtering | ”Add to Investigation” from query results |
| Alert | Security alerts related to the investigation | ”Add to Investigation” from alert detail |
| Chat | AI Chat conversations | ”Add to Investigation” from chat interface |
| Chat Message | Specific messages from chat conversations | ”Add to Investigation” from chat interface |
| Link | External URLs and resources | Links sidebar on investigation page |
| Graph | Visual graph representations | ”Add to Investigation” from graph view |
Working with Investigations
Adding Artifacts
Most RunReveal interfaces include an Add to Investigation action:
- From query results, alert details, chat sessions, or graphs, click Add to Investigation
- Select an existing investigation or create a new one
- Add an optional comment explaining relevance
- Click Add
Managing the Timeline

The investigation detail page provides:
- Header: Title, status, severity, duration, metadata
- Description: Editable investigation context
- Comment Section: Add notes directly to the timeline
- Artifact Timeline: Chronological view of all linked items
- Details Sidebar: Status/severity controls, tag management
- Links Sidebar: Quick links to external resources
Filtering and Starring
- Filter by type: Show only specific artifact types (alerts, queries, notes)
- Filter by starred: Surface important findings quickly
- Text search: Search across artifact comments and content
- Star artifacts: Hover over any artifact and click the star icon to highlight key findings
Closing Investigations
When changing status to closed:
- A resolution modal appears
- Enter resolution details (recommended)
- Click Close Investigation
A resolution artifact is automatically added to the timeline.
Automated Investigations
Automated investigations automatically create and triage investigations when detection alerts fire, reducing manual work and accelerating incident response.

How Automated Investigations Work
When a detection alert fires and has an investigation automation configured:
-
Investigation Creation: RunReveal automatically creates a new investigation with:
- Title based on the detection name (with unique identifier)
- Alert artifact linking to the triggering alert
- Default severity (from automation settings or inherited from detection)
- Tags including
auto-created,alert, and any custom tags - Status set to
open
-
AI-Powered Auto-Triage (optional): If enabled, an AI agent analyzes the alert:
- Updates status to
agent-triagewhile analyzing - Reviews the alert data and queries additional context if needed
- Adds analysis notes to the investigation timeline
- Updates severity if the initial assessment was incorrect
- Makes a decision:
- Genuine threat: Updates status to
investigatingfor human review - False positive: Automatically closes the investigation with resolution notes
- Genuine threat: Updates status to
- Updates status to

Setting Up Automated Investigations
Create an Investigation Automation
- Navigate to Investigations → Automations

- Click New Automation
- Configure the automation:
- Automation name: Friendly identifier (e.g., “High Severity Detections”)
- Investigation title (optional): Custom title template for created investigations
- Investigation description (optional): Context about when this automation applies
- Default severity (optional):
low,medium,high, orcritical(defaults to detection severity) - Tags (optional): Custom tags to add to all investigations created by this automation
- Enable AI-powered auto-triage: Check to enable automatic analysis and triage

Attach Automation to Detection
- Go to Detections and open the detection you want to automate
- In the **Investigation Automations ** section, select your investigation automation(s) that you’ve created.

- Save the detection
When this detection fires an alert, it will automatically create an investigation using your automation settings.
Example: Automated Investigation Flow
Scenario: A detection for “Multiple Failed Login Attempts” fires an alert.
Automation Configuration:
- Name: “Authentication Anomalies”
- Default severity:
high - Tags:
authentication,brute-force - Auto-triage: Enabled
What Happens:
-
Alert fires → Detection triggers for user
[email protected]with 15 failed logins from IP203.0.113.45 -
Investigation created:
- Title: “Multiple Failed Login Attempts (a1b2c3d4)”
- Status:
open - Severity:
high - Tags:
authentication,brute-force,auto-created,alert - Alert artifact: Links to the triggering alert
-
AI agent triages (auto-triage enabled):
- Status changes to
agent-triage - Agent analyzes the alert data
- Queries additional context: “Show all login attempts for [email protected] in last 24 hours”
- Adds note: “Analysis: 15 failed attempts from IP 203.0.113.45 (previously unknown). No successful logins. Pattern suggests brute-force attack. Recommend blocking IP and reviewing account security.”
- Updates status to
investigating(requires human review)
- Status changes to
-
Analyst reviews:
- Opens investigation, sees AI analysis
- Reviews query results added by agent
- Takes action: Blocks IP, resets password
- Closes investigation with resolution: “IP blocked, password reset, account secured”
Auto-Triage Behavior: When auto-triage is enabled, the AI agent focuses only on the specific alert that triggered the investigation. It does not search for or link additional alerts, keeping the investigation scope focused.
CLI Reference
# List all investigations
runreveal investigations list
# Create investigation
runreveal investigations create \
--title "Suspicious Login Activity" \
--description "Multiple failed login attempts from unusual IP ranges" \
--severity high \
--status open \
--tags "authentication,brute-force"
# Get investigation details
runreveal investigations get --id <investigation-id>
# Update investigation field
runreveal investigations update \
--id <investigation-id> \
--field status \
--value investigating
# Delete investigation
runreveal investigations delete --id <investigation-id>Best Practices
Investigation Organization
- Descriptive titles: Use specific names like “2024-01-15 Brute Force from IP Range 192.168.x.x” rather than “Login Issue”
- Tag consistently: Establish team conventions for tags (e.g.,
authentication,malware,insider-threat) - Update status promptly: Move from
open→investigating→closedas work progresses - Document resolution: Always provide resolution details when closing
Artifact Management
- Add context: Include comments when adding artifacts explaining why they’re relevant
- Star key findings: Use starring to highlight critical evidence
- Link comprehensively: Add all related queries, alerts, and chats to build complete context
- Use notes for analysis: Document your reasoning and hypotheses as you investigate
Related Documentation
- Detections — Create detection rules that can trigger investigations
- Native AI Chat — Use AI to analyze data and add insights to investigations
- Explore Logs — Run queries and add results to investigations
- Notifications — Configure alerts that link to investigations