Tracecat

Palo Alto Networks MCP server

Triage Cortex XSIAM incidents and run XQL queries from your AI agents.

Network
http
Official docs

About

Connect Tracecat to Palo Alto Networks to ground an AI SOC analyst in the same APIs the Cortex UI uses for XSIAM and Cortex XDR investigations. You can pull an alert, triage the incident, and run an XQL query against the data lake from a workflow. From there, isolate a Cortex XDR endpoint, update incident status, and add a comment with the evidence the agent gathered, all scoped to a least-privilege custom role inside your XSIAM tenant.

Setup

  1. 1

    Create an API key

    The Cortex MCP server authenticates with a Cortex XSIAM API key and key ID, scoped to a role inside your XSIAM tenant. Tokens carry the role's permissions, so create the key under a least-privilege custom role.

  2. 2

    Select the Palo Alto Networks tile in the Tracecat MCP catalog

    Open the MCP catalog in your workspace, select the Palo Alto Networks tile, and paste your API key.

  3. 3

    Enable Palo Alto Networks in your agent

    In your ai.agent action or Agents tools tab, select Palo Alto Networks from the MCP integrations dropdown.

Tools

get_incidentRetrieve a Cortex XSIAM incident with alerts, key artifacts, and assignee.
list_incidentsList XSIAM incidents filtered by status, severity, and time range.
update_incidentUpdate incident status, severity, assignment, or notes.
run_xql_queryExecute an XQL query against XSIAM data lake and return tabular results.
get_endpointFetch endpoint details from Cortex XDR or XSIAM by host or agent ID.
isolate_endpointIsolate a Cortex XDR endpoint as part of an incident response runbook.
list_alertsList alerts with filters for source, severity, MITRE technique, and time.
add_incident_commentAdd an analyst or agent comment to an XSIAM incident for traceability.

Deploy the Palo Alto Networks MCP server in minutes

Connect your security agents to 50+ hosted MCP servers.

Self-host free