Comprehensive, automated security investigations powered by Microsoft Sentinel, Defender XDR, Graph API, and threat intelligence β with 25 specialized Agent Skills
πΊ Video Walkthrough: See this project in action β Watch on YouTube (starts at the Security Investigator demo). Covers the end-to-end workflow: natural language investigations, MCP server integration, KQL query execution, threat intelligence enrichment, and automated report generation.
An investigation automation framework that combines GitHub Copilot, VS Code Agent Skills, and Model Context Protocol (MCP) servers to enable natural language security investigations. Ask questions like "Investigate this user for the last 7 days" or "Is this IP malicious?" and get comprehensive analysis with KQL queries, threat intelligence correlation, and professional reports.
# 1. Clone and open in VS Code
git clone https://github.com/SCStelz/security-investigator.git
code security-investigator
# 2. Set up Python environment
python -m venv .venv
.venv\Scripts\Activate.ps1 # Windows
# source .venv/bin/activate # macOS/Linux
pip install --require-hashes -r requirements.lock # Hash-verified (recommended)
# pip install -r requirements.txt # Without hash verification
# 3. Configure environment
copy config.json.template config.json
# Edit config.json β add your Sentinel workspace ID, tenant ID
copy .env.template .env
# Edit .env β add your API tokens (ipinfo, AbuseIPDB, vpnapi, Shodan)
# 4. Configure MCP servers
copy .vscode\mcp.json.template .vscode\mcp.json
# All platform servers are pre-configured β just needs a GitHub PAT on first use
# 5. Open Copilot Chat (Ctrl+Shift+I) in Agent mode and start with:
# "Run a threat pulse scan"π Recommended first run: The Threat Pulse skill is the best starting point. It runs a broad-spectrum scan across 9 security domains (incidents, identity, endpoint, exposure, email, UEBA, auth spray, privileged ops, CVEs) and produces prioritized findings with color-coded verdicts (π΄ Escalate / π Investigate / π‘ Monitor / β Clear). Each finding includes a drill-down recommendation pointing to a specialized skill β so after the scan, you'll know exactly where to focus and which follow-up command to run.
Other example prompts:
"Investigate user@domain.com for the last 7 days" β user-investigation
"Analyze incident 12345" β incident-investigation
"Is this IP malicious? 203.0.113.42" β ioc-investigation
"What skills do you have access to?" β lists all 25 skills
For detailed workflows and KQL queries: β .github/copilot-instructions.md (universal patterns, skill detection) β .github/skills/ (25 specialized investigation workflows) β queries/ (verified KQL query library)
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β GitHub Copilot (VS Code) β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β .github/copilot-instructions.md β
β (Skill detection, universal patterns, routing) β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β .github/skills/*.md β
β (25 specialized workflows with KQL, risk assessment) β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β MCP Servers (Platform) β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
β β Sentinel β β Graph API β β Sentinel Triage (XDR) β β
β β Data Lake β β (Identity) β β (Advanced Hunting) β β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
β β KQL Search β β Microsoft β β Azure MCP Server β β
β β (Schema) β β Learn (Docs) β β (ARM + Monitor) β β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
β βββββββββββββββ β
β β Sentinel β β
β β Graph (Rel) β β
β βββββββββββββββ β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β MCP Apps (Local Custom Servers) β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
β β Geomap β β Heatmap β β Incident Comment β β
β β (Attack Map)β β (Patterns) β β (Sentinel Integration) β β
β βββββββββββββββ ββββββββββββββββ βββββββββββββββββββββββββββββ β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Python Utilities β
β generate_report_from_json.py β enrich_ips.py β report_generatorβ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Key Components:
- 25 Agent Skills β Modular investigation workflows for incidents, users, devices, IoCs, authentication, scope drift (SPN/User/Device), MCP monitoring, exposure management, AI agent posture, app registration posture, identity posture, data security analysis, email threat posture, MITRE ATT&CK coverage, ingestion analysis, detection authoring, threat pulse scanning, SVG dashboards, and more
- 7 MCP Server Integrations β Sentinel Data Lake, Graph API, Defender XDR Triage, KQL Search, Microsoft Learn, Azure MCP Server, Sentinel Graph (private preview)
- 3 Local MCP Apps β Interactive heatmaps, geographic attack maps, incident commenting
- Python Utilities β HTML report generation with IP enrichment (geolocation, VPN detection, abuse scores, Shodan port/service/CVE intelligence)
This system uses VS Code Agent Skills to provide modular, domain-specific investigation workflows. Skills are automatically detected based on keywords in your prompts.
| Category | Skill | Description | Trigger Keywords |
|---|---|---|---|
| β‘ Quick Scan | threat-pulse | Rapid broad-spectrum security scan across 7 domains: active incidents, identity (human + NHI), endpoint, email threats, admin & cloud ops, exposure. Prioritized Threat Pulse findings with color-coded verdicts and drill-down recommendations | "threat pulse", "quick scan", "security pulse", "morning hunt", "what can you do", "where do I start", "what's going on" |
| π Core Investigation | computer-investigation | Device security analysis for Entra Joined, Hybrid Joined, and Entra Registered devices: Defender alerts, compliance, logged-on users, vulnerabilities, process/network/file events | "investigate computer", "investigate device", "investigate endpoint", "check machine", hostname |
| π Core Investigation | honeypot-investigation | Honeypot security analysis: attack patterns, threat intel, vulnerabilities, executive reports | "honeypot", "attack analysis", "threat actor" |
| π Core Investigation | incident-investigation | Comprehensive incident analysis for Defender XDR and Sentinel incidents: criticality assessment, entity extraction, filtering, recursive entity investigation | "investigate incident", "incident ID", "analyze incident", "triage incident", incident number |
| π Core Investigation | ioc-investigation | Indicator of Compromise analysis: IP addresses, domains, URLs, file hashes. Includes Defender Threat Intelligence, Sentinel TI tables, CVE correlation, organizational exposure | "investigate IP", "investigate domain", "investigate URL", "investigate hash", "IoC", "is this malicious" |
| π Core Investigation | user-investigation | Entra ID user security analysis: sign-ins, anomalies, MFA, devices, audit logs, incidents, Identity Protection, HTML reports | "investigate user", "security investigation", "check user activity", UPN/email |
| π Auth & Access | authentication-tracing | Entra ID authentication chain forensics: SessionId analysis, token reuse vs interactive MFA, geographic anomalies | "trace authentication", "SessionId analysis", "token reuse", "geographic anomaly" |
| π Auth & Access | ca-policy-investigation | Conditional Access policy forensics: sign-in failure correlation, policy state changes, security bypass detection | "Conditional Access", "CA policy", "device compliance", "policy bypass" |
| π Behavioral Analysis | scope-drift-detection/device | Device process drift: configurable-window baseline, 5-dimension Drift Score (Volume/Processes/Accounts/Chains/Signing), fleet-wide or single-device, Heartbeat uptime corroboration | "device drift", "endpoint drift", "process baseline", "device behavioral change" |
| π Behavioral Analysis | scope-drift-detection/spn | SPN scope drift: 90-day baseline vs 7-day comparison, 5-dimension Drift Score, correlated with AuditLogs, SecurityAlert, DeviceNetworkEvents | "scope drift", "service principal drift", "SPN behavioral change", "SPN drift" |
| π Behavioral Analysis | scope-drift-detection/user | User scope drift: 90-day baseline vs 7-day comparison, dual Drift Scores (7-dim interactive + 6-dim non-interactive), correlated with AuditLogs, SecurityAlert, Identity Protection, CloudAppEvents, EmailEvents | "user drift", "user scope drift", "user behavioral change", "UPN drift" |
| π‘οΈ Posture & Exposure | exposure-investigation | Vulnerability & Exposure Management reporting: CVE assessment with exploit/CVSS data, security configuration compliance, end-of-support software, ExposureGraph critical assets, attack paths, Defender health, certificate status | "vulnerability report", "exposure report", "CVE assessment", "security posture", "TVM" |
| π‘οΈ Posture & Exposure | ai-agent-posture | AI agent security posture audit for Copilot Studio and M365 Copilot agents: agent inventory, authentication gaps, access control misconfigurations, MCP tool proliferation, knowledge source exposure, XPIA risk, credential detection, Agent Security Score | "AI agent posture", "agent security audit", "Copilot Studio agents", "agent inventory", "unauthenticated agents", "agent sprawl" |
| π‘οΈ Posture & Exposure | app-registration-posture | App registration and service principal security posture: Graph API permission inventory (dangerous grants, permission concentration), app ownership risk, credential hygiene (stale secrets, multi-credential apps), cross-tenant SPN exposure, KQL attack chain detection (AuditLogs, AADServicePrincipalSignInLogs, MicrosoftGraphActivityLogs), App Permission Risk Score with 5 dimensions | "app registration posture", "app registration abuse", "service principal permissions", "dangerous app permissions", "app ownership", "overprivileged apps" |
| π‘οΈ Posture & Exposure | email-threat-posture | Email threat protection posture report for Microsoft Defender for Office 365: inbound mail flow overview, threat composition (phishing/spam/malware), email authentication (DMARC/DKIM/SPF/CompAuth), ZAP post-delivery remediation, Safe Links click protection, attachment analysis, detection method breakdown, MDO security incidents, Email Protection Score with 5 dimensions. Inline chat, markdown file, and SVG dashboard output | "email threat report", "email security posture", "phishing report", "MDO report", "Defender for Office 365 report", "ZAP effectiveness", "Safe Links report", "DMARC report" |
| π‘οΈ Posture & Exposure | identity-posture | Identity security posture report using IdentityAccountInfo (MDI/Advanced Hunting): multi-provider account inventory (Entra ID, AD, Okta, SailPoint, CyberArk, Ping), privileged account audit with role distribution, stale/disabled/deleted account hygiene, password posture, risk distribution, multi-provider identity linking, MDI tag analysis, Identity Posture Score with 5 dimensions. Inline chat and markdown file output | "identity posture", "identity security report", "account hygiene", "stale accounts", "privileged accounts", "password posture", "identity providers", "honeytoken" |
| π Data Security | data-security-analysis | DataSecurityEvents (Purview/IRM) analysis: SIT access breakdowns, user risk ranking, file inventory, DLP policy correlation, Copilot SIT exposure, SIT GUID-to-name resolution, anomaly detection. Designed for 100k+ user environments | "data security", "sensitive information type", "SIT access", "DLP events", "DataSecurityEvents", "EDM access", "insider risk activity", "Purview data security" |
| π Visualization | geomap-visualization | Interactive world map visualization for Sentinel data: attack origin maps, geographic threat distribution, IP geolocation with enrichment drill-down | "geomap", "world map", "geographic", "attack map", "attack origins" |
| π Visualization | heatmap-visualization | Interactive heatmap visualization for Sentinel data: attack patterns by time, activity grids, IP vs hour matrices, threat intel drill-down | "heatmap", "show heatmap", "visualize patterns", "activity grid" |
| π Visualization | svg-dashboard | SVG data visualization dashboards: dual-mode renderer supporting manifest-driven structured dashboards (from skill reports) and freeform adaptive visualizations from ad-hoc investigation data. 14-widget component library | "generate SVG dashboard", "create a visual dashboard", "visualize this report", "SVG from this data" |
| π§ Tooling & Monitoring | detection-authoring | Create, deploy, update, and manage Defender XDR custom detection rules via Graph API. Query adaptation from Sentinel KQL, manifest-driven batch deployment via PowerShell, lifecycle management | "create custom detection", "deploy detection", "detection rule", "custom detection", "deploy rule", "batch deploy" |
| π§ Tooling & Monitoring | kql-query-authoring | KQL query creation using schema validation, community examples, Microsoft Learn | "write KQL", "create KQL query", "help with KQL", "query [table]" |
| π§ Tooling & Monitoring | mcp-usage-monitoring | MCP server usage monitoring and audit: Graph MCP endpoint analysis, Sentinel MCP auth events, Azure MCP ARM operations, workspace query governance, MCP Usage Score with 5 health/risk dimensions | "MCP usage", "MCP server monitoring", "MCP activity", "MCP audit", "Graph MCP", "Sentinel MCP", "Azure MCP" |
| π§ Tooling & Monitoring | sentinel-ingestion-report | Sentinel workspace ingestion & cost analysis: table-level volume breakdown, tier classification (Analytics/Basic/Data Lake), SecurityEvent/Syslog/CommonSecurityLog deep dives, ingestion anomaly detection, analytic rule inventory via REST API, custom detection inventory via Graph API, rule health via SentinelHealth, data lake tier migration candidates, license benefit analysis (DfS P2, M365 E5) | "ingestion report", "usage report", "data volume", "cost analysis", "table breakdown", "data lake tier", "ingestion anomaly", "cost optimization" |
| π§ Tooling & Monitoring | mitre-coverage-report | MITRE ATT&CK coverage analysis: YAML-driven PowerShell pipeline gathers analytic rule MITRE tags, custom detection techniques, SOC Optimization recommendations, alert/incident operational data. Tactic-level coverage matrix, technique-level drill-down with rule mapping, coverage gap identification, SOC Optimization threat scenario alignment, untagged rule remediation, MITRE Coverage Score (5 weighted dimensions). Inline chat and markdown file output | "MITRE coverage", "ATT&CK coverage", "MITRE report", "tactic coverage", "technique coverage", "coverage gaps", "MITRE score", "detection coverage report", "MITRE matrix" |
- You ask Copilot a question (e.g., "Investigate user@domain.com for the last 7 days")
- Copilot detects keywords and loads the appropriate skill from
.github/skills/<skill-name>/SKILL.md - The skill provides specialized workflow, KQL queries, and risk assessment criteria
- Universal patterns from
.github/copilot-instructions.mdare inherited automatically
You don't need to mention the skill name β keywords are detected automatically:
| What you say | Skill triggered |
|---|---|
| "Investigate user@domain.com for the last 7 days" | user-investigation |
| "Analyze incident 12345" | incident-investigation |
| "Is this IP malicious? 203.0.113.42" | ioc-investigation |
| "Check the device WORKSTATION-01 for threats" | computer-investigation |
| "Show attack patterns on a heatmap" | heatmap-visualization |
| "Generate an SVG dashboard from the report" | svg-dashboard |
| "Map the geographic origins of these attacks" | geomap-visualization |
| "Write a KQL query to find failed sign-ins" | kql-query-authoring |
| "Trace this authentication back to the original MFA" | authentication-tracing |
| "Detect scope drift in service principals" | scope-drift-detection/spn |
| "Check user behavioral drift for user@domain.com" | scope-drift-detection/user |
| "Analyze device process drift across the fleet" | scope-drift-detection/device |
| "Show me MCP server usage for the last 30 days" | mcp-usage-monitoring |
| "Generate a Sentinel ingestion report" | sentinel-ingestion-report |
| "Create custom detections for Event ID 4799" | detection-authoring |
| "Audit AI agent security posture" | ai-agent-posture |
| "Who accessed files with credit card numbers?" | data-security-analysis |
| "Generate an email threat protection report" | email-threat-posture |
| "Run an identity posture report" | identity-posture |
| "Generate a MITRE ATT&CK coverage report" | mitre-coverage-report |
| "Run a threat pulse scan" | threat-pulse |
| "Audit our app registration security posture" | app-registration-posture |
After running an investigation, ask follow-up questions without re-running the entire workflow:
Is that IP a VPN?
Trace authentication for that suspicious location
Was MFA used for those sign-ins?
Skills can be chained for comprehensive analysis:
1. "Investigate incident 12345" β incident-investigation extracts entities
2. "Now investigate the user from that incident" β user-investigation runs on extracted UPN
3. "Check if that IP is malicious" β ioc-investigation analyzes the suspicious IP
4. "Show me a heatmap of the attack patterns" β heatmap-visualization
Copilot uses existing investigation data from temp/investigation_*.json when available.
What investigation skills do you have access to?
Explain the high-level workflow of the user-investigation skill
What data sources does the ioc-investigation skill use?
π Reference: GitHub Agent Skills Documentation
Ad-hoc investigations naturally evolve into reusable assets. After completing an investigation, ask Copilot to package the verified queries, schema pitfalls, and analytical logic into a new SKILL.md or query file.
"Based on the investigation we just completed, create a new reusable skill"
"Read this threat intel article: <URL> β extract TTPs and IOCs, then write, test, and tune a queries file for reusable threat hunts"
security-investigator/
βββ enrich_ips.py # Standalone IP enrichment utility
βββ config.json # Configuration (workspace IDs, mappings)
βββ config.json.template # Config template (committed to Git)
βββ .env # API tokens (gitignored, auto-loaded by python-dotenv)
βββ .env.template # Token template (committed to Git)
βββ requirements.txt # Python dependencies
βββ requirements.lock # Hash-verified dependency lockfile
βββ .vscode/
β βββ mcp.json.template # MCP server config template (copy to mcp.json)
βββ .github/
β βββ copilot-instructions.md # Skill detection, universal patterns, routing
β βββ manifests/ # Auto-generated discovery indexes
β β βββ discovery-manifest.yaml # Query file + skill index (domains, MITRE, prompts)
β β βββ build_manifest.py # Manifest generator script
β βββ skills/ # 25 Agent Skills (modular investigation workflows)
β βββ ai-agent-posture/
β βββ app-registration-posture/
β βββ authentication-tracing/
β βββ ca-policy-investigation/
β βββ computer-investigation/
β βββ data-security-analysis/
β βββ detection-authoring/
β βββ email-threat-posture/
β βββ exposure-investigation/
β βββ geomap-visualization/
β βββ heatmap-visualization/
β βββ honeypot-investigation/
β βββ identity-posture/
β βββ incident-investigation/
β βββ ioc-investigation/
β βββ kql-query-authoring/
β βββ mcp-usage-monitoring/
β βββ mitre-coverage-report/
β βββ scope-drift-detection/
β β βββ spn/ # Service principal drift (5 dimensions)
β β βββ user/ # User account drift (7+6 dimensions)
β β βββ device/ # Device process drift (5 dimensions)
β βββ sentinel-ingestion-report/
β βββ svg-dashboard/
β βββ threat-pulse/
β βββ user-investigation/
βββ queries/ # Verified KQL query library (grep-searchable, by data domain)
β βββ cloud/ # Cloud app & exposure management queries
β βββ email/ # Defender for Office 365 email queries
β βββ endpoint/ # Defender for Endpoint device queries
β βββ identity/ # Entra ID / Azure AD identity queries
β βββ incidents/ # SecurityIncident & SecurityAlert queries
β βββ network/ # Network telemetry queries
βββ scripts/ # Python utilities
β βββ generate_report_from_json.py # Report generator (main entry point)
β βββ report_generator.py # HTML report builder class
β βββ investigator.py # Data models and core types
β βββ cleanup_old_investigations.py # Automated cleanup (3+ days old)
β βββ generate_tocs.py # Auto-generate query file TOCs
βββ mcp-apps/ # Local MCP servers (visualization, automation)
β βββ sentinel-geomap-server/
β βββ sentinel-heatmap-server/
β βββ sentinel-incident-comment/
βββ docs/ # Setup guides and reference documentation
βββ authoring/ # Blog drafts, writing guides, and marketing content
βββ reports/ # Generated investigation reports (organized by type)
β βββ ai-agent-posture/ # AI agent security posture reports
β βββ app-registration-posture/ # App registration posture reports
β βββ computer-investigations/ # Device security investigation reports
β βββ data-security/ # Data security SIT analysis reports
β βββ email-threat-posture/ # Email threat protection posture reports
β βββ exposure/ # Exposure management reports
β βββ honeypot/ # Honeypot executive reports
β βββ identity-posture/ # Identity security posture reports
β βββ mcp-usage/ # MCP usage monitoring reports
β βββ scope-drift/ # Scope drift analysis reports
β βββ sentinel/ # Sentinel ingestion & cost analysis reports
β βββ threat-pulse/ # Threat Pulse scan reports
β βββ user-investigations/ # HTML user investigation reports
βββ temp/ # Investigation JSON files (auto-cleaned after 3 days)
βββ archive/ # Legacy code and design docs
The queries/ folder contains verified, battle-tested KQL query collections organized by detection scenario. These are the Priority 2 lookup source in the KQL Pre-Flight Checklist β Copilot searches them before writing any ad-hoc KQL.
Each file uses a standardized metadata header for efficient grep_search discovery:
# <Title>
**Tables:** <exact KQL table names>
**Keywords:** <searchable terms β attack techniques, scenarios, field names>
**MITRE:** <ATT&CK technique IDs, e.g., T1021.001, TA0008>
**Domains:** <domain tags for manifest indexing, e.g., identity, endpoint, email>The discovery manifest provides a machine-readable index of all query files and skills, enabling deterministic cross-referencing by domain and MITRE technique. The Threat Pulse skill loads this manifest to match findings to downstream query files and drill-down skills automatically.
discovery-manifest.yamlβ Compact index (~500 lines) withtitle,path,domains,mitre, andpromptfields for each query file and skillbuild_manifest.pyβ Generator script that scansqueries/metadata headers and skill YAML frontmatter to produce the manifest
How it works:
- Query files declare
**Domains:**tags in their metadata header (valid tags:incidents,identity,spn,endpoint,email,admin,cloud,exposure) - Skills declare
threat_pulse_domains:anddrill_down_prompt:in their YAML frontmatter python .github/manifests/build_manifest.pyscans both and emits the manifest- The Threat Pulse skill reads the manifest to match non-β findings β relevant query files and skills by domain tag and MITRE technique overlap
Regenerate after creating or renaming query files/skills, or changing Domains:/threat_pulse_domains: values:
python .github/manifests/build_manifest.py| Requirement | Details |
|---|---|
| VS Code | Version 1.99+ recommended (Agent mode + MCP support). |
| GitHub Copilot | Active subscription β Copilot Pro+, Business, or Enterprise. Agent mode must be enabled. |
| Python 3.8+ | For IP enrichment utility and report generation. Download |
| Azure CLI | Required for Azure MCP Server (underlying auth) and sentinel-ingestion-report skill (az monitor log-analytics query for all KQL queries, az rest for analytic rule inventory, az monitor log-analytics workspace table list for tier classification). Install. Authenticate: az login --tenant <tenant_id>, then az account set --subscription <subscription_id>. Requires Log Analytics Reader (KQL queries + table list) and Microsoft Sentinel Reader (analytic rule inventory) on the workspace. |
log-analytics CLI extension |
Required by the sentinel-ingestion-report skill for az monitor log-analytics query (all KQL queries in Phases 1-5). Install: az extension add --name log-analytics. Verify: az extension list --query "[?name=='log-analytics']". |
| PowerShell 7.0+ | Required for sentinel-ingestion-report skill (parallel query execution via ForEach-Object -Parallel). Install. Verify: $PSVersionTable.PSVersion. |
| Node.js 18+ | Required for KQL Search MCP (npx) and building local MCP Apps. Download or install via winget install OpenJS.NodeJS.LTS (Windows) / brew install node (macOS). |
| Microsoft Sentinel | Log Analytics workspace with data. You'll need the workspace GUID and tenant ID. |
| Entra ID Permissions | If you can query Sentinel in the Azure Portal, you likely have sufficient access. The Graph MCP server requires a one-time tenant provisioning by an admin. See MCP Server Setup for detailed per-server requirements. |
| Microsoft.Graph PowerShell | Required for detection-authoring skill (CustomDetection.ReadWrite.All β create/update/delete custom detection rules via Graph API). Also used by sentinel-ingestion-report skill for rule inventory (CustomDetection.Read.All β read-only, degrades gracefully if not installed). Install-Module Microsoft.Graph.Authentication -Scope CurrentUser. |
| GitHub PAT | public_repo scope β Create one here. Used by KQL Search MCP. |
Verify prerequisites:
python --version # Requires 3.8+
node --version # Requires 18+ (needed for KQL Search MCP)
az --version # Azure CLI (needed for Azure MCP Server, ingestion report skill)
pwsh --version # Requires 7.0+ (needed for sentinel-ingestion-report skill)If Node.js is missing: Download or run winget install OpenJS.NodeJS.LTS (Windows) / brew install node (macOS).
If Azure CLI is missing: Install, then az login --tenant <tenant_id> and az account set --subscription <subscription_id>.
If the log-analytics extension is missing: az extension add --name log-analytics (required for sentinel-ingestion-report skill).
Set up Python environment:
python -m venv .venv
.\.venv\Scripts\Activate.ps1
pip install -r requirements.txtCopy config.json.template to config.json and fill in your workspace details:
{
"sentinel_workspace_id": "YOUR_WORKSPACE_ID_HERE",
"tenant_id": "YOUR_TENANT_ID_HERE",
"subscription_id": "YOUR_SUBSCRIPTION_ID_HERE",
"azure_mcp": {
"resource_group": "YOUR_LOG_ANALYTICS_RESOURCE_GROUP",
"workspace_name": "YOUR_LOG_ANALYTICS_WORKSPACE_NAME",
"tenant": "YOUR_TENANT_ID_HERE",
"subscription": "YOUR_SUBSCRIPTION_ID_HERE"
},
"output_dir": "reports"
}| Setting | Required | Description |
|---|---|---|
sentinel_workspace_id |
Yes | Microsoft Sentinel (Log Analytics) workspace GUID |
tenant_id |
Yes | Entra ID (Azure AD) tenant ID for your Sentinel workspace |
subscription_id |
Yes | Azure subscription ID containing the Sentinel workspace |
azure_mcp.* |
Yes | Azure MCP Server parameters β resource group, workspace name, tenant, subscription. Required to avoid cross-tenant auth errors. |
output_dir |
No | Directory for HTML reports (default: reports) |
API tokens for IP enrichment are stored in a .env file (gitignored) rather than config.json for security. Copy the template and add your keys:
copy .env.template .env
# Edit .env with your token valuesIPINFO_TOKEN=your_token_here
ABUSEIPDB_TOKEN=your_token_here
VPNAPI_TOKEN=your_token_here
SHODAN_TOKEN=your_token_hereThese are auto-loaded by enrich_ips.py via python-dotenv β no manual sourcing needed.
| Token | Required | Description |
|---|---|---|
IPINFO_TOKEN |
Recommended | ipinfo.io API token β geolocation, ASN, org. Free: 1K/day; token: 50K/month; paid plans include VPN detection |
ABUSEIPDB_TOKEN |
Recommended | AbuseIPDB API token β IP reputation scoring (0-100 confidence). Free: 1K/day |
VPNAPI_TOKEN |
Optional | vpnapi.io API token β VPN/proxy/Tor detection. Not needed if ipinfo.io is on a paid plan |
SHODAN_TOKEN |
Optional | Shodan API key β open ports, services, CVEs, OS detection, tags. Free InternetDB fallback if no key or credits exhausted |
Copy the MCP server template (all platform servers + 3 optional MCP Apps are pre-configured):
copy .vscode/mcp.json.template .vscode/mcp.jsonThe template includes inline documentation for each server. On first use, VS Code will prompt for:
- Entra ID login β browser-based auth for Sentinel Data Lake, Graph, Triage, and Sentinel Graph servers
- GitHub PAT β for KQL Search MCP (schema intelligence and query discovery). Needs
public_reposcope.
See MCP Server Setup below for per-server permissions and installation guides.
PowerShell (Windows):
cd mcp-apps/sentinel-geomap-server; npm install; npm run build; cd ../..
cd mcp-apps/sentinel-heatmap-server; npm install; npm run build; cd ../..
cd mcp-apps/sentinel-incident-comment; npm install; npm run build; cd ../..Bash (macOS/Linux):
cd mcp-apps/sentinel-geomap-server && npm install && npm run build && cd ../..
cd mcp-apps/sentinel-heatmap-server && npm install && npm run build && cd ../..
cd mcp-apps/sentinel-incident-comment && npm install && npm run build && cd ../..The sentinel-incident-comment MCP App requires an Azure Logic App backend. See mcp-apps/sentinel-incident-comment/README.md for setup. Based on stefanpems/mcp-add-comment-to-sentinel-incident.
The system uses several Model Context Protocol (MCP) servers. All are pre-configured in .vscode/mcp.json.template β copy it to .vscode/mcp.json to get started (see Step 3 above). The sections below document permissions, tools, and installation guides for each server.
| # | Server | MCP URL / Transport | Setup Guide | Key Permissions |
|---|---|---|---|---|
| 1 | Sentinel Data Lake | https://sentinel.microsoft.com/mcp/data-exploration |
Setup | Log Analytics Reader |
| 2 | Microsoft Graph | https://mcp.svc.cloud.microsoft/enterprise |
Setup | User.Read.All, Device.Read.All |
| 3 | Sentinel Triage | https://sentinel.microsoft.com/mcp/triage |
Setup | SecurityReader |
| 4 | KQL Search | npx -y kql-search-mcp (stdio) |
Setup | GitHub PAT (public_repo) |
| 5 | Microsoft Learn | https://learn.microsoft.com/api/mcp |
Setup | None (free) |
| 6 | Azure MCP Server | VS Code extension (stdio) | Setup | Contributor or Reader on subscription |
| 7 | Sentinel Graph |
https://sentinel.microsoft.com/mcp/graph |
Blog | Sentinel Reader β Private Preview |
π Installation Guide
Tools: query_lake, search_tables, list_sentinel_workspaces
Permissions:
- Log Analytics Reader (minimum) β query workspace data
- Sentinel Reader (recommended) β full investigation capabilities
- Sentinel Contributor β watchlist management (optional)
π Installation Guide
Tools: microsoft_graph_suggest_queries, microsoft_graph_get, microsoft_graph_list_properties
β‘ One-time tenant provisioning (requires Application Administrator or Cloud Application Administrator role):
# 1. Install the Entra Beta PowerShell module (v1.0.13+)
Install-Module Microsoft.Entra.Beta -Force -AllowClobber
# 2. Authenticate to your tenant
Connect-Entra -Scopes 'Application.ReadWrite.All', 'Directory.Read.All', 'DelegatedPermissionGrant.ReadWrite.All'
# 3. Register the MCP Server and grant permissions to VS Code
Grant-EntraBetaMCPServerPermission -ApplicationName VisualStudioCodeThis only needs to be done once per tenant. After provisioning, all users in the tenant can use the Graph MCP server by signing in with their own account.
Permissions (delegated, per-user):
- User.Read.All β user profiles and authentication methods
- UserAuthenticationMethod.Read.All β MFA methods
- Device.Read.All β device compliance and enrollment
- IdentityRiskEvent.Read.All β Identity Protection risk detections
π Installation Guide
Tools (30+): RunAdvancedHuntingQuery, ListIncidents, GetAlertById, GetDefenderMachine, GetDefenderFileInfo, GetDefenderIpAlerts, ListUserRelatedMachines, GetDefenderMachineVulnerabilities, and more.
Permissions:
- Microsoft Defender for Endpoint API β SecurityReader role minimum
- Advanced Hunting β read access to Defender XDR data
π Installation Guide
Option A: VS Code Extension (Recommended)
- Extensions panel β Search "KQL Search MCP" β Install
- Command Palette β
KQL Search MCP: Set GitHub Token
Option B: NPX β already configured in .vscode/mcp.json.template. Just needs a GitHub PAT with public_repo scope (prompted on first use).
Tools (34): Schema intelligence, query validation, GitHub search, ASIM support for 331+ tables.
π Installation Guide
One-click: Install in VS Code β or already configured in .vscode/mcp.json.template.
Tools: microsoft_docs_search, microsoft_docs_fetch, microsoft_code_sample_search
No API key required β free, cloud-hosted by Microsoft.
π Installation Guide
Install via VS Code extension: search "Azure MCP Server" in Extensions, or install from the Marketplace. The extension registers as a stdio MCP server automatically.
Tools: monitor_workspace_log_query, monitor_activitylog_list, group_list, subscription_list, and 40+ namespaces covering AI, identity, security, databases, storage, compute, and networking.
Permissions:
- Reader (minimum) β read-only access to Azure resources
- Log Analytics Reader β for
workspace_log_query(KQL against Log Analytics) - Contributor β for write/modify operations (optional)
Configuration: Requires azure_mcp parameters in config.json (tenant, subscription, resource group, workspace name) to avoid cross-tenant auth errors. See Configure Environment.
Note: Sentinel Graph is currently in private preview and not available to all customers. If your tenant does not have access, this server will fail to connect β you can safely remove it from
.vscode/mcp.json. See the announcement blog post for details and enrollment.
Tools: Entity graph exploration and relationship queries.
Permissions:
- Sentinel Reader (minimum)
Pre-configured in .vscode/mcp.json.template. Browser-based Entra ID login on first use.
Open Copilot Chat (Ctrl+Shift+I) in Agent mode and try these prompts:
| Test | Prompt to type in Copilot Chat |
|---|---|
| Sentinel Data Lake | List my Sentinel workspaces |
| Microsoft Graph | Look up my user profile in Graph |
| Sentinel Triage | List recent security incidents |
| KQL Search | What columns does the SigninLogs table have? |
| Microsoft Learn | Search Microsoft docs for KQL query language |
| All skills | What investigation skills do you have access to? |
If any server fails, check the MCP Servers panel in VS Code (click the {} icon in the bottom status bar) to verify each server shows a green connected status.
| Provider | Free Tier | With Token |
|---|---|---|
| ipinfo.io | 1,000/day (geo, org, ASN) | 50,000/month; paid plans include VPN detection |
| AbuseIPDB | 1,000/day | 10,000/day ($20/month) |
| vpnapi.io | 1,000/month | 10,000/month ($9.99/month) |
| Shodan | InternetDB (unlimited, ports/vulns/tags) | $49 one-time membership: 100 queries/month (adds services, banners, SSL, OS) |
Token priority: If ipinfo_token is a paid plan, VPN detection is included and vpnapi_token is optional. Shodan uses the full API when a paid key is available; on 403/429 it automatically falls back to the free InternetDB.
IP enrichment happens during report generation (not data collection), so you can re-generate reports without re-querying Sentinel/Graph.
pip install -r requirements.txtCore packages: requests (HTTP client for enrichment APIs), python-dateutil (date parsing for KQL time ranges).
- Confidential Data β Reports contain PII and sensitive security data. Mark as CONFIDENTIAL and follow organizational data classification policies.
- Access Control β Restrict access to authorized SOC personnel. Use Azure RBAC for Sentinel, PIM for Graph API permissions.
- Audit Trail β All investigations are timestamped. JSON files in
temp/preserve snapshots; HTML reports include generation metadata. - Data Retention β Investigations older than 3 days are auto-deleted (configurable). Archive important investigations before cleanup.
- API Token Security β Never commit
config.jsonwith tokens (already in.gitignore). Use environment variables or Azure Key Vault for production. - Investigation JSON Files β Stored in
temp/(not committed to Git). Contain complete data including IP enrichment. Can be re-analyzed without re-querying.
| Issue | Solution |
|---|---|
| "No anomalies found" | Signinlogs_Anomalies_KQL_CL table doesn't exist or has no data. See user-investigation skill docs. Wait 24h for initial population. |
| "IP enrichment failed" | ipinfo.io rate limits (1K/day free). Add token to config.json for 50K/month. |
| "MCP server not available" | Check VS Code MCP server config. Verify authentication tokens are valid. |
| "User ID not found" (Graph) | Verify UPN is correct. Check Graph permissions: User.Read.All. |
| "Sentinel query timeout" | Reduce date range. Add | take 10 to limit results. |
| Report generation fails | Validate JSON: python -m json.tool temp/investigation_*.json. Check required fields. |
| SecurityIncident returns 0 results | Use BOTH targetUPN and targetUserId (Object ID). Some incidents use Object ID. |
| Risky sign-ins 404 | Must use /beta endpoint, not /v1.0. |
In Copilot Chat (Agent mode):
"List my Sentinel workspaces"β verifies Sentinel Data Lake MCP"Look up user@domain.com in Graph"β verifies Graph MCP"List recent incidents"β verifies Sentinel Triage MCP
In terminal:
python enrich_ips.py 8.8.8.8 # Verifies IP enrichment API tokensThis project is licensed under the MIT License. Use it, fork it, adapt it for your SOC β just keep the copyright notice.
- Microsoft Sentinel β SIEM/SOAR platform powering all KQL queries and incident management
- Microsoft Defender XDR β Advanced Hunting, device telemetry, vulnerability management
- Microsoft Graph API β Entra ID identity data, user/group management, role assignments
- Microsoft Entra ID Protection β Risk detections, risky sign-ins, user risk states
- Sentinel Data Lake MCP β KQL query execution against Sentinel workspace
- Sentinel Triage MCP β Incident triage, Advanced Hunting, Defender entity APIs
- MCP Server for Microsoft Graph β Graph API endpoint discovery and execution
- KQL Search MCP β Schema intelligence, GitHub KQL query discovery, ASIM validation
- Microsoft Learn MCP β Official documentation search and code sample retrieval
- ipinfo.io β IP geolocation, ISP/ASN identification, hosting provider detection
- vpnapi.io β VPN, proxy, Tor exit node, and relay detection
- AbuseIPDB β Community-sourced IP abuse scoring and recent attack reports
- Shodan β Open port enumeration, service/banner detection, CVE identification, infrastructure tagging
- GitHub Copilot β AI coding assistant powering the natural language investigation interface
- VS Code Agent Skills β Modular skill framework for specialized investigation workflows
- Model Context Protocol (MCP) β Open protocol connecting LLMs to external data sources and tools
Special thanks to the Microsoft Security community for sharing KQL queries and detection logic, and to stefanpems for the Sentinel incident commenting MCP pattern.
