Skip to content

Commit fd9eba7

Browse files
committed
Update entity analyzer references to preview status
Changed links and headings to refer to the 'entity analyzer (preview)' in Sentinel MCP documentation. Added a prerelease disclaimer to the data exploration tool article to clarify the preview status.
1 parent f3825d6 commit fd9eba7

3 files changed

Lines changed: 6 additions & 3 deletions

File tree

articles/sentinel/datalake/sentinel-mcp-billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following limits are specific to Sentinel data lake MCP tools:
3636
| Query window for tools | 800 characters |
3737

3838
### Sentinel entity analyzer tool
39-
Each tenant can use the [entity analyzer](sentinel-mcp-data-exploration-tool.md#entity-analyzer) MCP tool up to 100 times a day.
39+
Each tenant can use the [entity analyzer](sentinel-mcp-data-exploration-tool.md#entity-analyzer-preview) MCP tool up to 100 times a day.
4040

4141

4242
## Language and region availability

articles/sentinel/datalake/sentinel-mcp-data-exploration-tool.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ ms.service: microsoft-sentinel
1313

1414
# Explore Microsoft Sentinel data lake with data exploration collection
1515

16+
> [!IMPORTANT]
17+
> Some information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
18+
1619
The data exploration tool collection in the Microsoft Sentinel Model Context Protocol (MCP) server lets you search for relevant tables and retrieve data from Microsoft Sentinel's data lake by using natural language.
1720

1821
## Prerequisites
@@ -60,7 +63,7 @@ This tool runs a single KQL query against a specified Microsoft Sentinel data la
6063
This tool lists all Microsoft Sentinel data lake workspace name and ID pairs available to you. Including the workspace name provides you with helpful context to understand which workspace is being used. Run this tool before using any other Microsoft Sentinel tools because those tools need a workspace ID argument to function properly.
6164

6265

63-
### Entity analyzer
66+
### Entity analyzer (preview)
6467

6568
These tools use AI to analyze your organization's data in the Microsoft Sentinel data lake. They provide a verdict and detailed insights on URLs, domains, and user entities. They help eliminate the need for manual data collection and complex integrations typically required for enriching and investigating entities.
6669

articles/sentinel/datalake/sentinel-mcp-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ When you connect a [compatible client](sentinel-mcp-get-started.md#add-microsoft
5555

5656
- **Analyze entities across your security data:** Security Operations Center (SOC) engineers, analysts, and even agents need an easy way to analyze and triage entities, such as URLs and users, using all of an organizations security data. However, today’s fragmented data sources make this process complex and time-consuming to automate. As one of the most common incident triage tasks, entity enrichment therefore often becomes a manual context-gathering effort, slowing down response times. With the entity analyzer tools in the data exploration collection, analysts and SOC engineers have a one-click action that can retrieve, reason over, and clearly present comprehensive verdicts and analyses on entities using the security data in the data lake, making it easy to automate entity enrichment for you and the agents you build.
5757

58-
[Get started with analyzing entities automatically during investigations](sentinel-mcp-data-exploration-tool.md#entity-analyzer)
58+
[Get started with analyzing entities automatically during investigations](sentinel-mcp-data-exploration-tool.md#entity-analyzer-preview)
5959

6060
- **Build Security Copilot agents through natural language:** SOC engineers often spend weeks manually automating playbooks due to fragmented data sources and rigid schema requirements. With our agent creation tools, engineers can describe their intent in natural language to quickly build agents with the right AI model instructions and tools that reason over their security data, creating automations that are customized to their organization's workflows and processes.
6161

0 commit comments

Comments
 (0)