Browse docs sections

MCP Connector Strategies

How to use Sentinel and Splunk MCP integrations in Canoma for high-confidence internal context.

This page focuses on the two built-in MCP connector types in Canoma: Microsoft Sentinel and Splunk. Use these connectors to validate external threat claims against your environment.

How Connector Queries Run

  1. Configure connector credentials in Settings.
  2. Define narrow query scope (assets, timeframe, and threat object).
  3. Canoma executes the connector query and normalizes returned evidence.
  4. Review connector-tagged findings in the response.

Security Expectations

  • Use least-privilege credentials for each connector.
  • Restrict connector targets to approved environments.
  • Rotate tokens regularly and retest access after rotation.
  • Keep production connector traffic encrypted.

Microsoft Sentinel in Canoma

Required Fields

  • Workspace ID
  • Access Token (Bearer token with Sentinel API permissions)
  • Start with a single CVE, actor, or IOC cluster.
  • Use a bounded time window (24h to 72h) for first-pass triage.
  • Return host, timestamp, and evidence summary in one response.

Sentinel Prompt Pattern

bash

Check Microsoft Sentinel for evidence of CVE-2025-XXXX in internet-facing assets over the last 24h. Return affected hosts, event timestamps, and top matching logs.

Splunk in Canoma

Required Fields

  • Splunk Host (for example, https://mycompany.splunkcloud.com:8089)
  • API Token
  • Start with bounded searches before broad hunts.
  • Ask for source types, impacted systems, and confidence notes.
  • Re-run critical hits using a second query angle.

Splunk Prompt Pattern

bash

Search Splunk for indicators related to [actor/CVE/IOC] over the past 24h. Return matched events, sourcetypes, affected systems, and confidence notes.

Investigation Workflow (Sentinel or Splunk)

1) Triage

  • Start with one threat object (single CVE, actor, or IOC cluster).
  • Use a short timeframe first (24h to 72h).

2) Correlate

  • Compare internal hits against external intelligence claims.
  • Separate confirmed internal evidence from inferred links.

3) Escalate

  • Convert confirmed findings into owner-based actions.
  • Include source system, timestamp range, and confidence.

Failure Modes and Fixes

SymptomLikely causeFix
Empty resultsTime window too narrow or wrong scopeExpand time range and verify entity fields
Query errorConnector tool/argument mismatchTest connector first and inspect available tools
Noisy outputQuery too broadConstrain by asset group and threat object
False certaintyWeak correlation from partial evidenceForce explicit fact vs assumption separation

Operational Best Practices

  • Run connector test after setup and credential rotation.
  • Keep one connector query objective per prompt.
  • Re-run high-impact findings with a second query angle.
  • Keep internal findings separate from external claims until validated.

Related setup guidance

For connector hardening controls, see MCP Security Hardening.