Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 6 additions & 1 deletion config/_default/menus/main.en.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7122,11 +7122,16 @@ menu:
parent: security_platform
identifier: security_research_feed
weight: 12
- name: Security MCP Tools
url: security/mcp_server
parent: security_platform
identifier: security_mcp_server
weight: 13
- name: Guides
url: security/guide
parent: security_platform
identifier: security_guides
weight: 13
weight: 14
- name: Cloud SIEM
url: security/cloud_siem/
pre: siem
Expand Down
103 changes: 103 additions & 0 deletions content/en/security/mcp_server.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
---
title: Security MCP Tools
description: Use AI agents to investigate security signals and analyze security findings with the Datadog MCP Server's security toolset.
further_reading:
- link: "bits_ai/mcp_server/setup"
tag: "Documentation"
text: "Set Up the Datadog MCP Server"
- link: "bits_ai/mcp_server"
tag: "Documentation"
text: "Datadog MCP Server"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
text: "Datadog MCP Server"
text: "Datadog MCP Server Overview"

I know this isn't the actual title of the linked page, but I think it helps to have a similar level of detail between the two MCP links.

- link: "security/threats/security_signals/"
tag: "Documentation"
text: "Security Signals"
- link: "security/guide/findings-schema/?tab=library_vulnerability"
tag: "Documentation"
text: "Security Findings"
algolia:
tags: ["mcp", "mcp server", "security", "security signals", "security findings"]
---

## Overview

The [Datadog MCP Server][1] lets AI agents query your security data through the [Model Context Protocol (MCP)][2]. The `security` toolset gives AI clients like Cursor, Claude Code, and OpenAI Codex access to your security signals and findings, so you can investigate threats and analyze your security posture using natural language.

Check notice on line 23 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.sentencelength

Suggestion: Try to keep your sentence length to 25 words or fewer.

<div class="alert alert-info">This page covers the <code>security</code> toolset of the remote Datadog MCP Server. For the Code Security MCP Server, which runs locally and scans source code during development, see <a href="/security/code_security/dev_tool_int/mcp_server/">Code Security MCP Server</a>.</div>

## Quickstart

The `security` toolset is not enabled by default. To activate it, add `security` to the `toolsets` parameter when connecting to the Datadog MCP Server for your [Datadog site][3]:

```text
https://mcp.{{< region-param key="dd_site" >}}/api/unstable/mcp-server/mcp?toolsets=core,security
```

<div class="alert alert-warning">Without <code>?toolsets=security</code> in the URL, the security tools are not available to your AI client — even if the MCP Server is otherwise connected and working.</div>

Check warning on line 35 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.dashes

Don't put a space before or after a dash.

For client-specific setup instructions (Cursor, Claude Code, VS Code, and others), see [Set Up the Datadog MCP Server][4].
Comment on lines +29 to +37
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The `security` toolset is not enabled by default. To activate it, add `security` to the `toolsets` parameter when connecting to the Datadog MCP Server for your [Datadog site][3]:
```text
https://mcp.{{< region-param key="dd_site" >}}/api/unstable/mcp-server/mcp?toolsets=core,security
```
<div class="alert alert-warning">Without <code>?toolsets=security</code> in the URL, the security tools are not available to your AI client — even if the MCP Server is otherwise connected and working.</div>
For client-specific setup instructions (Cursor, Claude Code, VS Code, and others), see [Set Up the Datadog MCP Server][4].
The `security` toolset is not enabled by default. You can enable it by adding a parameter to your URL, which allows security tools to interact with your AI client.
1. [Set up the Datadog MCP Server][4].
2. When connecting to the Datadog MCP Server, add `security` to the `toolsets` parameter. For example, for your [Datadog site][3] ({{< region-param key="dd_site_name" >}}), use:
```text
https://mcp.{{< region-param key="dd_site" >}}/api/unstable/mcp-server/mcp?toolsets=core,security
```


## Use cases
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would normally put this information in a subsection under the overview, rather than below the quickstart, so users can use this information to help decide if it's the right solution for them.

I'm not sure it's fully necessary, though. If we already provide a list of tools and their descriptions, do we need this information too? I think it's safe to remove, because rather than talking about them in the abstract and then specifics, it's fine to jump straight to specifics.


The `security` toolset is useful for:

- **Triaging security signals**: Ask your AI agent to surface recent high-severity Cloud SIEM signals, App & API Protection alerts, or Workload Protection threats, and get a summary of patterns and affected resources.
- **Analyzing your security posture**: Query findings across Cloud Security with SQL to understand the distribution of misconfigurations, vulnerabilities, and identity risks across your environment.
- **Investigating specific findings**: Retrieve full details for a set of findings to understand scope, affected resources, and remediation context.
- **Correlating signals and findings**: Cross-reference active security signals with open findings to determine whether an alert is tied to a known posture issue.
- **Remediating vulnerabilities with an AI agent**: Pull library vulnerability findings — which include code location and remediation guidance — and pass them to your AI agent to apply patches directly in your codebase.

Check warning on line 47 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.dashes

Don't put a space before or after a dash.

Check warning on line 47 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.dashes

Don't put a space before or after a dash.
Comment on lines +41 to +47
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The `security` toolset is useful for:
- **Triaging security signals**: Ask your AI agent to surface recent high-severity Cloud SIEM signals, App & API Protection alerts, or Workload Protection threats, and get a summary of patterns and affected resources.
- **Analyzing your security posture**: Query findings across Cloud Security with SQL to understand the distribution of misconfigurations, vulnerabilities, and identity risks across your environment.
- **Investigating specific findings**: Retrieve full details for a set of findings to understand scope, affected resources, and remediation context.
- **Correlating signals and findings**: Cross-reference active security signals with open findings to determine whether an alert is tied to a known posture issue.
- **Remediating vulnerabilities with an AI agent**: Pull library vulnerability findings — which include code location and remediation guidance and pass them to your AI agent to apply patches directly in your codebase.
You can use the `security` toolset to:
- **Triage security signals**: Ask your AI agent to surface recent high-severity Cloud SIEM signals, App & API Protection alerts, or Workload Protection threats, and get a summary of patterns and affected resources.
- **Analyze your security posture**: Query findings across Cloud Security with SQL to understand the distribution of misconfigurations, vulnerabilities, and identity risks across your environment.
- **Investigate specific findings**: Retrieve full details for a set of findings to understand scope, affected resources, and remediation context.
- **Correlate signals and findings**: Cross-reference active security signals with open findings to determine whether an alert is tied to a known posture issue.
- **Remediate vulnerabilities with an AI agent**: Pull library vulnerability findings, including code location and remediation guidance, and pass them to your AI agent to apply patches directly in your codebase.

I find this easier to skim if all the verb forms are consistent 🤓


## Available tools
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This doesn't explain what a tool is or how to use one, which I'm concerned could be confusing. I'd add a sentence or two of intro material here that provides some background information and links to usage instructions on the main MCP page.


`search_datadog_security_signals`
: Searches and retrieves security signals from Datadog, including Cloud SIEM signals, App & API Protection signals, and Workload Protection signals. Use this to surface and investigate suspicious activity.
: *Permissions required: `Security Signals Read`*

`security_findings_schema`
: Returns the available fields and their types for security findings. Call this before using `analyze_security_findings` to discover which fields you can filter and group by. Supports filtering by finding type.
: *Permissions required: `Security Monitoring Findings Read`*

`analyze_security_findings`
: Primary tool for analyzing security findings using SQL. Queries live data from the last 24 hours with support for aggregations, filtering, and grouping. Call `security_findings_schema` first to discover available fields.
: *Permissions required: `Security Monitoring Findings Read`, `Timeseries`*

`search_security_findings`
: Retrieves full security finding objects. Use this when you need complete finding details or when SQL-based analysis is not sufficient. Prefer `analyze_security_findings` for most analysis tasks.
: *Permissions required: `Security Monitoring Findings Read`*

## Example prompts

After you connect, try prompts like:

**Signals:**
- Show me security signals from the last 24 hours.

Check warning on line 72 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.pronouns

Avoid first-person pronouns such as 'me'.
- Find high-severity signals related to my production environment.

Check warning on line 73 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.pronouns

Avoid first-person pronouns such as 'my'.
- List Cloud SIEM signals triggered by suspicious login attempts.

**Findings:**
- What fields are available for security findings?
- Show me the top 10 rules with the most critical findings.

Check warning on line 78 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.pronouns

Avoid first-person pronouns such as 'me'.
- Count open findings grouped by severity and finding type.
- Find library vulnerabilities with exploits available, grouped by resource.
- Get full details for critical findings in my AWS environment.

Check warning on line 81 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.pronouns

Avoid first-person pronouns such as 'my'.
- List all open identity risk findings with full metadata.
- Get open library vulnerability findings with code locations and remediation guidance so I can patch them.

Check warning on line 83 in content/en/security/mcp_server.md

View workflow job for this annotation

GitHub Actions / vale

Datadog.pronouns

Avoid first-person pronouns such as 'I'.

## Required permissions

The Datadog role assigned to you must include the following permissions to use each tool:

| Tool | Required permissions |
|---|---|
| `search_datadog_security_signals` | `Security Signals Read` |
| `security_findings_schema` | `Security Monitoring Findings Read` |
| `analyze_security_findings` | `Security Monitoring Findings Read`, `Timeseries` |
| `search_security_findings` | `Security Monitoring Findings Read` |

Comment on lines +85 to +95
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## Required permissions
The Datadog role assigned to you must include the following permissions to use each tool:
| Tool | Required permissions |
|---|---|
| `search_datadog_security_signals` | `Security Signals Read` |
| `security_findings_schema` | `Security Monitoring Findings Read` |
| `analyze_security_findings` | `Security Monitoring Findings Read`, `Timeseries` |
| `search_security_findings` | `Security Monitoring Findings Read` |

This repeats information in the list of tools; I don't think we need to restate it.

## Further reading

{{< partial name="whats-next/whats-next.html" >}}

[1]: /bits_ai/mcp_server/
[2]: https://modelcontextprotocol.io/
[3]: /getting_started/site/
[4]: /bits_ai/mcp_server/setup/
Loading