-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Add security MCP tools documentation page #35898
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,103 @@ | ||||||||||||||||||||||||||||||||||
| --- | ||||||||||||||||||||||||||||||||||
| title: Security MCP Tools | ||||||||||||||||||||||||||||||||||
| description: Use AI agents to investigate security signals and analyze security findings with the Datadog MCP Server's security toolset. | ||||||||||||||||||||||||||||||||||
| further_reading: | ||||||||||||||||||||||||||||||||||
| - link: "bits_ai/mcp_server/setup" | ||||||||||||||||||||||||||||||||||
| tag: "Documentation" | ||||||||||||||||||||||||||||||||||
| text: "Set Up the Datadog MCP Server" | ||||||||||||||||||||||||||||||||||
| - link: "bits_ai/mcp_server" | ||||||||||||||||||||||||||||||||||
| tag: "Documentation" | ||||||||||||||||||||||||||||||||||
| text: "Datadog MCP Server" | ||||||||||||||||||||||||||||||||||
| - link: "security/threats/security_signals/" | ||||||||||||||||||||||||||||||||||
| tag: "Documentation" | ||||||||||||||||||||||||||||||||||
| text: "Security Signals" | ||||||||||||||||||||||||||||||||||
| - link: "security/guide/findings-schema/?tab=library_vulnerability" | ||||||||||||||||||||||||||||||||||
| tag: "Documentation" | ||||||||||||||||||||||||||||||||||
| text: "Security Findings" | ||||||||||||||||||||||||||||||||||
| algolia: | ||||||||||||||||||||||||||||||||||
| tags: ["mcp", "mcp server", "security", "security signals", "security findings"] | ||||||||||||||||||||||||||||||||||
| --- | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Overview | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| The [Datadog MCP Server][1] lets AI agents query your security data through the [Model Context Protocol (MCP)][2]. The `security` toolset gives AI clients like Cursor, Claude Code, and OpenAI Codex access to your security signals and findings, so you can investigate threats and analyze your security posture using natural language. | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| <div class="alert alert-info">This page covers the <code>security</code> toolset of the remote Datadog MCP Server. For the Code Security MCP Server, which runs locally and scans source code during development, see <a href="/security/code_security/dev_tool_int/mcp_server/">Code Security MCP Server</a>.</div> | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Quickstart | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| The `security` toolset is not enabled by default. To activate it, add `security` to the `toolsets` parameter when connecting to the Datadog MCP Server for your [Datadog site][3]: | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ```text | ||||||||||||||||||||||||||||||||||
| https://mcp.{{< region-param key="dd_site" >}}/api/unstable/mcp-server/mcp?toolsets=core,security | ||||||||||||||||||||||||||||||||||
| ``` | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| <div class="alert alert-warning">Without <code>?toolsets=security</code> in the URL, the security tools are not available to your AI client — even if the MCP Server is otherwise connected and working.</div> | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| For client-specific setup instructions (Cursor, Claude Code, VS Code, and others), see [Set Up the Datadog MCP Server][4]. | ||||||||||||||||||||||||||||||||||
|
Comment on lines
+29
to
+37
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Use cases | ||||||||||||||||||||||||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I would normally put this information in a subsection under the overview, rather than below the quickstart, so users can use this information to help decide if it's the right solution for them. I'm not sure it's fully necessary, though. If we already provide a list of tools and their descriptions, do we need this information too? I think it's safe to remove, because rather than talking about them in the abstract and then specifics, it's fine to jump straight to specifics. |
||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| The `security` toolset is useful for: | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| - **Triaging security signals**: Ask your AI agent to surface recent high-severity Cloud SIEM signals, App & API Protection alerts, or Workload Protection threats, and get a summary of patterns and affected resources. | ||||||||||||||||||||||||||||||||||
| - **Analyzing your security posture**: Query findings across Cloud Security with SQL to understand the distribution of misconfigurations, vulnerabilities, and identity risks across your environment. | ||||||||||||||||||||||||||||||||||
| - **Investigating specific findings**: Retrieve full details for a set of findings to understand scope, affected resources, and remediation context. | ||||||||||||||||||||||||||||||||||
| - **Correlating signals and findings**: Cross-reference active security signals with open findings to determine whether an alert is tied to a known posture issue. | ||||||||||||||||||||||||||||||||||
| - **Remediating vulnerabilities with an AI agent**: Pull library vulnerability findings — which include code location and remediation guidance — and pass them to your AI agent to apply patches directly in your codebase. | ||||||||||||||||||||||||||||||||||
|
Check warning on line 47 in content/en/security/mcp_server.md
|
||||||||||||||||||||||||||||||||||
|
Comment on lines
+41
to
+47
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
I find this easier to skim if all the verb forms are consistent 🤓 |
||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Available tools | ||||||||||||||||||||||||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This doesn't explain what a tool is or how to use one, which I'm concerned could be confusing. I'd add a sentence or two of intro material here that provides some background information and links to usage instructions on the main MCP page. |
||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| `search_datadog_security_signals` | ||||||||||||||||||||||||||||||||||
| : Searches and retrieves security signals from Datadog, including Cloud SIEM signals, App & API Protection signals, and Workload Protection signals. Use this to surface and investigate suspicious activity. | ||||||||||||||||||||||||||||||||||
| : *Permissions required: `Security Signals Read`* | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| `security_findings_schema` | ||||||||||||||||||||||||||||||||||
| : Returns the available fields and their types for security findings. Call this before using `analyze_security_findings` to discover which fields you can filter and group by. Supports filtering by finding type. | ||||||||||||||||||||||||||||||||||
| : *Permissions required: `Security Monitoring Findings Read`* | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| `analyze_security_findings` | ||||||||||||||||||||||||||||||||||
| : Primary tool for analyzing security findings using SQL. Queries live data from the last 24 hours with support for aggregations, filtering, and grouping. Call `security_findings_schema` first to discover available fields. | ||||||||||||||||||||||||||||||||||
| : *Permissions required: `Security Monitoring Findings Read`, `Timeseries`* | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| `search_security_findings` | ||||||||||||||||||||||||||||||||||
| : Retrieves full security finding objects. Use this when you need complete finding details or when SQL-based analysis is not sufficient. Prefer `analyze_security_findings` for most analysis tasks. | ||||||||||||||||||||||||||||||||||
| : *Permissions required: `Security Monitoring Findings Read`* | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Example prompts | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| After you connect, try prompts like: | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| **Signals:** | ||||||||||||||||||||||||||||||||||
| - Show me security signals from the last 24 hours. | ||||||||||||||||||||||||||||||||||
| - Find high-severity signals related to my production environment. | ||||||||||||||||||||||||||||||||||
| - List Cloud SIEM signals triggered by suspicious login attempts. | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| **Findings:** | ||||||||||||||||||||||||||||||||||
| - What fields are available for security findings? | ||||||||||||||||||||||||||||||||||
| - Show me the top 10 rules with the most critical findings. | ||||||||||||||||||||||||||||||||||
| - Count open findings grouped by severity and finding type. | ||||||||||||||||||||||||||||||||||
| - Find library vulnerabilities with exploits available, grouped by resource. | ||||||||||||||||||||||||||||||||||
| - Get full details for critical findings in my AWS environment. | ||||||||||||||||||||||||||||||||||
| - List all open identity risk findings with full metadata. | ||||||||||||||||||||||||||||||||||
| - Get open library vulnerability findings with code locations and remediation guidance so I can patch them. | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| ## Required permissions | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| The Datadog role assigned to you must include the following permissions to use each tool: | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| | Tool | Required permissions | | ||||||||||||||||||||||||||||||||||
| |---|---| | ||||||||||||||||||||||||||||||||||
| | `search_datadog_security_signals` | `Security Signals Read` | | ||||||||||||||||||||||||||||||||||
| | `security_findings_schema` | `Security Monitoring Findings Read` | | ||||||||||||||||||||||||||||||||||
| | `analyze_security_findings` | `Security Monitoring Findings Read`, `Timeseries` | | ||||||||||||||||||||||||||||||||||
| | `search_security_findings` | `Security Monitoring Findings Read` | | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
|
Comment on lines
+85
to
+95
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
This repeats information in the list of tools; I don't think we need to restate it. |
||||||||||||||||||||||||||||||||||
| ## Further reading | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| {{< partial name="whats-next/whats-next.html" >}} | ||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||
| [1]: /bits_ai/mcp_server/ | ||||||||||||||||||||||||||||||||||
| [2]: https://modelcontextprotocol.io/ | ||||||||||||||||||||||||||||||||||
| [3]: /getting_started/site/ | ||||||||||||||||||||||||||||||||||
| [4]: /bits_ai/mcp_server/setup/ | ||||||||||||||||||||||||||||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I know this isn't the actual title of the linked page, but I think it helps to have a similar level of detail between the two MCP links.