โœ“ Production Ready
โœ“ Wazuh 4.8+
โœ“ Docker Native

AI-Powered SIEM Integration for Natural Language Security Operations

Connect Wazuh SIEM to Claude, ChatGPT, and other AI assistants via Model Context Protocol (MCP). Enable natural language threat detection, automated incident response, and intelligent security analysis for modern SOC teams.

# Natural language security operations
$ "Show critical alerts from the last 24 hours"
$ "Create incident for brute force on web-server-01"
$ "Execute firewall block on suspicious IP"
$ "Analyze security trends with CTI data"

AI-Driven Security Capabilities for Modern SOCs

Transform your security operations with Wazuh AI integration - enabling natural language queries, automated threat response, and ML-powered anomaly detection

๐Ÿšจ

Real-time Alert Management

Query and filter security alerts using natural language. Support for complex multi-field searches across all Wazuh indices with sub-second response times.

๐Ÿ”

Advanced Log Analysis

Deep search capabilities across all log sources with Wazuh Indexer integration. Support for regex patterns, time-based queries, and correlation analysis.

๐Ÿ›ก๏ธ

Automated Response

Execute active response commands directly through AI conversations. Supports firewall rules, process termination, and custom response scripts.

๐Ÿ“Š

Vulnerability Intelligence

Centralized vulnerability detection with CVE mapping and CVSS scoring. Integrates with Wazuh 4.8+ vulnerability feeds and CTI sources.

๐ŸŽฏ

Incident Management

Create, update, and track security incidents with full audit trails. Automated classification and priority assignment based on threat intelligence.

๐Ÿ”

Compliance Reporting

Generate compliance reports for PCI-DSS, GDPR, HIPAA, and custom frameworks. Automated evidence collection and gap analysis.

Technical Specifications

Enterprise-grade requirements and capabilities

Wazuh Requirements

โœ“ Wazuh Manager 4.8.0+ (tested to 4.12.0+)
โœ“ REST API v4.8+ with authentication
โœ“ Port 55000 (configurable)
โœ“ SSL/TLS support (recommended)

Indexer Integration

โœ“ Wazuh Indexer 4.8.0+ (4.12+ recommended)
โœ“ Enhanced analytics & vulnerability data
โœ“ CTI integration support
โœ“ Port 9200 with authentication

Deployment Options

โœ“ Docker 20.10+ & Compose 2.0+
โœ“ STDIO mode for desktop clients
โœ“ HTTP/SSE for remote access
โœ“ Kubernetes ready (Helm charts)

Security Features

โœ“ Non-root container execution
โœ“ SSL certificate verification
โœ“ Connection pooling & rate limiting
โœ“ Audit logging & monitoring

Architecture Overview

Seamless integration with your existing Wazuh infrastructure

AI Client

Claude Desktop, Continue.dev, Custom

MCP Server

FastMCP Protocol Handler

Wazuh Manager

REST API v4.8+

Wazuh Indexer

Enhanced Analytics

Powered by Industry-Leading Technology

Built on proven open-source foundations for enterprise-grade security operations

Wazuh SIEM Platform

Open-source XDR and SIEM solution providing unified security monitoring, threat detection, and compliance management. Wazuh's comprehensive REST API enables seamless AI integration for enhanced security analytics.

Model Context Protocol (MCP)

Anthropic's open standard for connecting AI assistants to external tools and data sources. MCP provides secure, standardized integration between large language models and enterprise systems.

FastMCP Framework

High-performance Python implementation of the Model Context Protocol, optimized for production workloads with built-in security features, connection pooling, and enterprise-grade reliability.

Join the Development

Help us build the future of AI-powered security operations

๐Ÿ›

Report Issues

Found a bug or have a feature request? Open an issue on GitHub with detailed reproduction steps.

๐Ÿ’ป

Submit PRs

Contribute code improvements, new tools, or documentation updates. All contributions welcome!

๐Ÿ“š

Improve Docs

Help security teams get started faster with better guides, examples, and integration tutorials.

๐Ÿ”ง

Add Integrations

Extend support for additional Wazuh modules, third-party tools, or custom response actions.

๐Ÿ“ Contribution Guidelines

Help Us Test & Improve

We're actively seeking feedback from security professionals using Wazuh in production environments. Your insights help shape the roadmap.

๐Ÿงช Test new features in staging
๐Ÿ“Š Share performance metrics
๐Ÿ’ก Suggest workflow improvements
๐Ÿ’ฌ Join the Discussion

Frequently Asked Questions

Common questions about Wazuh AI integration and Model Context Protocol

What is Wazuh MCP Server?

Wazuh MCP Server is an open-source integration that connects Wazuh SIEM to AI assistants like Claude and ChatGPT using the Model Context Protocol. It enables natural language queries, automated threat response, and AI-powered security analysis.

How does AI integration improve SIEM operations?

AI integration transforms SIEM operations by enabling natural language queries, automating alert triage, providing predictive threat analysis, and reducing false positives through machine learning. This significantly reduces MTTR and improves SOC efficiency.

Is MCP secure for enterprise environments?

Yes, MCP provides enterprise-grade security with authentication, encrypted communications, audit logging, and role-based access control. The protocol is designed with security-first principles for production deployments.

What Wazuh versions are supported?

Wazuh MCP Server supports Wazuh Manager 4.8.0+ and has been tested up to version 4.12.0+. For enhanced features like CTI integration and centralized vulnerability detection, Wazuh Indexer 4.8.0+ is recommended.

Can I use this with ChatGPT or other AI models?

While primarily designed for Claude Desktop, the MCP protocol is an open standard. The server can be adapted to work with other AI assistants that support MCP, including potential ChatGPT integrations and custom AI solutions.

What are the system requirements?

Minimum requirements include Docker 20.10+, Python 3.8+, 512MB RAM (1GB recommended), and network access to your Wazuh infrastructure. The server supports both local (STDIO) and remote (HTTP/SSE) deployment modes.

Quick Start Examples

Get running in minutes with these configurations

# Clone the repository
git clone https://github.com/gensecaihq/Wazuh-MCP-Server.git
cd Wazuh-MCP-Server

# Configure environment
export WAZUH_HOST=your-wazuh-manager.com
export WAZUH_USER=api-user
export WAZUH_PASS=secure-password
export WAZUH_INDEXER_HOST=your-indexer.com

# Start the server
docker compose up -d

# Verify deployment
python3 validate-production.py --quick
{
  "mcpServers": {
    "wazuh": {
      "command": "docker",
      "args": ["exec", "wazuh-mcp-server", "./wazuh-mcp-server", "--stdio"],
      "env": {
        "MCP_TRANSPORT": "stdio"
      }
    }
  }
}
# Security Operations
"Show me critical alerts from the last 24 hours"
"Which agents have the most authentication failures?"
"Create an incident for the brute force attack on web-01"

# Threat Hunting
"Search for PowerShell execution with encoded commands"
"Find all file integrity changes in /etc across all agents"
"Show me network connections to known C2 servers"

# Vulnerability Management
"What critical CVEs affect my web servers?"
"Show vulnerability trends over the past month"
"Which packages need urgent patching?"