Wazuh 安全智能
STDIO基于AI的Wazuh安全运营平台
基于AI的Wazuh安全运营平台
A production-ready FastMCP server that connects Wazuh SIEM with Claude Desktop for AI-powered security operations using STDIO transport only.
🌐 Remote Server Edition: Looking for enterprise remote access? Check out v3.0.0 Remote Server Edition with HTTP/SSE transport, Docker deployment, and JWT authentication.
# Clone the repository git clone https://github.com/gensecaihq/Wazuh-MCP-Server.git cd Wazuh-MCP-Server # Install in development mode pip install -e . # Configure environment cp .env.example .env # Edit .env with your settings # Validate setup wazuh-mcp-server --check
Edit .env with your Wazuh server details:
# Wazuh Server API Configuration WAZUH_HOST=your-wazuh-server.com WAZUH_PORT=55000 WAZUH_USER=your-api-username WAZUH_PASS=your-secure-password # Wazuh Indexer Configuration (for 4.8.0+) WAZUH_INDEXER_HOST=your-wazuh-server.com WAZUH_INDEXER_PORT=9200 WAZUH_INDEXER_USER=your-indexer-username WAZUH_INDEXER_PASS=your-indexer-password # SSL Configuration (Production Ready Defaults) VERIFY_SSL=true # Enable SSL verification WAZUH_ALLOW_SELF_SIGNED=true # Allow self-signed certificates
| Scenario | Configuration | Use Case | 
|---|---|---|
| Production | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=false | Valid CA certificates | 
| Self-Signed | VERIFY_SSL=true + WAZUH_ALLOW_SELF_SIGNED=true | Self-signed certificates | 
| Development | VERIFY_SSL=false | HTTP-only or invalid certificates | 
Add to Claude Desktop config:
%APPDATA%\\Claude\\claude_desktop_config.json~/.config/claude/claude_desktop_config.json{ "mcpServers": { "wazuh": { "command": "wazuh-mcp-server", "args": [] } } }
Once configured, you can interact with Wazuh through Claude Desktop:
🔍 "Show me all critical security alerts from the last 24 hours"
🚨 "What are the top 5 security threats in my environment?"
🛡️ "Run a PCI-DSS compliance check"
📊 "Generate a weekly security report"
🔧 "Check the health of agent web-server-01"
🌐 "Show me vulnerability summary for the last week"
get_wazuh_alerts - Retrieve security alerts with filteringget_wazuh_alert_summary - Alert summaries and statisticsanalyze_alert_patterns - AI-powered pattern analysissearch_security_events - Advanced security event searchget_wazuh_agents - Agent information and statusget_wazuh_running_agents - Active agents overviewcheck_agent_health - Comprehensive agent health validationget_agent_processes - Running processes per agentget_agent_ports - Open ports and services per agentget_agent_configuration - Detailed agent configurationget_wazuh_vulnerabilities - Comprehensive vulnerability scanningget_wazuh_critical_vulnerabilities - Critical vulnerabilities onlyget_wazuh_vulnerability_summary - Vulnerability statistics and trendsanalyze_security_threat - AI-powered threat indicator analysischeck_ioc_reputation - IOC reputation checking against threat feedsperform_risk_assessment - Comprehensive security risk analysisget_top_security_threats - Top threats by severity and frequencygenerate_security_report - Automated security reportingrun_compliance_check - Multi-framework compliance validationget_wazuh_statistics - Comprehensive system statisticsget_wazuh_weekly_stats - Weekly performance and security trendsget_wazuh_cluster_health - Cluster health and status monitoringget_wazuh_cluster_nodes - Individual cluster node informationget_wazuh_rules_summary - Rule effectiveness and performanceget_wazuh_remoted_stats - Agent communication statisticsget_wazuh_log_collector_stats - Log collection performance metricssearch_wazuh_manager_logs - Manager log search and analysisget_wazuh_manager_error_logs - Error log retrieval and analysisvalidate_wazuh_connection - Connection validation and diagnostics# Start the MCP server (default) wazuh-mcp-server # Validate configuration and connectivity wazuh-mcp-server --check # Show version information wazuh-mcp-server --version # Show help information wazuh-mcp-server --help
┌─────────────────┐    STDIO    ┌─────────────────┐    HTTPS   ┌─────────────────┐
│                 │◄──────────► │                 │◄─────────► │                 │
│  Claude Desktop │             │ Wazuh MCP Server│            │   Wazuh SIEM    │
│                 │             │                 │            │                 │
└─────────────────┘             └─────────────────┘            └─────────────────┘
                                         │                              │
                                         │                              │
                                         ▼                              ▼
                                ┌─────────────────┐            ┌─────────────────┐
                                │                 │            │                 │
                                │ FastMCP Runtime │            │ Wazuh Indexer   │
                                │ (29 Tools)      │            │ (OpenSearch)    │
                                │                 │            │                 │
                                └─────────────────┘            └─────────────────┘
# Install development dependencies pip install -e ".[dev]" # Run tests pytest tests/ # Run security validation wazuh-mcp-server --check # Test Claude Desktop integration # (Configure Claude Desktop and test with natural language queries)
git checkout -b feature/amazing-feature)git commit -m 'Add amazing feature')git push origin feature/amazing-feature)This project is licensed under the MIT License - see the LICENSE file for details.
This software has been designed for enterprise production use with:
For enterprise deployments requiring remote access, check out our Remote Server Edition:
| Feature | v2.1.0 (STDIO) | v3.0.0 (Remote) | 
|---|---|---|
| Transport | STDIO (local) | HTTP/SSE (remote) | 
| Deployment | Source install | Docker containers | 
| Authentication | Local integration | JWT Bearer tokens | 
| Best For | Direct Claude Desktop | Enterprise/Cloud | 
Made with ❤️ for the cybersecurity community