Blog Post

Microsoft Security Community Blog
5 MIN READ

Announcing AI Entity Analyzer in Microsoft Sentinel MCP Server - Public Preview

Matt_Lichtinger's avatar
Dec 15, 2025

Triaging entities is a core task for SOC teams - Entity Analyzer delivers an out-of-the-box analysis & verdict for any entity leveraging your organization’s security data in Sentinel.

What is the Entity Analyzer? 

Assessing the risk of entities is a core task for SOC teams - whether triaging incidents, investigating threats, or automating response workflows. Traditionally, this has required building complex playbooks or custom logic to gather and analyze fragmented security data from multiple sources. 

With Entity Analyzer, this complexity starts to fade away. The tool leverages your organization’s security data in Sentinel to deliver comprehensive, reasoned risk assessments for any entity you encounter - starting with users and urls. By providing this unified, out-of-the-box solution for entity analysis, Entity Analyzer also enables the AI agents you build to make smarter decisions and automate more tasks - without the need to manually engineer risk evaluation logic for each entity type. 

And for those building SOAR workflows, Entity Analyzer is natively integrated with Logic Apps, making it easy to enrich incidents and automate verdicts within your playbooks. 

*Entity Analyzer is rolling out in Public Preview to Sentinel MCP server and within Logic Apps starting today. Learn more here.

Deep Dive: How the User Analyzer is already solving problems for security teams 

Problem: Drowning in identity alerts 

Security operations centers (SOCs) are inundated with identity-based threats and alert noise. Triaging these alerts requires analyzing numerous data sources across sign-in logs, cloud app events, identity info, behavior analytics, threat intel, and more, all in tandem with each other to reach a verdict - something very challenging to do without a human in the loop today. So, we introduced the User Analyzer, a specialized analyzer that unifies, correlates, and analyzes user activity across all these security data sources.  

Government of Nunavut: solving identity alert overload with User Analyzer 

Hear the below from Arshad Sheikh, Security Expert at Government of Nunavut, on how they're using the User Analyzer today: 

How it's making a difference 

"Before the User Analyzer, when we received identity alerts we had to check a large amount of data related to users’ activity (user agents, anomalies, IP reputation, etc.). We had to write queries, wait for them to run, and then manually reason over the results. We attempted to automate some of this, but maintaining and updating that retrieval, parsing, and reasoning automation was difficult and we didn’t have the resources to support it.  

With the User Analyzer, we now have a plug-and-play solution that represents a step toward the AI-driven automation of the future. It gathers all the context such as what the anomalies are and presents it to our analysts so they can make quick, confident decisions, eliminating the time previously spent manually gathering this data from portals."

Solving a real problem

"For example, every 24 hours we create a low severity incident of our users who successfully sign-in to our network non interactively from outside of our GEO fence. This type of activity is not high-enough fidelity to auto-disable, requiring us to manually analyze the flagged users each time. But with User Analyzer, this analysis is performed automatically. 

The User Analyzer has also significantly reduced the time required to determine whether identity-based incidents like these are false positives or true positivesInstead of spending around 20 minutes investigating each incident, our analysts can now reach a conclusion in about 5 minutes using the automatically generated summary."

Looking ahead

"Looking ahead, we see even more potential. In the future, the User Analyzer could be integrated directly with Microsoft Sentinel playbooks to take automated, definitive action such as blocking user or device access based on the analyzer’s results. This would further streamline our incident response and move us closer to fully automated security operations." 

 

Want similar benefits in your SOC? Get started with our Entity Analyzer Logic Apps template here.

User Analyzer architecture: how does it work? 

Let’s take a look at how the User Analyzer works. The User Analyzer aggregates and correlates signals from multiple data sources to deliver a comprehensive analysis, enabling informed actions based on user activity. The diagram below gives an overview of this architecture:  

 

 Step 1: Retrieve Data 

The analyzer starts by retrieving relevant data from the following sources: 

  • Sign-In Logs (Interactive & Non-Interactive): Tracks authentication and login activity. 
  • Security Alerts: Alerts from Microsoft Defender solutions. 
  • Behavior Analytics: Surfaces behavioral anomalies through advanced analytics. 
  • Cloud App Events: Captures activity from Microsoft Defender for Cloud Apps. 
  • Identity Information: Enriches user context with identity records. 
  • Microsoft Threat Intelligence: Enriches IP addresses with Microsoft Threat Intelligence. 

Steps 2: Correlate signals 

Signals are correlated using identifiers such as user IDs, IP addresses, and threat intelligence. Rather than treating each alert or behavior in isolation, the User Analyzer fuses signals to build a holistic risk profile.

Step 3: AI-based reasoning 

In the User Analyzer, multiple AI-powered agents collaborate to evaluate the evidence and reach consensus. This architecture not only improves accuracy and reduces bias in verdicts, but also provides transparent, justifiable decisions. 

Leveraging AI within the User Analyzer introduces a new dimension of intelligence to threat detection. Instead of relying on static signatures or rigid regex rules, AI-based reasoning can uncover subtle anomalies that traditional detection methods and automation playbooks often miss. For example, an attacker might try to evade detection by slightly altering a user-agent string or by targeting and exfiltrating only a few files of specific types. While these changes could bypass conventional pattern matching, an AI-powered analyzer understands the semantic context and behavioral patterns behind these artifacts, allowing it to flag suspicious deviations even when the syntax looks benign. 

Step 4: Verdict & analysis 

Each user is given a verdict. The analyzer outputs any of the following verdicts based on the analysis: 

  • Compromised 
  • Suspicious activity found 
  • No evidence of compromise 

Based on the verdict, a corresponding recommendation is given. This helps teams make an informed decision whether action should be taken against the user.

*AI-generated content from the User Analyzer may be incorrect - check it for accuracy.

 

User Analyzer Example Output

See the following example output from the user analyzer within an incident comment:

This screenshot shows how the analysis would appear within an incident's comments section. See the below pictures for a zoomed-in view of the analysis text.
*IP addresses have been redacted for this blog*
This screenshot shows the analyzer's top-level classification that a user account is compromised along with its supporting evidence, starting with the series of alerts and their associated MITRE ATT&CK techniques, a list of malicious IP addresses the user signed in from (redacted for this blog), and a few suspicious user agents the user's activity originated from.This screenshot shows the rest of the supporting evidence (the remaining suspicious user agents and a list of anomalous behavior). By providing these pieces of evidence, the analyzer can make security analysts, who typically have to query and analyze these themselves, feel more comfortable trusting its classification. The analyzer also gives recommendations to remediate the account compromise, and a list of data sources it used during analysis.

Conclusion 

Entity Analyzer in Microsoft Sentinel MCP server represents a leap forward in alert triage & analysis. By correlating signals and harnessing AI-based reasoning, it empowers SOC teams to act on investigations with greater speed, precision, and confidence. 

Updated Dec 12, 2025
Version 1.0
No CommentsBe the first to comment