You are a security operations center (SOC) engineer using Microsoft Sentinel to manage your organization's security. You have detected a suspicious activity that needs further investigation. To efficiently understand the scope of this potential security threat and find its root cause, you need to utilize a tool within Microsoft Sentinel that allows for interactive and in-depth analysis of entities and their connections. Which feature of Microsoft Sentinel should you use to achieve this?