LAST UPDATED: May 10, 2026
Overview
Memory and rules govern how Morpheus AI uses context and enforces policy during Adaptive Tasking investigations. Memory stores contextual signals, like investigation findings, analyst preferences, and lessons learned, to inform later work. Rules define hard constraints that Morpheus applies on every turn.
|
|
Memory |
Rules |
|---|---|---|
|
Behavior |
Context is retained and recalled to inform the AI's work. |
Requests that violate an active rule are refused. |
|
Lifecycle |
Captured automatically during investigation and can also be added explicitly. Append-only history. |
Created and managed deliberately by analysts and administrators. Can be enabled or disabled at any time. |
|
Effect |
Soft signal that increases relevance and continuity across investigations. |
Hard constraint applied to every conversation and investigation. |
|
Best for |
Recurring patterns and prior incident context. |
Policies the team has defined: "Always do X" or "Never do Y." |
|
Cited |
Surfaces in plans and chat as relevant context. |
The rule is cited by name when a request is refused because of it. |
Memory
Memory is a record of context Morpheus accumulates during investigations and retrieves to inform subsequent cases of similar character.
Memory Tiers
Memory is stored at one of three visibility tiers, selected automatically based on the nature of the content being recorded.
|
Tier |
Scope |
Visible to |
|---|---|---|
|
Session (default) |
A specific incident |
All analysts working that incident |
|
User |
One analyst's preferences and shortcuts |
Only that analyst, across all incidents |
|
Tenant |
Facts, lessons, and patterns applicable across the organization |
All analysts in the tenant |
A fourth layer, the D3 catalog, provides built-in default knowledge covering command behavior, query syntax, and common attack patterns. This layer is curated by D3 Security and contains no customer data.
READER NOTE
The D3 catalog is read-only from the tenant perspective. Tenant-level memory accumulates separately and never propagates to the catalog or to any other tenant.
How Morpheus Uses Memory
Morpheus searches memory when an analyst submits a question or starts an investigation. Relevant memories can include: IOC associations, similar prior incidents, and recorded tenant-level lessons. A response may reference a prior incident with similar indicators and include the recorded resolution.
Memory retrieval is semantic, matching meaning rather than exact keywords. No special query syntax is required.
Rules
A Rule is a hard constraint Morpheus applies unconditionally on every conversation turn, regardless of the immediate task or the analyst's request. Unlike memory, which influences behavior softly, a Rule represents a non-negotiable policy.
Rule Scopes
Each Rule carries one of two scopes, determining which analysts the Rule applies to.
|
Scope |
Set by |
Applies to |
|---|---|---|
|
Personal |
The analyst |
Only that analyst's conversations and investigations |
|
Organizational |
A tenant administrator |
Every analyst in the tenant |
Rule Precedence
When multiple rules conflict, the system resolves them using the following hierarchy:
-
System rules
-
Organizational rules
-
Personal rules
-
Current request (instruction submitted in the active message)
The rule name is cited in the reply whenever a rule causes a refusal or override, allowing analysts to identify the applicable policy.
Lifecycle
Rules support full create, read, update, and delete operations, plus an enable/disable toggle that allows temporary deactivation without permanent removal.
Rule Size
The active rules visible to an analyst must not exceed 20,000 characters. Attempts to create or enable rules that exceed the character budget are rejected with a quota-exceeded message.
This limit includes:
-
Active organizational rules visible to the analyst
-
Active personal rules owned by the analyst
Disabled rules do not count toward the character budget. No per-rule character limit exists. A single rule may use the analyst's full remaining budget.
NOTE
A typical SOC requires 5,000 to 10,000 characters of policy.
Isolation Guarantees
Morpheus enforces strict scope boundaries for both memory and rules, ensuring that no data crosses tenant or user lines outside explicitly defined parameters.
Tenant Isolation
Memory and rules belonging to one tenant are never visible to any other tenant. Tenant identity is verified at the storage layer on every read and write operation; it is not implemented as a query filter that could be omitted or bypassed. The only knowledge that crosses tenant boundaries is the D3 catalog, which contains no customer data.
Site Isolation
Site-tagged rules and incident-scoped memory respect site boundaries within the tenant. Specifically:
-
Site-tagged organizational rules are visible only to analysts working at one of the tagged sites.
-
Untagged organizational rules apply tenant-wide, regardless of site.
-
Memory captured during an incident inherits that incident's site. Cross-site pivots occur only for IOCs and tenant-level lessons, not for incident-specific notes.
User Isolation
User isolation restricts personal rules and user-tier memory exclusively to the analyst who created them.
-
Personal rules belong to the analyst who created them. Other analysts cannot access them through the standard chat interface. Administrators can manage analysts' personal rules only through the dedicated admin UI, where cross-user access is explicit and audited.
-
User-tier memory (analyst preferences) stores analyst preferences and remains private to that analyst. It does not appear in another analyst's chat, including shared-incident work.
-
Session-tier memory is shared among all analysts working on the same incident.