This repository contains a collection of Model Context Protocol (MCP) servers for Check Point security platforms, implemented in TypeScript. Each MCP server is organized as a separate package within this monorepo structure.
Model Context Protocol (MCP) servers expose a structured, machine-readable API for your enterprise data—designed for AI-powered automation, copilots, and decision engines. By delivering a clear, contextual slice of your security environment, MCP lets you query, analyze, and optimize complex systems without building custom SDKs or parsing raw exports.
Security policies often span hundreds of rules and thousands of objects across diverse enforcement points. Understanding, auditing, or optimizing these environments is slow and error-prone.
MCP changes this: exposing security management data in a modular, context-rich format, ready for AI systems to consume. Enabling the AI to use your data with precision. Ask real-world questions, and get structured, actionable answers—instantly.
This monorepo is organized with each Check Point security domain as a separate MCP server:
/packages
- Contains all MCP server implementations and shared libraries/management
- Management API MCP server for policy and object management/infra
- Shared infrastructure components and utilities/management-logs
- Management Logs MCP server for Check Point products/threat-prevention
- Management API MCP Server for Threat Prevention policies/https-inspection
- Management API MCP Server for Https Inspection policies/harmony-infra
- Shared infrastructure components for Harmony products/harmony-sase
- Harmony SASE MCP Server for SASE policy management/mcp-utils
- Shared utilities for Check Point MCP servers/reputation-service
- Reputation MCP Server/gw-cli-base
- Base Infra for running Gateways scripts/gw-cli
- Gateway Script MCP Server for Information, Perfomance and Diagnostics/gw-cli-connection-analysis
- Gateway Script MCP Server to Analyze Connection Issues/threat-emulation
- Threat Emulation MCP server for malware analysis and file scanning
The following MCP servers are available in this repository:
MCP Server | Package Name | Description |
---|---|---|
Management | @chkp/quantum-management-mcp |
Query policies, rules, objects, and network topology |
Management-logs | @chkp/management-logs-mcp |
Make queries and gain insights from connection and audit logs |
Threat-Prevention | @chkp/threat-prevention-mcp |
Query Threat Prevention policies, profiles and indicators, view IPS updates and IOC feeds |
HTTPS-Inspection | @chkp/https-inspection-mcp |
Query Https Inspection policies, rules and exceptions |
Harmony sase | @chkp/harmony-sase-mcp |
Query and manage Harmony SASE Regions, Networks, Applications and configurations |
Reputation service | @chkp/reputation-service-mcp |
Query Url, IP and File Reputaions |
GW CLI | @chkp/quantum-gw-cli-mcp |
Provides comprehensive diagnostics and analysis across hardware, network configuration, high availability, performance, security, and real-time connection debugging |
GW CLI connection analysis | @chkp/quantum-gw-connection-analysis-mcp |
Provides debug logs to help analyze connection issues |
Threat emulation | @chkp/threat-emulation-mcp |
Analyze files for malware and threats using Check Point's cloud services |
Here's an example of how to configure the Management MCP server in your MCP client:
{
"MCP-NAME": {
"command": "npx",
"args": [
"@chkp/MCP_NPM_PACKAGE"
],
"env": {
// Specific server configuration
}
}
}
Each MCP server has its own specific configuration requirements. Please refer to the individual package README files for detailed setup instructions.
To work with this repository:
# Clone the repository
git clone [repository-url]
# Install dependencies
npm install
# Build all packages
npm run build
This project uses Nx for managing the monorepo. You can use Nx commands to run tasks for specific packages:
# Run @chkp/management in development mode
npx nx run @chkp/management:dev
# Run https-inspection in development mode
npx nx run @chkp/https-inspection:dev
# Build https-inspection server
npx nx build @chkp/https-inspection
# Build threat-prevention server
npx nx build @chkp/threat-prevention
# Run tests for a specific package
npx nx run @chkp/infra:test
# Run tests for all packages
npx nx run-many --target=test
# Show project graph
npx nx graph
# List all available projects
npx nx show projects
# Build all packages
npx nx run-many --target=build
# Lint all packages
npx nx run-many --target=lint
- Authentication keys and credentials are never shared with the model. They are used only by the MCP server to authenticate with your Check Point management system.
- Only use client implementations you trust. Malicious or untrusted clients could misuse your credentials or access data improperly.
- Queried Data will be exposed to the model. Ensure that you only use models and providers that comply with your organization’s policies for handling sensitive data and PII.