Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@wazuh-mcpInvestigate the most recent high-severity alert for agent 001"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
wazuh-mcp
A Model Context Protocol (MCP) server for the Wazuh SIEM/XDR platform. Query agents, security alerts, detection rules, and decoders directly from Claude or any MCP-compatible client.
Features
11 MCP Tools - Agents, alerts, rules, decoders, and version info
3 MCP Resources - Pre-built views for agents, recent alerts, and rule summaries
3 MCP Prompts - Alert investigation, agent health checks, and security overviews
JWT Authentication - Automatic token management with refresh on expiry
Full Compliance Mapping - PCI-DSS, GDPR, HIPAA, NIST 800-53, MITRE ATT&CK
Pagination - All list endpoints support limit/offset pagination
Type-Safe - Full TypeScript with strict mode and Zod schema validation
Prerequisites
Node.js 20+
A running Wazuh manager with API access (default port 55000)
Wazuh API credentials (username/password)
Installation
Configuration
Set the following environment variables:
Variable | Required | Default | Description |
| Yes | - | Wazuh API URL (e.g., |
| Yes | - | API username |
| Yes | - | API password |
| No |
| Set to |
Alternative variable names WAZUH_BASE_URL and WAZUH_USER are also supported.
Usage
Claude Desktop
Add to your Claude Desktop configuration (claude_desktop_config.json):
Standalone
Development
MCP Tools
Agent Tools
Tool | Description |
| List all agents with optional status filtering (active, disconnected, never_connected, pending) |
| Get detailed info for a specific agent by ID |
| Get CPU, memory, and disk statistics for an agent |
Alert Tools
Tool | Description |
| Retrieve recent alerts with filtering by level, agent, rule, and text search |
| Retrieve a single alert by ID |
| Full-text search across all alerts |
Rule Tools
Tool | Description |
| List detection rules with level and group filtering |
| Get full rule details including compliance mappings |
| Search rules by description text |
Other Tools
Tool | Description |
| List log decoders with optional name filtering |
| Get Wazuh manager version and API info |
MCP Resources
Resource URI | Description |
| All registered agents and their status |
| 25 most recent security alerts |
| Detection rules sorted by severity |
MCP Prompts
Prompt | Description |
| Step-by-step alert investigation with MITRE mapping and remediation |
| Comprehensive agent health assessment (status, resources, alerts) |
| Full environment security summary with compliance coverage |
Examples
List active agents
Investigate a brute force attempt
Check agent health
Find high-severity rules
Testing
Tests use mocked Wazuh API responses - no live Wazuh instance needed.
Project Structure
License
MIT