Investigations

Investigations

Investigations provide a centralized workspace for tracking security incidents within RunReveal. Each investigation collects related artifacts—queries, alerts, chat conversations, and notes—into a single timeline, enabling teams to collaborate on complex incidents and maintain a comprehensive audit trail.

Investigations List View

⚠️

Feature Flag Required: Investigations is currently gated behind a feature flag. Contact RunReveal support to request access.

Why Investigations?

  • Centralized evidence: Link queries, alerts, AI chat sessions, and notes to a single investigation timeline
  • Audit trail: Every status change and artifact addition is automatically tracked with timestamps and user attribution
  • Collaborative workflow: Share investigation links with team members; everyone sees the same context
  • Persistent context: Investigations persist across sessions, enabling multi-day incident response

What Can You Do with Investigations?

  • Track incidents from initial alert through resolution
  • Document root cause analysis with timestamped notes
  • Link related detections and queries for evidence preservation

Common Use Cases

Incident Response
Alert fires for suspicious login activity
Create investigation, add alert as artifact
Use AI Chat to analyze patterns, link the conversation
Document findings, close with resolution
Threat Hunting
Hypothesis: Lateral movement after compromised credential
Create investigation to track hunting session
Add queries as you pivot through data
Document techniques and IOCs discovered
Compliance
Auditor requests evidence of incident response
Export investigation timeline
All artifacts, timestamps, and actions documented
Complete audit trail in one place

Setup Guide

Go to Investigations in the sidebar and click Open Investigation.

Configure Investigation Details

Provide the following:

  • Title: Descriptive name (required, 1-100 characters)
  • Description: Context for what you’re investigating
  • Severity: low, medium, high, or critical
  • Status: open (default), investigating, or closed
  • Tags: Custom labels for categorization and filtering

Start Investigating

Click Create Investigation. An initial status artifact is automatically added to the timeline. Begin adding artifacts as you work through the incident.


Investigation Properties

PropertyValuesDescription
Statusopen, investigating, closedCurrent investigation state
Severitylow, medium, high, criticalPriority level for triage
TagsCustom stringsFlexible labels for filtering
ResolutionFree textRequired when closing; documents outcome

Artifact Types

Investigations support 10 artifact types that can be added to the timeline:

TypeDescriptionHow to Add
NoteText comments and observationsAdd Comment section on investigation page
QueryLinks to specific queries”Add to Investigation” from query results
Query ResultCaptured query results with field filtering”Add to Investigation” from query results
AlertSecurity alerts related to the investigation”Add to Investigation” from alert detail
ChatAI Chat conversations”Add to Investigation” from chat interface
Chat MessageSpecific messages from chat conversations”Add to Investigation” from chat interface
LinkExternal URLs and resourcesLinks sidebar on investigation page
GraphVisual graph representations”Add to Investigation” from graph view

Working with Investigations

Adding Artifacts

Most RunReveal interfaces include an Add to Investigation action:

  1. From query results, alert details, chat sessions, or graphs, click Add to Investigation
  2. Select an existing investigation or create a new one
  3. Add an optional comment explaining relevance
  4. Click Add

Managing the Timeline

Investigation Detail View

The investigation detail page provides:

  • Header: Title, status, severity, duration, metadata
  • Description: Editable investigation context
  • Comment Section: Add notes directly to the timeline
  • Artifact Timeline: Chronological view of all linked items
  • Details Sidebar: Status/severity controls, tag management
  • Links Sidebar: Quick links to external resources

Filtering and Starring

  • Filter by type: Show only specific artifact types (alerts, queries, notes)
  • Filter by starred: Surface important findings quickly
  • Text search: Search across artifact comments and content
  • Star artifacts: Hover over any artifact and click the star icon to highlight key findings

Closing Investigations

When changing status to closed:

  1. A resolution modal appears
  2. Enter resolution details (recommended)
  3. Click Close Investigation

A resolution artifact is automatically added to the timeline.


CLI Reference

# List all investigations
runreveal investigations list
 
# Create investigation
runreveal investigations create \
  --title "Suspicious Login Activity" \
  --description "Multiple failed login attempts from unusual IP ranges" \
  --severity high \
  --status open \
  --tags "authentication,brute-force"
 
# Get investigation details
runreveal investigations get --id <investigation-id>
 
# Update investigation field
runreveal investigations update \
  --id <investigation-id> \
  --field status \
  --value investigating
 
# Delete investigation
runreveal investigations delete --id <investigation-id>

Best Practices

Investigation Organization

  • Descriptive titles: Use specific names like “2024-01-15 Brute Force from IP Range 192.168.x.x” rather than “Login Issue”
  • Tag consistently: Establish team conventions for tags (e.g., authentication, malware, insider-threat)
  • Update status promptly: Move from openinvestigatingclosed as work progresses
  • Document resolution: Always provide resolution details when closing

Artifact Management

  • Add context: Include comments when adding artifacts explaining why they’re relevant
  • Star key findings: Use starring to highlight critical evidence
  • Link comprehensively: Add all related queries, alerts, and chats to build complete context
  • Use notes for analysis: Document your reasoning and hypotheses as you investigate

  • Detections — Create detection rules that can trigger investigations
  • Native AI Chat — Use AI to analyze data and add insights to investigations
  • Explore Logs — Run queries and add results to investigations
  • Notifications — Configure alerts that link to investigations