You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/datalake/sentinel-mcp-get-started.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Security
4
4
description: Learn how to set up and use Microsoft Sentinel's Model Context Protocol (MCP) collection of security tools to enable natural language queries and AI-powered security investigations
This article shows you how to set up and use Microsoft Sentinel's Model Context Protocol (MCP) collection of security tools to enable natural language queries against your security data. Sentinel's support for MCP enables security teams to bring AI into their security operations by allowing AI models to access security data in a standard way.
17
17
18
-
Sentinel's [collection](sentinel-mcp-tools-overview.md) of security tools works with multiple clients and automation platforms. You can use these tools to:
19
-
- Search for relevant tables
20
-
- Retrieve data
21
-
- Analyze entities
22
-
- Create Security Copilot agents
23
-
- Triage incidents
24
-
- Hunt for threats
18
+
Sentinel's [collection](sentinel-mcp-tools-overview.md) of security tools works with multiple clients and automation platforms. You can use these tools to search for relevant tables and retrieve data, analyze entities, triage incidents, hunt for threats, and other tasks.
25
19
26
20
## Prerequisites
27
21
28
-
To use Microsoft Sentinel MCP server and access its collection of tools, you need to be onboarded to at least one of the following products:
29
-
-[Microsoft Sentinel data lake](sentinel-lake-onboarding.md)
22
+
Most of the tools in the Microsoft Sentinel MCP server require you to be onboarded to the [Microsoft Sentinel data lake](sentinel-lake-onboarding.md) to use them.
23
+
24
+
Other tools might also need you to be onboarded to at least one of the following products:
30
25
-[Microsoft Sentinel in Microsoft Defender portal](/unified-secops/microsoft-sentinel-onboard)
31
26
-[Microsoft Defender XDR or Microsoft Defender for Endpoint](/unified-secops/overview-deploy)
For more information about a tool collection's specific product prerequisites, see their respective articles.
34
30
@@ -56,7 +52,7 @@ After adding Microsoft Sentinel's collection of tools, use the following sample
56
52
- Investigate users with a password spray alert in the last seven days and tell me if any of them are compromised.
57
53
- Find all the URL IOCs from <threat analytics report\> and analyze them to tell me everything Microsoft knows about them.
58
54
59
-
To understand how agents invoke our tools to answer these prompts, see [How Microsoft Sentinel MCP tools work alongside your agent](sentinel-mcp-data-exploration-tool.md#how-microsoft-sentinel-mcp-tools-work-alongside-your-agent).
55
+
To understand how agents invoke these tools to answer these prompts, see [How Microsoft Sentinel MCP tools work alongside your agent](sentinel-mcp-data-exploration-tool.md#how-microsoft-sentinel-mcp-tools-work-alongside-your-agent).
60
56
61
57
## Next step
62
58
-[Tool collection in Microsoft Sentinel MCP server](sentinel-mcp-tools-overview.md)
0 commit comments