by gbrigandi
MCP Server for Wazuh SIEM
# Add to your Claude Code skills
git clone https://github.com/gbrigandi/mcp-server-wazuhA Rust-based server designed to bridge the gap between a Wazuh Security Information and Event Management (SIEM) system and applications requiring contextual security data, specifically tailored for the Claude Desktop Integration using the Model Context Protocol (MCP).
Modern AI assistants like Claude can benefit significantly from real-time context about the user's security environment. The Wazuh MCP Server bridges this gap by providing comprehensive access to Wazuh SIEM data through natural language interactions.
This server transforms complex Wazuh API responses into MCP-compatible format, enabling AI assistants to access:
Rather than requiring manual API calls or complex queries, security teams can now ask natural language questions like "Show me critical vulnerabilities on web servers," "What processes are running on agent 001?" or "Are we meeting PCI-DSS logging requirements?" and receive structured, actionable data from their Wazuh deployment.
No comments yet. Be the first to share your thoughts!
This approach is particularly valuable for compliance teams who need to quickly assess security posture, identify gaps in monitoring coverage, validate rule effectiveness, and generate evidence for audit requirements across distributed infrastructure.

The Wazuh MCP Server provides direct access to Wazuh security data through natural language interactions, enabling several practical use cases:
get_wazuh_alert_summary to quickly identify and prioritize threats requiring immediate attention.get_wazuh_vulnerability_summary and get_wazuh_critical_vulnerabilities to assess security posture of specific agents and prioritize patching efforts.get_wazuh_agent_processes for threat hunting and system analysis.get_wazuh_agent_ports to identify potential attack vectors.get_wazuh_running_agents to ensure comprehensive security coverage.get_wazuh_rules_summary to optimize detection capabilities.get_wazuh_weekly_stats, get_wazuh_remoted_stats, and get_wazuh_log_collector_stats.get_wazuh_cluster_health and get_wazuh_cluster_nodes for operational reliability.search_wazuh_manager_logs and get_wazuh_manager_error_logs for incident investigation.For enhanced threat intelligence and incident response capabilities, the Wazuh MCP Server can be combined with complementary security MCP servers:
| Server | Description | |--------|-------------| | Cortex MCP Server | Artifact analysis and IOC enrichment via 140+ analyzers | | TheHive MCP Server | Case management and incident response orchestration | | MISP MCP Server | Threat intelligence sharing and IOC lookup |
Enhanced Capabilities with Cortex Integration:
Enhanced Capabilities with TheHive Integration:
Enhanced Capabilities with MISP Integration:
Example Workflow:
mcp-server-wazuh GitHub repository.mcp-server-wazuh-linux-amd64, mcp-server-wazuh-macos-amd64, mcp-server-wazuh-macos-arm64, mcp-server-wazuh-windows-amd64.exe).chmod +x mcp-server-wazuh-linux-amd64).mcp-server-wazuh and move it to a directory in your system's PATH for easier access.docker pull ghcr.io/gbrigandi/mcp-server-wazuh:latest
Prerequisites:
Build:
git clone https://github.com/gbrigandi/mcp-server-wazuh.git
cd mcp-server-wazuh
# Build with stdio transport only (default)
cargo build --release
# Build with HTTP transport support
cargo build --release --features http
The binary will be available at target/release/mcp-server-wazuh.
The method for configuring your LLM client will vary depending on the client itself. For clients that support MCP (Model Context Protocol), you will typically need to point the client to the path of the mcp-server-wazuh executable.
Example for Claude Desktop:
Configure your claude_desktop_config.json file:
{
"mcpServers": {
"wazu