When to Use Fight Mode
Use Fight Mode when:- Active incident — You’re responding to a confirmed or suspected breach
- Threat hunting — You want to continuously monitor for specific indicators
- Incident response — You need real-time visibility and rapid remediation
- Investigation at scale — The threat involves multiple systems and indicators
Fight Mode is designed for situations where threats evolve faster than you can manually query each system.
How Fight Mode Works
Fight Mode operates in continuous cycles, scanning your integrations and reporting findings in real-time.Response Times
| Phase | Expected Time |
|---|---|
| Initial scan after session start | 5–10 seconds |
| Each scanning cycle | ~15 seconds |
| Action execution after approval | 1–3 seconds |
| New indicator discovery scan | 5–10 seconds |
Response times depend on the number of connected integrations and the volume of activity being analyzed. Complex queries across multiple systems may take longer.
The Scanning Loop
Each cycle, Hiro:- Queries all connected integrations for activity matching known threat indicators
- Discovers new indicators — IPs, users, credentials, resources
- Reports specific findings with exact timestamps from logs
- Proposes remediation actions when threats are confirmed
- Executes approved actions immediately
- Adds new indicators to the threat context for future scans
Starting a Fight Mode Session
The Fight Mode Interface
The Fight Mode interface is divided into several panels:Threat Indicators Panel
Shows all tracked indicators with their provenance:| Indicator | Type | Source |
|---|---|---|
185.220.101.1 | IP Address | Initial input |
john@company.com | Initial input | |
AKIA...XYZ | AWS Access Key | Discovered from CloudTrail |
jane@company.com | Discovered from shared session |
Findings Feed
Real-time stream of discoveries with timestamps:Proposed Actions Panel
Actions awaiting your approval:Executed Actions Log
Audit trail of all actions taken:Threat Indicator Types
Hiro tracks multiple indicator types during Fight Mode:| Type | Example | Use Case |
|---|---|---|
| IP Address | 185.220.101.1 | Source of malicious activity |
| User Email | john@company.com | Compromised or suspicious user |
| AWS Principal ARN | arn:aws:iam::123:user/admin | Cloud identity |
| AWS Access Key | AKIA... | Potentially stolen credentials |
| Okta User ID | 00u1a2b3c4d5e6f7g | Internal Okta identifier |
| GitHub Username | jsmith | Source code access |
| Custom Identifier | Any string | LLM-discovered identifiers |
- Adds it to the tracking list with source information
- Scans the last 12 hours of logs for historical activity
- Includes it in future scan cycles
Approving Actions
When Hiro proposes an action, you’ll see:- Action description — What will be done
- Target — The affected user, resource, or system
- Reason — Why this action is recommended
- Evidence — Supporting findings from the investigation
- Confidence score — How certain Hiro is about this action
Approval Workflow
- Review the action — Read the description, reason, and evidence
- Check confidence — Higher confidence means stronger evidence
- Decide:
- Approve — Execute the action immediately
- Reject — Skip this action, continue scanning
- More Info — Ask Hiro for additional context
Session Persistence
Fight Mode sessions are saved automatically. You can:- Pause and resume — Close your browser and continue later
- Review history — Access completed sessions from Fight Mode > History
- Export findings — Download a full report of the session
Best Practices
Start with Specific Indicators
Provide Context
Don’t Over-Scope
Focus Fight Mode on specific incidents. For broad security posture analysis, use the Chat interface instead.Review Before Approving
Even with high confidence scores, take a moment to review the evidence before approving destructive actions.Transitioning from Chat
You can escalate from a Chat investigation to Fight Mode:- Create a new Fight Mode session
- Import all discovered indicators
- Begin continuous scanning immediately
Next Steps
Remediation Actions
See all available actions and approval levels.
Detections
Learn how Hiro ingests and manages security detections.