Getting Started
Get up and running with Qualys MCP Server v0.1.0 in under 5 minutes. Connect your AI assistant to Qualys security data and start asking questions in plain English.
Prerequisites
- A Qualys subscription with API access enabled
- Python 3.10+ or the uv package manager
- Claude Desktop or any MCP-compatible AI client
Quick Start
-
Install uv (if you don't have it already):
brew install uvOr on Linux:
curl -LsSf https://astral.sh/uv/install.sh | sh -
Add to Claude Desktop config (
~/Library/Application Support/Claude/claude_desktop_config.json):{ "mcpServers": { "qualys": { "command": "uvx", "args": ["qualys-mcp"], "env": { "QUALYS_USERNAME": "your-username", "QUALYS_PASSWORD": "your-password", "QUALYS_POD": "US2" } } } } - Restart Claude Desktop to pick up the new configuration.
-
Ask a question! Try one of these:
- "Give me a security overview for today"
- "Investigate CVE-2024-3400"
- "What's our overall risk?"
- "Are we PCI compliant?"
The 7 Tools
Qualys MCP v0.1.0 exposes 7 workflow tools to your AI assistant:
- investigate — CVE deep-dive, threat actors, asset investigation, EDR/FIM events, KB search
- assess_risk — cross-domain risk: VMs, cloud, containers, web apps, certificates, assets
- check_compliance — framework posture (PCI, HIPAA, CIS, NIST, SOC2), failing controls, risk acceptances
- plan_remediation — patch priorities, deployment status, mitigation coverage, program gaps
- security_overview — daily/weekly/monthly briefing, scanner health, scan status, ETM findings
- reports — generate, list, download reports
- cache_status — admin cache management