Skip to content

Commit bd86ef4

Browse files
committed
Update MCP get started guide for prerequisites and clarity
Revised onboarding prerequisites for Microsoft Sentinel MCP tools, clarifying that most tools require Sentinel data lake onboarding and listing additional supported products. Improved clarity and conciseness in tool usage descriptions and updated the article date.
1 parent 7208d1a commit bd86ef4

1 file changed

Lines changed: 7 additions & 11 deletions

File tree

articles/sentinel/datalake/sentinel-mcp-get-started.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Security
44
description: Learn how to set up and use Microsoft Sentinel's Model Context Protocol (MCP) collection of security tools to enable natural language queries and AI-powered security investigations
55
author: poliveria
66
ms.topic: get-started
7-
ms.date: 11/24/2025
7+
ms.date: 01/29/2026
88
ms.author: pauloliveria
99
ms.service: microsoft-sentinel
1010

@@ -15,20 +15,16 @@ ms.service: microsoft-sentinel
1515

1616
This article shows you how to set up and use Microsoft Sentinel's Model Context Protocol (MCP) collection of security tools to enable natural language queries against your security data. Sentinel's support for MCP enables security teams to bring AI into their security operations by allowing AI models to access security data in a standard way.
1717

18-
Sentinel's [collection](sentinel-mcp-tools-overview.md) of security tools works with multiple clients and automation platforms. You can use these tools to:
19-
- Search for relevant tables
20-
- Retrieve data
21-
- Analyze entities
22-
- Create Security Copilot agents
23-
- Triage incidents
24-
- Hunt for threats
18+
Sentinel's [collection](sentinel-mcp-tools-overview.md) of security tools works with multiple clients and automation platforms. You can use these tools to search for relevant tables and retrieve data, analyze entities, triage incidents, hunt for threats, and other tasks.
2519

2620
## Prerequisites
2721

28-
To use Microsoft Sentinel MCP server and access its collection of tools, you need to be onboarded to at least one of the following products:
29-
- [Microsoft Sentinel data lake](sentinel-lake-onboarding.md)
22+
Most of the tools in the Microsoft Sentinel MCP server require you to be onboarded to the [Microsoft Sentinel data lake](sentinel-lake-onboarding.md) to use them.
23+
24+
Other tools might also need you to be onboarded to at least one of the following products:
3025
- [Microsoft Sentinel in Microsoft Defender portal](/unified-secops/microsoft-sentinel-onboard)
3126
- [Microsoft Defender XDR or Microsoft Defender for Endpoint](/unified-secops/overview-deploy)
27+
- [Microsoft Security Copilot](/copilot/security/microsoft-security-copilot)
3228

3329
For more information about a tool collection's specific product prerequisites, see their respective articles.
3430

@@ -56,7 +52,7 @@ After adding Microsoft Sentinel's collection of tools, use the following sample
5652
- Investigate users with a password spray alert in the last seven days and tell me if any of them are compromised.
5753
- Find all the URL IOCs from <threat analytics report\> and analyze them to tell me everything Microsoft knows about them.
5854

59-
To understand how agents invoke our tools to answer these prompts, see [How Microsoft Sentinel MCP tools work alongside your agent](sentinel-mcp-data-exploration-tool.md#how-microsoft-sentinel-mcp-tools-work-alongside-your-agent).
55+
To understand how agents invoke these tools to answer these prompts, see [How Microsoft Sentinel MCP tools work alongside your agent](sentinel-mcp-data-exploration-tool.md#how-microsoft-sentinel-mcp-tools-work-alongside-your-agent).
6056

6157
## Next step
6258
- [Tool collection in Microsoft Sentinel MCP server](sentinel-mcp-tools-overview.md)

0 commit comments

Comments
 (0)