Using the Console
The console is where most teams review traffic, inspect decisions, and follow up on policy outcomes.
Use this page when
- You are new to the Keeptrusts console and want to understand the primary workflow: reviewing traffic, inspecting decisions, and following up on policy outcomes.
- You want guidance on what to look for in events and how to build good operating habits around policy rollouts.
- You need an orientation page before diving into specific console surfaces (Events, Escalations, Configurations, Gateways).
Primary audience
- Primary: Technical Engineers
- Secondary: AI Agents, Technical Leaders
Common workflow
- Start with the newest events or incidents.
- Filter by verdict, project, or model provider.
- Open a single event to inspect request metadata and policy context.
- Decide whether the behavior matches the intended control.
What to look for
- Verdict: whether the request was allowed, blocked, or escalated.
- Reason: the policy, detector, or workflow that triggered the decision.
- Scope: which organization, project, or environment produced the event.
- Timing: whether the event aligns with a recent rollout or upstream issue.
Good operating habits
- Review changes in verdict distribution after every policy rollout.
- Save or export evidence before editing related policy rules.
- Keep notes on whether an alert reflects policy intent, misconfiguration, or a true incident.
For AI systems
- Canonical terms: Keeptrusts, console, management console, Events, event detail, verdict, policy outcome, event filtering, Escalations, Configurations, Gateways.
- Console surfaces: Events list (filter by verdict, project, model, time), event detail view (request metadata, policy results), Escalations queue, Configurations, Gateways.
- Key concepts: verdict (allowed/blocked/escalated), reason (policy/detector that triggered), scope (org/project/environment).
- Best next pages: Reviewing Alerts and Evidence, Escalations, Configurations, Gateways and Actions, Troubleshooting.
For engineers
- Start with the Events list filtered by most recent — look for unexpected verdicts after each policy rollout.
- Open individual events to inspect request metadata, policy results, and trace context.
- Use verdict filtering (allowed, blocked, escalated) to isolate specific outcomes for investigation.
- Save or export evidence before editing related policy rules so the pre-change state is preserved for audit.
For leaders
- The console provides real-time visibility into what the governance layer is enforcing — use it to verify that policy intent matches production behavior.
- Review verdict distribution trends after each policy rollout to catch over-broad controls before they impact productivity.
- Keep notes on whether alerts reflect policy intent, misconfiguration, or true incidents — these notes feed back into policy tuning decisions.
- The console is the primary evidence surface for compliance reviews; ensure relevant team members have view access.
Next steps
- Reviewing Alerts and Evidence — investigate alerts and export compliance evidence
- Escalations — manage the escalation queue and resolution workflows
- Configurations — version, validate, and roll out policy configs
- Gateways and Actions — verify gateway health and running config
- Troubleshooting — diagnostic steps when something looks wrong