
Wazuh AI Security
STDIOAI-powered security operations for Wazuh with natural language threat detection and analysis
AI-powered security operations for Wazuh with natural language threat detection and analysis
A production-ready FastMCP server that connects Wazuh SIEM with Claude Desktop for AI-powered security operations using STDIO transport only.
🌐 Remote Server Edition: Looking for enterprise remote access? Check out v3.0.0 Remote Server Edition with HTTP/SSE transport, Docker deployment, and JWT authentication.
# Clone the repository git clone https://github.com/gensecaihq/Wazuh-MCP-Server.git cd Wazuh-MCP-Server # Install in development mode pip install -e . # Configure environment cp .env.example .env # Edit .env with your settings # Validate setup wazuh-mcp-server --check
Edit .env
with your Wazuh server details:
# Wazuh Server API Configuration WAZUH_HOST=your-wazuh-server.com WAZUH_PORT=55000 WAZUH_USER=your-api-username WAZUH_PASS=your-secure-password # Wazuh Indexer Configuration (for 4.8.0+) WAZUH_INDEXER_HOST=your-wazuh-server.com WAZUH_INDEXER_PORT=9200 WAZUH_INDEXER_USER=your-indexer-username WAZUH_INDEXER_PASS=your-indexer-password # SSL Configuration (Production Ready Defaults) VERIFY_SSL=true # Enable SSL verification WAZUH_ALLOW_SELF_SIGNED=true # Allow self-signed certificates
Scenario | Configuration | Use Case |
---|---|---|
Production | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=false | Valid CA certificates |
Self-Signed | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=true | Self-signed certificates |
Development | VERIFY_SSL=false | HTTP-only or invalid certificates |
Add to Claude Desktop config:
%APPDATA%\\Claude\\claude_desktop_config.json
~/.config/claude/claude_desktop_config.json
{ "mcpServers": { "wazuh": { "command": "wazuh-mcp-server", "args": [] } } }
Once configured, you can interact with Wazuh through Claude Desktop:
🔍 "Show me all critical security alerts from the last 24 hours"
🚨 "What are the top 5 security threats in my environment?"
🛡️ "Run a PCI-DSS compliance check"
📊 "Generate a weekly security report"
🔧 "Check the health of agent web-server-01"
🌐 "Show me vulnerability summary for the last week"
get_wazuh_alerts
- Retrieve security alerts with filteringget_wazuh_alert_summary
- Alert summaries and statisticsanalyze_alert_patterns
- AI-powered pattern analysissearch_security_events
- Advanced security event searchget_wazuh_agents
- Agent information and statusget_wazuh_running_agents
- Active agents overviewcheck_agent_health
- Comprehensive agent health validationget_agent_processes
- Running processes per agentget_agent_ports
- Open ports and services per agentget_agent_configuration
- Detailed agent configurationget_wazuh_vulnerabilities
- Comprehensive vulnerability scanningget_wazuh_critical_vulnerabilities
- Critical vulnerabilities onlyget_wazuh_vulnerability_summary
- Vulnerability statistics and trendsanalyze_security_threat
- AI-powered threat indicator analysischeck_ioc_reputation
- IOC reputation checking against threat feedsperform_risk_assessment
- Comprehensive security risk analysisget_top_security_threats
- Top threats by severity and frequencygenerate_security_report
- Automated security reportingrun_compliance_check
- Multi-framework compliance validationget_wazuh_statistics
- Comprehensive system statisticsget_wazuh_weekly_stats
- Weekly performance and security trendsget_wazuh_cluster_health
- Cluster health and status monitoringget_wazuh_cluster_nodes
- Individual cluster node informationget_wazuh_rules_summary
- Rule effectiveness and performanceget_wazuh_remoted_stats
- Agent communication statisticsget_wazuh_log_collector_stats
- Log collection performance metricssearch_wazuh_manager_logs
- Manager log search and analysisget_wazuh_manager_error_logs
- Error log retrieval and analysisvalidate_wazuh_connection
- Connection validation and diagnostics# Start the MCP server (default) wazuh-mcp-server # Validate configuration and connectivity wazuh-mcp-server --check # Show version information wazuh-mcp-server --version # Show help information wazuh-mcp-server --help
┌─────────────────┐ STDIO ┌─────────────────┐ HTTPS ┌─────────────────┐
│ │◄──────────► │ │◄─────────► │ │
│ Claude Desktop │ │ Wazuh MCP Server│ │ Wazuh SIEM │
│ │ │ │ │ │
└─────────────────┘ └─────────────────┘ └─────────────────┘
│ │
│ │
▼ ▼
┌─────────────────┐ ┌─────────────────┐
│ │ │ │
│ FastMCP Runtime │ │ Wazuh Indexer │
│ (29 Tools) │ │ (OpenSearch) │
│ │ │ │
└─────────────────┘ └─────────────────┘
# Install development dependencies pip install -e ".[dev]" # Run tests pytest tests/ # Run security validation wazuh-mcp-server --check # Test Claude Desktop integration # (Configure Claude Desktop and test with natural language queries)
git checkout -b feature/amazing-feature
)git commit -m 'Add amazing feature'
)git push origin feature/amazing-feature
)This project is licensed under the MIT License - see the LICENSE file for details.
This software has been designed for enterprise production use with:
For enterprise deployments requiring remote access, check out our Remote Server Edition:
Feature | v2.1.0 (STDIO) | v3.0.0 (Remote) |
---|---|---|
Transport | STDIO (local) | HTTP/SSE (remote) |
Deployment | Source install | Docker containers |
Authentication | Local integration | JWT Bearer tokens |
Best For | Direct Claude Desktop | Enterprise/Cloud |
Made with ❤️ for the cybersecurity community