gensecaihq/Wazuh-MCP-Server
If you are the rightful owner of Wazuh-MCP-Server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Wazuh MCP Server is an AI-powered security operations platform that integrates conversational AI with traditional SIEM operations.
Wazuh MCP Server v2.1.0
A production-ready FastMCP server that connects Wazuh SIEM with Claude Desktop for AI-powered security operations using STDIO transport only.
π Remote Server Edition: Looking for enterprise remote access? Check out v3.0.0 Remote Server Edition with HTTP/SSE transport, Docker deployment, and JWT authentication.
β¨ Key Features
- π 29 Security Tools: Complete FastMCP tool suite for Wazuh integration
- π§ AI-Powered Analysis: Threat analysis, risk assessment, and compliance reporting
- π¬ Natural Language Queries: Ask Claude "Show me critical vulnerabilities"
- π‘ STDIO Only: Secure local connection to Claude Desktop - no network setup
- β‘ Dual API Support: Intelligent routing between Wazuh Server API and Indexer API
- π‘οΈ Production Ready: Comprehensive health checks, error handling, and security
π Quick Start
Installation
# Clone the repository
git clone https://github.com/gensecaihq/Wazuh-MCP-Server.git
cd Wazuh-MCP-Server
# Install in development mode
pip install -e .
# Configure environment
cp .env.example .env
# Edit .env with your settings
# Validate setup
wazuh-mcp-server --check
βοΈ Configuration
Required Wazuh Settings
Edit .env
with your Wazuh server details:
# Wazuh Server API Configuration
WAZUH_HOST=your-wazuh-server.com
WAZUH_PORT=55000
WAZUH_USER=your-api-username
WAZUH_PASS=your-secure-password
# Wazuh Indexer Configuration (for 4.8.0+)
WAZUH_INDEXER_HOST=your-wazuh-server.com
WAZUH_INDEXER_PORT=9200
WAZUH_INDEXER_USER=your-indexer-username
WAZUH_INDEXER_PASS=your-indexer-password
# SSL Configuration (Production Ready Defaults)
VERIFY_SSL=true # Enable SSL verification
WAZUH_ALLOW_SELF_SIGNED=true # Allow self-signed certificates
SSL Configuration Options
Scenario | Configuration | Use Case |
---|---|---|
Production | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=false | Valid CA certificates |
Self-Signed | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=true | Self-signed certificates |
Development | VERIFY_SSL=false | HTTP-only or invalid certificates |
π₯οΈ Claude Desktop Integration
Configuration
Add to Claude Desktop config:
- Windows:
%APPDATA%\\Claude\\claude_desktop_config.json
- macOS/Linux:
~/.config/claude/claude_desktop_config.json
{
"mcpServers": {
"wazuh": {
"command": "wazuh-mcp-server",
"args": []
}
}
}
Usage Examples
Once configured, you can interact with Wazuh through Claude Desktop:
π "Show me all critical security alerts from the last 24 hours"
π¨ "What are the top 5 security threats in my environment?"
π‘οΈ "Run a PCI-DSS compliance check"
π "Generate a weekly security report"
π§ "Check the health of agent web-server-01"
π "Show me vulnerability summary for the last week"
π Complete Tool Reference
Alert Management (4 tools)
get_wazuh_alerts
- Retrieve security alerts with filteringget_wazuh_alert_summary
- Alert summaries and statisticsanalyze_alert_patterns
- AI-powered pattern analysissearch_security_events
- Advanced security event search
Agent Management (6 tools)
get_wazuh_agents
- Agent information and statusget_wazuh_running_agents
- Active agents overviewcheck_agent_health
- Comprehensive agent health validationget_agent_processes
- Running processes per agentget_agent_ports
- Open ports and services per agentget_agent_configuration
- Detailed agent configuration
Vulnerability Management (3 tools)
get_wazuh_vulnerabilities
- Comprehensive vulnerability scanningget_wazuh_critical_vulnerabilities
- Critical vulnerabilities onlyget_wazuh_vulnerability_summary
- Vulnerability statistics and trends
Security Analysis (6 tools)
analyze_security_threat
- AI-powered threat indicator analysischeck_ioc_reputation
- IOC reputation checking against threat feedsperform_risk_assessment
- Comprehensive security risk analysisget_top_security_threats
- Top threats by severity and frequencygenerate_security_report
- Automated security reportingrun_compliance_check
- Multi-framework compliance validation
System Monitoring (10 tools)
get_wazuh_statistics
- Comprehensive system statisticsget_wazuh_weekly_stats
- Weekly performance and security trendsget_wazuh_cluster_health
- Cluster health and status monitoringget_wazuh_cluster_nodes
- Individual cluster node informationget_wazuh_rules_summary
- Rule effectiveness and performanceget_wazuh_remoted_stats
- Agent communication statisticsget_wazuh_log_collector_stats
- Log collection performance metricssearch_wazuh_manager_logs
- Manager log search and analysisget_wazuh_manager_error_logs
- Error log retrieval and analysisvalidate_wazuh_connection
- Connection validation and diagnostics
π Documentation
Complete API Documentation
- - Comprehensive alert management tools
- - Agent monitoring and health tools
- - Vulnerability assessment tools
- - AI-powered security analysis tools
- - Infrastructure monitoring tools
- - Compliance and reporting tools
- - Advanced log search and analysis
Deployment Guides
- - Comprehensive installation instructions
- - Detailed configuration options
- - Common issues and solutions
- - Security best practices and hardening
π§ Command Line Interface
# Start the MCP server (default)
wazuh-mcp-server
# Validate configuration and connectivity
wazuh-mcp-server --check
# Show version information
wazuh-mcp-server --version
# Show help information
wazuh-mcp-server --help
ποΈ Architecture
βββββββββββββββββββ STDIO βββββββββββββββββββ HTTPS βββββββββββββββββββ
β βββββββββββββΊ β ββββββββββββΊ β β
β Claude Desktop β β Wazuh MCP Serverβ β Wazuh SIEM β
β β β β β β
βββββββββββββββββββ βββββββββββββββββββ βββββββββββββββββββ
β β
β β
βΌ βΌ
βββββββββββββββββββ βββββββββββββββββββ
β β β β
β FastMCP Runtime β β Wazuh Indexer β
β (29 Tools) β β (OpenSearch) β
β β β β
βββββββββββββββββββ βββββββββββββββββββ
π‘οΈ Security Features
- π Secure by Default: SSL/TLS verification enabled by default
- π« No Network Exposure: STDIO transport only - no HTTP server
- π Credential Validation: Strong password requirements and validation
- π Audit Logging: Comprehensive security event logging
- β‘ Rate Limiting: Built-in API rate limiting and connection pooling
- π οΈ Error Handling: Graceful error handling and recovery mechanisms
π§ͺ Testing & Validation
# Install development dependencies
pip install -e ".[dev]"
# Run tests
pytest tests/
# Run security validation
wazuh-mcp-server --check
# Test Claude Desktop integration
# (Configure Claude Desktop and test with natural language queries)
π System Requirements
Minimum Requirements
- OS: Windows 10+, macOS 10.15+, Linux (any modern distribution)
- Python: 3.11 or higher
- RAM: 512MB available memory
- Network: HTTPS access to Wazuh server
Recommended Requirements
- Python: 3.12 or higher
- RAM: 2GB available memory
- SSL: Valid SSL certificates for production use
- Monitoring: Centralized logging and monitoring setup
π€ Contributing
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
π License
This project is licensed under the MIT License - see the file for details.
π Support
- Documentation:
- Issues: GitHub Issues
- Discussions: GitHub Discussions
π Production Ready
This software has been designed for enterprise production use with:
- β Comprehensive error handling and recovery
- β Production-grade logging and monitoring
- β Security hardening and validation
- β Cross-platform compatibility
- β Extensive documentation and support
- β Full test coverage and validation
π Other Editions
Wazuh MCP Remote Server v3.0.0
For enterprise deployments requiring remote access, check out our Remote Server Edition:
- π Remote Access: HTTP/SSE transport for cloud and distributed environments
- π JWT Authentication: Enterprise-grade Bearer token authentication
- π³ Docker Native: Multi-platform container deployment
- π Full Monitoring: Prometheus metrics, health checks, and observability
- β‘ High Availability: Circuit breakers, retry logic, and load balancing ready
- π’ Enterprise Ready: Perfect for corporate and cloud deployments
β View Remote Server Edition
Comparison
Feature | v2.1.0 (STDIO) | v3.0.0 (Remote) |
---|---|---|
Transport | STDIO (local) | HTTP/SSE (remote) |
Deployment | Source install | Docker containers |
Authentication | Local integration | JWT Bearer tokens |
Best For | Direct Claude Desktop | Enterprise/Cloud |
Made with β€οΈ for the cybersecurity community