How It Works
When you send a message, Hiro’s AI agent:- Parses your intent — Understands what you’re asking about
- Selects relevant tools — Chooses which integrations to query
- Executes queries — Fetches data from your security tools
- Analyzes results — Identifies patterns and anomalies
- Responds with findings — Presents information in natural language
Hiro streams responses in real-time, so you can see the agent’s progress as it works through your query.
Starting a Conversation
Navigate to Chat in the left sidebar. You’ll see the conversation interface with a text input at the bottom.What Can I Ask Hiro?
Hiro understands natural language queries across your entire security stack. Here are examples organized by use case:User Investigation
User Investigation
- What has john@company.com been doing in the last 24 hours?
- Show me all activity for this user across Okta, AWS, and GitHub
- When did this user last log in, and from where?
- What applications does jane@company.com have access to?
- Has this user’s behavior changed recently?
- List all users who accessed sensitive repos in the last week
Suspicious Activity
Suspicious Activity
- Show me all failed login attempts from IP 185.220.101.1
- Which users logged in from countries we don’t operate in?
- Find logins from Tor exit nodes in the last 24 hours
- Are there any impossible travel scenarios today?
- Show me users with logins from multiple countries in the same hour
- What IPs have had more than 10 failed logins today?
Identity & Access
Identity & Access
- Which users in Okta have MFA disabled?
- List all users with admin privileges
- Who was added to the Engineering group this week?
- Show me users who haven’t logged in for 90 days
- Which service accounts have console access?
- Find users with both AWS and GitHub admin access
Cloud Security
Cloud Security
- List all IAM users with console access but no MFA
- Which IAM roles have AdministratorAccess?
- Show me S3 buckets that were accessed from unusual IPs
- What access keys were created in the last week?
- Find EC2 instances with public IPs in production
- Who has permissions to modify security groups?
Endpoint Security
Endpoint Security
- Show me CrowdStrike detections from the last 24 hours
- Which endpoints have critical severity alerts?
- What detections involve ransomware indicators?
- Find all alerts related to this user’s devices
- Are there any contained hosts right now?
Code & Repository
Code & Repository
- Who accessed the infrastructure repo yesterday?
- Show me commits to production branches after hours
- Which external collaborators have repo access?
- Find repos with secrets scanning alerts
- What GitHub apps have access to our org?
Incident Correlation
Incident Correlation
- Find all AWS activity from users who logged in from this IP
- Correlate this Okta user with their CrowdStrike endpoints
- What else did this access key do before it was compromised?
- Show me all activity from this user across all systems
- Connect this detection to related identity events
Context and Follow-ups
Hiro maintains conversation context, allowing natural follow-up questions:Streaming Responses
Hiro’s responses stream in real-time. As the agent works, you’ll see:- Tool calls — Which integrations are being queried
- Intermediate results — Data as it’s retrieved
- Analysis — The agent’s reasoning about the findings
- Final summary — Actionable conclusions
Proposing Actions
When Hiro identifies a threat, it may propose remediation actions directly in the chat:Conversation History
All conversations are automatically saved. To access previous conversations:- Click the conversation selector in the top-left of the chat interface
- Browse or search your conversation history
- Click any conversation to resume it
Best Practices
Be Specific with Timeframes
Provide Context When Available
Use Follow-ups Instead of Repeating
Ask for Specific Formats
Integration with Fight Mode
For active incidents requiring continuous monitoring, you can escalate from Chat to Fight Mode:Keyboard Shortcuts
| Shortcut | Action |
|---|---|
Enter | Send message |
Shift + Enter | New line |
Cmd/Ctrl + K | New conversation |
Cmd/Ctrl + / | Focus chat input |
Next Steps
Fight Mode
Learn about continuous threat hunting for active incidents.
Remediation
Understand available actions and approval workflows.