MCP Servers for Security and Network Tools: SentinelOne, Sophos, Meraki, and More
10 min read
Most MCP server guides for MSPs focus on PSA and RMM tools — ConnectWise, NinjaOne, the integrations you touch on every ticket. But the tools where MCP servers create the most dramatic impact are the ones your techs don’t check often enough: security platforms, network management consoles, and documentation systems. A SentinelOne MCP server, a Meraki MCP server, or a Hudu MCP server can surface context that would otherwise sit unseen until someone manually logs in and searches for it.
This is the gap in the current MCP ecosystem for MSPs. We’ve covered building MCP servers across your stack, building a NinjaOne MCP server, and what MCP is at a fundamental level. This post goes deeper on the security, network, and documentation tools that complete the picture — and explains what connecting them to AI actually looks like in practice.
Why Security and Network Context Matters on Every Ticket
Most tickets aren’t security incidents. They’re password resets, printer issues, “my Outlook is slow,” and VPN problems. But a surprising number of those routine tickets have security or network context that changes the response.
A user reporting slow Outlook might have a SentinelOne alert quietly sitting on their endpoint — a detection that hasn’t escalated to a ticket yet but explains the performance issue. A VPN problem might correlate with a Meraki interface flap that happened 20 minutes ago. A “can’t access the shared drive” ticket might be a permissions issue, or it might be a ransomware encryption in progress.
Without security and network context surfaced alongside the ticket, your tech treats every issue at face value. With that context, they catch the 5% of tickets that are actually something more serious — before the situation escalates.
SentinelOne MCP Server: Endpoint Security Context
What the SentinelOne API Offers
SentinelOne has one of the more capable security APIs in the MSP space. The API exposes:
- Threat data — Active threats, threat classification (malware, ransomware, PUP, exploit), mitigation status, and kill chain details
- Agent status — Whether the SentinelOne agent is active, the last scan time, agent version, and whether the device is in a managed policy group
- Device inventory — OS version, hardware details, network interfaces, installed applications
- Isolation controls — The ability to network-isolate a compromised endpoint remotely
- Deep Visibility queries — Raw telemetry queries for process execution, file writes, network connections, and registry modifications
What a SentinelOne MCP Server Would Expose
An MCP server built on this API would let AI answer questions like: “Are there any active threats on this user’s devices?” or “What’s the SentinelOne agent status for all endpoints at Acme Corp?” without a tech logging into the SentinelOne console.
The practical MCP tools would include:
get_threats— Query active and resolved threats for a specific device, user, or clientget_agent_status— Check agent health, last check-in time, and policy complianceisolate_endpoint— Network-isolate a device (with approval workflow)get_device_applications— List installed software on an endpointrun_deep_visibility_query— Execute telemetry queries for investigation
Ticket Scenario
A ticket comes in: “My computer is running really slow since this morning.” Without a SentinelOne MCP server, the tech opens the ticket, maybe checks NinjaOne for CPU and memory usage, and starts a standard troubleshooting workflow.
With a SentinelOne MCP server connected, AI checks the endpoint during triage and finds a threat detected two hours ago — a cryptocurrency miner that SentinelOne quarantined but that spawned child processes before mitigation. The tech opens the ticket and immediately sees: this isn’t a performance issue, it’s a security incident that needs isolation, a full scan, and a client notification.
Sophos MCP Server: Security Alerts and Firewall Context
What the Sophos API Offers
Sophos Central’s Partner API covers endpoint protection and alert management:
- Alert feed — Security alerts with severity, type, and affected device/user
- Endpoint status — Protection status, tamper protection state, last seen timestamp
- Endpoint isolation — Isolate compromised devices, release them, and manage exclusions
- Email quarantine — Quarantined email messages and the ability to release or delete them
Note: Sophos Firewall (XG/XGS) has its own separate API for connection logs, IDS/IPS events, and web filtering. These aren’t part of the Central REST API — they’re accessed via syslog forwarding or the Sophos Firewall API directly.
What a Sophos MCP Server Would Expose
A Sophos MCP server built on the Central API would give AI access to the endpoint security layer — alerts, device health, and isolation controls. For MSPs also managing Sophos Firewalls, a separate integration or syslog pipeline would feed network-layer context.
Key MCP tools:
get_alerts— Active alerts for a client, device, or userget_endpoint_health— Protection status and compliance for managed endpointsget_firewall_events— Recent firewall logs including blocked connections and IDS hitsget_quarantine— Files currently in quarantine with threat classificationsget_web_filter_logs— URL filtering events for a specific user or device
Ticket Scenario
We covered the Sophos + Junto incident response workflow in detail previously. The short version: a Sophos alert fires, AI correlates it with device data from your RMM, user data from M365, and documentation from ITGlue or Hudu — all before the tech opens the ticket. What would take 30-45 minutes of manual context-gathering happens in seconds.
A Sophos MCP server is the building block that makes that possible. Without it, AI can’t answer “has Sophos detected anything on this device?” — and that question is relevant on far more tickets than just security incidents.
Meraki MCP Server: Network Topology and Client Status
What the Meraki API Offers
Meraki’s Dashboard API is one of the most developer-friendly network management APIs available:
- Network topology — Devices, their connections, port status, and VLAN assignments
- Client data — Connected clients, their IP/MAC addresses, traffic usage, and VLAN membership
- Device status — Uptime, firmware version, interface status, and connectivity state for APs, switches, and security appliances
- Event logs — Client connectivity events, DHCP events, configuration changes, and security events
- Outage detection — Device reachability status and historical uptime data
What a Meraki MCP Server Would Expose
A Meraki MCP server would let AI check network health alongside endpoint and security data. For MSPs managing client networks through Meraki, this closes a major context gap on connectivity-related tickets.
Key MCP tools:
get_device_status— Status of all Meraki devices (APs, switches, MX appliances) at a client siteget_client_info— Find a specific client device on the network by MAC, IP, or hostnameget_network_events— Recent network events including connectivity changes and DHCP issuesget_vlan_config— VLAN assignments and subnets for a client networkget_interface_status— Port-level status on switches for troubleshooting connectivity
Ticket Scenario
“Half our office can’t get to the internet.” The tech opens the ticket and sees the description, but has no immediate network context. They log into Meraki, find the client’s network, check device status, check the uplink, look at client connectivity events — that’s 10-15 minutes of investigation before they know what happened.
With a Meraki MCP server, AI checks device status during triage and finds that the client’s MX appliance rebooted 30 minutes ago after a firmware auto-update, and three APs in the east wing are still reconnecting. The tech opens the ticket knowing exactly what happened, which devices are affected, and whether the situation is resolving on its own or needs intervention.
Auvik and UniFi: The Other Network Players
Not every MSP runs Meraki. Auvik and UniFi (via the UniFi Controller API) cover the rest of the network management landscape, and the same MCP server logic applies.
Auvik provides network topology mapping, traffic analysis, and device inventory through its API. An Auvik MCP server would expose real-time network maps, alert data, and device status — giving AI the ability to check whether a client’s network infrastructure is healthy when a connectivity ticket arrives.
UniFi exposes device management, client tracking, and network configuration through its controller API. For MSPs managing UniFi deployments, an MCP server would provide AP status, client connection quality, and switch port data that contextualizes wireless and wired connectivity issues.
The tools differ; the pattern is identical. A network ticket arrives, AI queries the network management platform via MCP, and the tech opens the ticket with infrastructure context already assembled.
Hudu MCP Server: Documentation Without Searching
What the Hudu API Offers
Hudu (and ITGlue, its primary competitor) stores the institutional knowledge that makes MSP work possible — client configurations, SOPs, network diagrams, password vaults, and per-client procedures. The Hudu API exposes:
- Articles — Knowledge base articles searchable by client, category, and keyword
- Asset layouts — Structured data for servers, workstations, network devices, and custom asset types
- Passwords — Credential retrieval (with proper access controls)
- Companies — Client metadata including contacts, SLA details, and configuration profiles
- Procedures — Step-by-step SOPs linked to specific clients or issue types
What a Hudu MCP Server Would Expose
A Hudu MCP server gives AI the ability to look up documentation during triage — the same thing your techs do manually on every ticket, but without the 3-5 minutes of searching and navigation.
Key MCP tools:
search_articles— Find relevant knowledge base articles by keyword and clientget_asset— Retrieve structured asset data (server configs, network layouts, application details)get_passwords— Pull credentials needed for remediation (with audit logging)get_procedures— Find SOPs relevant to the current issue type and clientget_company_info— Client metadata, contacts, and SLA details
Ticket Scenario
A ticket comes in: “Exchange mailbox not syncing on mobile.” The tech needs to know what mail platform this client uses, whether they have conditional access policies, whether there’s a known procedure for this issue, and what the admin credentials are.
With a Hudu MCP server, AI searches Hudu for the client’s email configuration article, finds the relevant SOP for mobile mail troubleshooting, pulls the M365 admin portal credentials, and includes all of that in the triage summary. The tech opens the ticket and has everything they need to start working, without opening Hudu at all.
The Cross-Tool Scenario: Where MCP Servers Compound
The real power isn’t any single MCP server — it’s what happens when security, network, and documentation MCP servers work together.
Here’s a realistic scenario: A Sophos alert fires for a malware detection on a workstation at a healthcare client. AI queries the SentinelOne MCP server for endpoint status and finds the agent is reporting clean — meaning Sophos caught something SentinelOne didn’t, or vice versa, which is critical context. AI checks the Meraki MCP server for network anomalies and finds unusual outbound traffic from that device’s IP in the last hour. AI queries the Hudu MCP server for the client’s incident response procedure and surfaces their HIPAA breach notification requirements and the designated security contact.
All of that context is assembled before a technician sees the ticket. The tech opens it and finds: threat details from Sophos, corroborating (or conflicting) data from SentinelOne, network traffic anomalies from Meraki, the client’s incident response SOP from Hudu, and recommended containment steps. What would have taken 45 minutes of tab-switching and manual searching is done in seconds.
That’s the compounding effect. Each MCP server adds a dimension of context. Together, they give the tech a complete operational picture on every ticket.
Building vs. Buying MCP Servers for Security and Network Tools
If you’ve read our guides on building MCP servers for your MSP stack, you know the trade-offs. Building an MCP server for any of these tools means:
- Learning the vendor’s API, authentication model, and rate limits
- Building multi-tenant isolation so client data never crosses boundaries
- Handling credential management for dozens of client environments
- Maintaining the server as APIs evolve, endpoints deprecate, and authentication methods change
- Ensuring security best practices — because an MCP server that connects to SentinelOne and Sophos is itself a high-value target
For a single tool, that’s a manageable project. For the full security-network-documentation stack — SentinelOne, Sophos, Meraki, Auvik, Hudu — you’re looking at weeks of development and ongoing maintenance.
This is where Junto comes in. Junto provides 19+ pre-built integrations including SentinelOne, Sophos, Meraki, Auvik, and Hudu. The connections are multi-tenant by design, credentials are managed through the platform, and maintenance is handled for you. More importantly, Junto isn’t just the connections — it’s the triage pipeline that runs automatically on every ticket, assembling context from all of these tools into a single briefing your tech can act on immediately.
Here’s what that looks like in practice: a Sophos alert fires for a suspicious process on a workstation at Baker & Associates. Junto’s AI picks up the alert, queries SentinelOne for the endpoint’s full threat timeline, checks Meraki for any unusual network traffic from that device, pulls Baker’s incident response procedure from Hudu, and checks ConnectWise for the device owner and their contact info. Your tech gets a Slack message: “Sophos alert on BAKER-WS-019 — suspicious process svchost32.exe. SentinelOne shows no lateral movement. Meraki shows normal network traffic. Hudu IR procedure: isolate device, notify client IT contact. Runbook ready — approve to isolate?” One click.
You don’t need to build a SentinelOne MCP server, a Sophos MCP server, a Meraki MCP server, and a Hudu MCP server separately. You connect your tools to Junto once, and the AI queries all of them on every ticket where that context is relevant.
What to Do Next
If you’re building MCP servers yourself, start with the tool that creates the most context gap on your tickets. For most MSPs, that’s either the security platform (SentinelOne or Sophos) or the documentation platform (Hudu or ITGlue). Network tools come next — they’re high value on connectivity tickets but lower frequency than security and documentation lookups.
For a broader look at what AI agents for IT can do with this data — from triage to runbook execution — see our practical guide.
If you’d rather skip the build and connect everything at once, book a demo and we’ll show you what cross-tool triage looks like on your actual tickets. Security context, network status, documentation, and device data — all assembled automatically before your tech opens the ticket.
The tools in your stack have the data. The question is whether AI can access it when it matters.