How to Use MCP to Optimize Your Graylog Security Detections

How to Use MCP to Optimize Your Graylog Security Detections

Security teams face a critical question: “What logs should we collect, and what detections should we enable to protect against threats targeting our industry?”

For a bank in the northeast, this isn’t academic. Threat groups like FIN7, Lazarus Group, and Carbanak specifically target financial institutions with sophisticated attacks ranging from SWIFT compromise to ransomware. But translating threat intelligence reports into actionable security configurations has traditionally been a manual, time-consuming process.

 

The Solution: Graylog + Model Context Protocol

The Model Context Protocol (MCP) bridges this gap by connecting AI assistants like Claude directly to Graylog . This enables real-time, context-aware recommendations based on your actual environment and current threat landscape.

What is MCP?

MCP is an open protocol developed by Anthropic that allows AI assistants to securely connect to external systems and services. Think of it as a universal adapter that lets Claude “see” and interact with your security tools in real-time.

 

Real-World Example

A security administrator asked a simple question:

“I am a bank in the north east, what data sources and Graylog Illuminate content should I enable to run detections based on threat adversaries that could target me?”

With this simple prompt, Anthropic was able to reason that it needed to understand the threat landscape and map this to current log sources and enabled threat detection content in their Graylog deployment. MCP tools developed by Graylog allow Claude to understand how to “talk” to Graylog, allowing for accurate analysis and not broad generalizations or guesswork.

Initial Step: Understand the threat landscape

It is challenging for lean security teams to perform all of their duties and stay current on the latest threat groups, their campaigns, and the specific tactics used in these campaigns. Based on the prompt, Claude performed research to recognize specific threat actors that target financial institutions.

 

Major Threat Groups

 

Step 1: Mapping threat actor tactics to Graylog detection content

Claude, using MCP, recognized there are specific tools developed by Graylog for this analysis. Using get_mitre_threat_coverage and list_illuminate_content_packs, Claude can now compare and reason about threat actor tactics and enabled Graylog content.

 

Critical Data Sources to Enable

 

Step 2: Add Key Log sources

Claude’s visibility into the data streams in Graylog and threat actor tactics allowed for the Large Language Model to reason on which additional data sources will enhance coverage most effectively.

 

Mitre Att&ck Coverage For Banking

 

The Action Plan

Equipped with the research on threat actors and their tactics and an assessment of Graylog’s enabled detection content and log sources, Claude developed a multi-week  action plan prioritizing low hanging fruit (e.g. disabled content that aligns with current log sources and missing log sources critical to detecting idenfified threat actor tactics.

 

Summary

 

The Value Proposition

For Security Teams

Before MCP:

  • Read threat intelligence reports manually
  • Cross-reference MITRE ATT&CK framework
  • Navigate Graylog UI to find relevant content packs
  • Guess which logs matter for specific threats
  • Time required: Hours to days

With MCP:

  • Natural language question about threats
  • Instant analysis of current configuration
  • Gap analysis against threat actor TTPs
  • Prioritized, actionable recommendations
  • Time required: Seconds

Business Impact

  • Faster threat response: Configure detections before attacks occur
  • Optimized security spend: Focus log collection on high-value sources
  • Reduced analyst burnout: AI handles research, humans make decisions
  • Compliance alignment: Automatic mapping to regulatory requirements (GLBA, PCI-DSS, NYCRR 500)

 

MCP Tools Used

A nice feature of MCP is that it leverages tools without any required input from a user. The LLM discovers and invokes appropriate tools based on the prompt, with explicit permission by the user to leverage the tools. For this analysis, Claude leveraged these Graylog MCP tools:

Tool Purpose Insight Gained
get_mitre_threat_coverage Assess MITRE ATT&CK coverage Only 59% of Sigma rules enabled
list_illuminate_content_packs Inventory available detection content 88 content packs available, many relevant ones disabled
list_new_security_events Review active detections Already detecting suspicious Office child processes, credential abuse
list_inputs Analyze data ingestion Good Windows/Office 365 coverage, missing EDR
list_streams Understand data routing 30+ streams configured, need Linux monitoring

 

Setup: How to Enable This Capability

Requirements

  1. Graylog Security (v7.0+) with MCP enabled
  2. MCP-enabled client, e.g. Claude Code (Anthropic’s CLI) or Claude Desktop app
  3. API Token from your Graylog instance

Configuration Steps

  1. Install Claude Code:

npm install -g @anthropic-ai/claude-code

  1. Configure Graylog MCP Server:
    Create ~/.config/claude-code/mcp_config.json:
    {
      "mcpServers": {
        "graylog": {
          "command": "npx",
          "args": ["-y", "@graylog/mcp-server-graylog"],
          "env": {
            "GRAYLOG_API_URL": "https://preview.graylog.cloud/api",
            "GRAYLOG_API_TOKEN": "your-api-token-here"
          }
        }
      }
    }
  2. Start asking questions:

claude-code

I’m a healthcare provider, what detections should I enable for ransomware?
> Show me security events related to our highest-risk assets
> What Sigma rules detect credential dumping in my environment?

 

Advanced Use Cases

1. Threat-Informed Architecture Review

“Analyze my current log sources against APT41 tactics and recommend improvements”

2. Compliance Mapping

“Which Illuminate content packs help with PCI-DSS requirement 10 (logging and monitoring)?”

3. Incident Response Acceleration

“Show me all security events related to asset LAPTOP-ABC123 in the last 7 days”

4. Detection Engineering

“Create an investigation for these three security events and assign to the SOC team”

 

Real Results

In the banking example, Claude identified:

  • 3 missing critical data sources (EDR, Zeek, DNS monitoring)
  • 77 disabled Sigma rules that detect banking-specific threats
  • Specific adversary TTPs (FIN7 Cobalt Strike, Lazarus SWIFT attacks)
  • Prioritized action plan (Phase 1: Today, Phase 2: This Week, Phase 3: This Month)

The administrator went from “I don’t know what to enable” to a concrete implementation roadmap in under 60 seconds.

 

The Future of Security Operations

MCP represents a fundamental shift in how security teams interact with their tools. Instead of navigating complex UIs and documentation, you have a conversation with an AI that understands:

  • Your current security posture
  • Industry-specific threats
  • Detection engineering best practices
  • Compliance requirements
  • Budget and resource constraints

 

This isn’t about replacing security analysts—it’s about amplifying their expertise and freeing them to focus on strategic decisions rather than tactical research.

Learn More:

Seth Goldhammer
Seth Goldhammer: VP of Product Management

Get the Monthly Tech Blog Roundup

Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.