Skip to main content
Glama
vectra-ai-research

Vectra AI MCP Server

list_detections_with_details

Retrieve detailed security threat detections from Vectra AI with filtering by category, state, IP address, date range, and key asset targeting for threat investigation.

Instructions

List detections with filtering and sorting options. Use this to get a detailed list of detections based on various criteria. Returns: str: JSON string with list of detections.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
orderingNoOrder by last_timestamp, created_datetime, or id. Defaults to ordering by last_timestamplast_timestamp
detection_categoryNoFilter by detection category. Detections are grouped into one of the following categories: Command & Control, Botnet, Exfiltration, Lateral Movement, Reconnaissance, Info. Can also perform partial word match
detection_nameNoFilter by detection name. Can also perform partial word match
stateNoFilter by detection state (active, inactive, fixed, filteredbyai, filteredbyrule). Default is 'active'.active
src_ipNoFilter by source IP address of the host that generated the detection. Must be a valid IPv4 or IPv6 address.
start_dateNoFilter by start date (YYYY-MM-DDTHH:MM:SS)
end_dateNoFilter by end date (YYYY-MM-DDTHH:MM:SS)
is_targeting_key_assetNoFilter for detections targeting a key asset. Defaults to 'False'. Set to 'True' to filter for detections that are targeting key assets. To get all detections regardless of key asset targeting, search for both True and False values.
limitNoMaximum number of detections to return in the batch. Defaults to 1000

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/vectra-ai-research/vectra-ai-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server