Skip to main content

MCP server for the ThreatLocker Portal API

Project description

ThreatLocker MCP

PyPI version PyPI - Python Version License: MIT CI

threatlocker-mcp is a Model Context Protocol server that connects AI assistants such as Claude Desktop and Claude Code with the ThreatLocker Portal API. 44 tools — generated directly from the official OpenAPI 3.0 spec — give your AI assistant programmatic access to computers, approvals, action logs, tags, maintenance mode, reports, and more, across single-org and parent/child tenant setups.

[!IMPORTANT] Unofficial project. This is an independent, community-built MCP server developed against ThreatLocker's published API documentation. It is not an official ThreatLocker product and is not affiliated with, endorsed by, or supported by ThreatLocker, Inc. "ThreatLocker" is a trademark of ThreatLocker, Inc. For official support of the ThreatLocker platform itself, contact ThreatLocker directly.

[!WARNING] Beta software — not yet recommended for production environments. This project is under active development. The tool surface and individual tool body shapes may still change between minor versions, and not every endpoint has been exhaustively exercised against every tenant configuration. Use against a lab or non-production tenant until you're confident in the behavior for your use case.

This server can also perform destructive actions against your ThreatLocker environment. Tools can enable/disable endpoint protection, approve security requests, modify tag membership, end active maintenance windows, approve storage devices, and move computers between organizations. A hallucinated tool argument from your AI assistant could alter your ThreatLocker configuration in ways that affect endpoint security.

Recommended posture:

  • Try the server against a non-production or lab tenant first.
  • Use a ThreatLocker API key scoped to the minimum permissions your use case requires.
  • Review every destructive tool call before allowing execution. Claude Desktop requires tool-call approval by default — keep that enabled.
  • Treat the API key with the same care as portal admin credentials, because functionally it is one.
  • The HTTP transport binds to 127.0.0.1 by default. Do not expose it to the public internet without adding authentication.

Tools

Area Count Capabilities
Computers 9 Search, get/edit details, enable/disable protection, update maintenance mode, baseline rescan, move between orgs, finish active maintenance
Approval Requests 11 Search, get by ID, count pending, get permit details, approve, reject, ignore, take ownership, storage approval read/permit, file download details
Application 5 Get by ID, get matching list, list available apps for permit-into, list apps for maintenance mode, research details
Action Log 4 Search by parameters, get by ID, file history, file download details
Maintenance Mode 4 Get schedule by computer, insert, end by ID, reschedule end time
Tag 3 Get by ID, dropdown options by org, update
System Audit 2 Search by parameters, health center
Computer Groups 2 Get groups with computers, dropdown by org
Policy 1 Get by ID
Online Devices 1 Get by parameters
Reports 1 Get by organization
Organization 1 list_organizations — discover org GUIDs this API key can target

All request bodies are typed Pydantic models (63 generated from the spec), so the AI assistant receives full schema validation and autocomplete. The wire format preserves the original camelCase field names expected by the API.

Quick Start

Install

Using uv (recommended)

uv tool install threatlocker-mcp

Using pip

pip install threatlocker-mcp

Configure

Set the required environment variables (or place them in a .env file in the directory where you launch the server):

export THREATLOCKER_API_KEY="your-api-key"
export THREATLOCKER_ORG_ID="your-default-org-guid"
export THREATLOCKER_BASE_URL="https://portalapi.h.threatlocker.com"
Variable Required Default Description
THREATLOCKER_API_KEY API key from ThreatLocker Portal → Modules → API
THREATLOCKER_ORG_ID Default organization GUID. Find it in the portal URL after switching into the target org.
THREATLOCKER_BASE_URL Portal API base URL. Use the same subdomain letter shown in your portal (.h., .g., .e., etc.) — e.g. https://portalapi.h.threatlocker.com
THREATLOCKER_TIMEOUT 30 Per-request timeout in seconds
LOG_LEVEL INFO Logging verbosity: DEBUG / INFO / WARNING / ERROR
MCP_HTTP_HOST 127.0.0.1 Bind host for the HTTP transport
MCP_HTTP_PORT 8765 Bind port for the HTTP transport

Run

threatlocker-mcp

By default the server runs in stdio mode (the transport MCP clients like Claude Desktop expect). For HTTP transport:

threatlocker-mcp --transport http --port 8765

Editor Integration

Claude Desktop with uvx (recommended)

Add the following block to your Claude Desktop configuration file:

  • Windows: %APPDATA%\Claude\claude_desktop_config.json
  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
{
  "mcpServers": {
    "threatlocker": {
      "command": "uvx",
      "args": [
        "threatlocker-mcp"
      ],
      "env": {
        "THREATLOCKER_API_KEY": "your-api-key",
        "THREATLOCKER_ORG_ID": "your-default-org-guid",
        "THREATLOCKER_BASE_URL": "https://portalapi.h.threatlocker.com"
      }
    }
  }
}

Fully quit Claude Desktop (tray icon → Quit on Windows; ⌘Q on macOS), then reopen it. uvx resolves and caches the package on first launch; subsequent launches are nearly instant.

Pinning to a specific version

"args": ["threatlocker-mcp@0.2.1"]

Forcing a refresh

"args": ["--refresh", "threatlocker-mcp"]

Multi-Organization Usage

Every tool accepts two optional parameters for targeting specific organizations in a parent/child tenant hierarchy:

  • organization_id — overrides the ManagedOrganizationId request header. When omitted, THREATLOCKER_ORG_ID is used.
  • override_organization_id — sets the OverrideManagedOrganizationId header for scenarios that require both headers simultaneously.

Finding child org GUIDs: Call list_organizations first — optionally with search_text to filter by display name — to enumerate every org this API key can target. Org GUIDs can also be read from the portal URL while switched into each child org.

Example Prompts

Investigate denied activity:

"Search the action log for any denied executions on hostname SRV-DB-01 in the last 24 hours."

→ Calls action_log_get_by_parameters_v2 with an ActionLogParamsDto.

Review pending approvals:

"Show me all pending approval requests for the Cloud Services org."

→ Calls approval_request_get_by_parameters with organization_id=<cloud-svc-guid>.

Approve a request:

"Approve request abc-123 at computer scope with the note 'verified vendor'."

→ Calls approval_request_permit_application with a PermitApplicationDto.

Schedule maintenance:

"Put workstation WS-FINANCE-04 into maintenance mode for the next two hours."

→ Calls maintenance_mode_insert with a MaintenanceModeInsertDto.

Manage tags:

"Add corporate-vpn.example.com to the existing 'Corporate VPN' network tag."

→ Calls tag_get_dropdown_options_by_organization_id and tag_update.

License

MIT — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

threatlocker_mcp-0.2.1.tar.gz (59.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

threatlocker_mcp-0.2.1-py3-none-any.whl (37.2 kB view details)

Uploaded Python 3

File details

Details for the file threatlocker_mcp-0.2.1.tar.gz.

File metadata

  • Download URL: threatlocker_mcp-0.2.1.tar.gz
  • Upload date:
  • Size: 59.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for threatlocker_mcp-0.2.1.tar.gz
Algorithm Hash digest
SHA256 60f060d7d6e0ca52bf04e6221ece1a81f6c9232e26c19b95f1a4bc1805cb2882
MD5 3b4679972e7f4c8b8211e008f086fb8b
BLAKE2b-256 f08b29c622517b1da61769fba4aa8d2c740aaaa94d61707524d07a190f6fd3e3

See more details on using hashes here.

Provenance

The following attestation bundles were made for threatlocker_mcp-0.2.1.tar.gz:

Publisher: release.yml on Space-C0wboy/ThreatLocker-MCP

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file threatlocker_mcp-0.2.1-py3-none-any.whl.

File metadata

File hashes

Hashes for threatlocker_mcp-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 e01f3d444c22cccfd8d62629ae62812cfb72665ce0fe1ff0215e3c87cecac88a
MD5 603ab15a1ee516684a4a32aae49b9c32
BLAKE2b-256 404f19a9218adada32197b12e2173449cf4f15c15d3720847dc1ef02cadbd8cd

See more details on using hashes here.

Provenance

The following attestation bundles were made for threatlocker_mcp-0.2.1-py3-none-any.whl:

Publisher: release.yml on Space-C0wboy/ThreatLocker-MCP

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page