MCP Endpoint Shield

MCP Endpoint Shield provides runtime security and auto-discovery of local MCP servers configured on your machine. It acts as a protective layer between the MCP client (e.g., Cursor, VS Code, Claude) and the MCP servers—requiring no changes to your setup.


✨ Features

  • ✅ Continuous safety checks on all requests and responses to the MCP servers

  • ✅ Automatic blocking of unsafe interactions (via standard JSON-RPC errors)

  • ✅ Works out-of-the-box with popular MCP clients (Cursor, VS Code, Claude)

  • ✅ Zero changes required in your MCP server


📦 Installation

  • The application is provided as an installble package (.app, .deb, .exe)

  • Please reach out to Akto Support to get your installer.

  • Please refer to the Manaul Run section if you wish to run the tool without an installer


🏢 MDM Support

Akto MCP Endpoint Shield provides enterprise-grade Mobile Device Management (MDM) support for seamless deployment and centralized management across your organization's devices.

Why MDM Integration Matters

In enterprise environments, manually configuring security tools on hundreds or thousands of developer machines is impractical. MDM support enables:

  • Zero-touch deployment across all managed devices

  • Centralized configuration and policy management

  • Automated updates and patch management

  • Compliance enforcement and audit trails

  • Remote monitoring of security posture

Supported MDM Platforms

Akto MCP Endpoint Shield integrates with leading MDM solutions:

  • Microsoft Intune (Windows, macOS)

  • Jamf Pro (macOS, iOS)

  • Workspace ONE (VMware)

  • Kandji (macOS)

  • Mosyle (Apple devices)

  • ManageEngine (Cross-platform)

  • IBM MaaS360

  • Any standard MDM supporting package deployment

Key MDM Capabilities

1. Automated Deployment

  • Silent installation without user interaction

  • Pre-configured API tokens pushed via MDM profiles

  • Automatic service startup on device enrollment

  • Version control and automated updates

2. Centralized Configuration

  • Configuration profiles for standard settings

  • Environment variables managed via MDM

  • Policy enforcement (blocking vs. monitoring mode)

  • Custom server lists and whitelist management

3. Compliance & Monitoring

  • Health check reporting back to MDM console

  • Installation verification via scripts

  • Log collection for security audits

  • Compliance dashboards in Akto platform


🚀 MDM Deployment Guide

Prerequisites

  • Active Akto account with API token

  • MDM platform with package deployment capability

  • Administrator access to MDM console

  • MCP Endpoint Shield installer package (.pkg for macOS, .msi for Windows, .deb for Linux)

Step 1: Prepare the Installation Package

For macOS (Jamf Pro, Intune, Kandji)

1.1 Download the installer:

  • Contact Akto Support to get akto-mcp-endpoint-shield.pkg

  • The .pkg file is signed and notarized by Apple for secure installation

  • Developer ID: Akto, Inc.

  • Notarization: Apple-verified for Gatekeeper compatibility

  • Upload to your MDM file repository

Why signing and notarization matters:

  • Passes Gatekeeper checks on macOS 10.15+ without manual overrides

  • No security warnings during installation

  • Compatible with MDM silent installs (no user interaction required)

  • Trusted by Apple - package integrity verified

  • Meets enterprise security policies for managed devices

1.2 Create a configuration profile:

1.3 Upload to MDM:

  • Navigate to Configuration Profiles section

  • Upload the .plist configuration

  • Assign to target device groups

For Windows (Intune, ManageEngine)

1.1 Download the installer:

  • Contact Akto Support to get akto-mcp-endpoint-shield.msi

  • Upload to your MDM software repository

1.2 Create installation script:

1.3 Configure in Intune:

  • Go to AppsWindows appsAdd

  • Select Line-of-business app

  • Upload the .msi file

  • Add the PowerShell script as a post-install action

  • Assign to device groups

For Linux (Fleet, Canonical Landscape)

1.1 Download the installer:

1.2 Create deployment script:

1.3 Deploy via MDM:

  • Use your MDM's script execution capability

  • Schedule deployment to target device groups

  • Set execution frequency (one-time for new devices)

Step 2: Configure Auto-Discovery Settings

The agent will automatically discover and protect MCP servers. However, you can customize behavior via MDM-managed configuration files.

Create Custom Policy File

Location: /etc/akto-mcp-endpoint-shield/policy.json (Linux/macOS) or C:\ProgramData\Akto\mcp-endpoint-shield\policy.json (Windows)

Example policy:

Deploy Policy via MDM

For Jamf:

For Intune:

  • Create a Device Configuration Profile

  • Use Custom Settings for file deployment

  • Upload policy.json to target path

Step 3: Deploy to Target Devices

Scope Configuration

Define device groups:

  • Engineering_Developers → Full deployment with auto-wrap enabled

  • Security_Team → Deployment with audit mode enabled

  • Contractors → Strict blocking mode with limited allowlist

Example Jamf Smart Group:

Deployment Schedule

Staged rollout recommended:

  1. Pilot group (10-20 users) → Week 1

  2. Early adopters (100 users) → Week 2

  3. Full deployment → Week 3+

Installation Command Examples

Jamf:

Intune:

Fleet:

Step 4: Verify Deployment Status

Check Installation via MDM Console

For Jamf Pro:

  1. Navigate to ComputersInventory

  2. Search for application: Akto MCP Endpoint Shield

  3. View Installation Status and Version

For Microsoft Intune:

  1. Go to AppsAll appsAkto MCP Endpoint Shield

  2. Check Device install status

  3. Review Installation errors if any

Automated Health Check Script

Deploy this script via MDM to verify installation:

macOS/Linux:

Windows:

Schedule in MDM:

  • Frequency: Daily

  • Remediation: Auto-restart service if failed

  • Alerting: Notify security team on repeated failures

Step 5: Monitor and Maintain

Centralized Logging

Configure log forwarding to SIEM:

For Splunk:

For Azure Sentinel:

Update Management

Automatic updates via MDM:

Jamf Patch Management:

  1. Subscribe to Akto MCP Shield patch definition

  2. Set auto-update policy: Install updates within 7 days

  3. Test updates on pilot group first

Intune Update Ring:

Compliance Reporting

Key metrics to track:

  • Installation success rate (target: >95%)

  • Agent uptime (target: >99%)

  • Policy violations detected per device

  • Blocked threats count

  • Configuration drift incidents

View in Akto Dashboard:

  • Navigate to MCP ShieldEnterprise Console

  • Filter by MDM deployment group

  • Export compliance reports for audits


🔐 Enterprise Best Practices for MDM Deployments

1. Token Management

  • Use dedicated service accounts for API tokens

  • Rotate tokens every 90 days via automated scripts

  • Store tokens in MDM secrets vault (e.g., Azure Key Vault, AWS Secrets Manager)

  • Never hardcode tokens in configuration files

2. Network Considerations

  • Allow outbound HTTPS to *.akto.io on port 443

  • Whitelist proxy settings if using corporate proxy

  • Configure firewall rules for HTTP proxy (port 57294)

  • Use VPN for remote workers

3. User Communication

  • Pre-deployment announcement explaining the security enhancement

  • Documentation with FAQs and support contact

  • Training sessions for power users

  • Feedback channel for reporting issues

4. Rollback Strategy

  • Keep previous version available in MDM repository

  • Test rollback procedure on pilot devices

  • Document rollback steps for IT helpdesk

  • Monitor for issues during first 48 hours post-deployment

5. Compliance & Auditing

  • Enable comprehensive logging (audit mode initially)

  • Integrate with SIEM for security monitoring

  • Schedule regular compliance reviews (monthly)

  • Document security incidents and response actions


🔍 Auto-Detection

Akto MCP Endpoint Shield automatically detects MCP client configurations:

  • Cursor → Reads ~/.cursor/mcp.json

  • Visual Studio Code → Reads .vscode/mcp.json inside your workspace

  • Claude Desktop → Reads Claude’s MCP config JSON

For each detected MCP server config:

  1. The JSON file is parsed.

  2. Each server entry is automatically wrapped with Akto MCP Endpoint Shield.

  3. Your MCP clients transparently run through the shield without requiring manual reconfiguration.

👉 You don’t need to manually edit your MCP config files — the wrapper handles this for you.


📄 Example — Cursor mcp.json

Original file (before wrapping):

Automatically wrapped file (after Akto MCP Endpoint Shield):

What changed:

  • mcp-endpoint-shield is now the entry command.

  • Original server command (npx -y chrome-devtools-mcp@latest) is passed through --exec.


🔧 Manual Setup

Follow these steps to manually set up and run MCP Endpoint Shield to protect your MCP servers.

Prerequisites

  • You have the mcp-endpoint-shield binary available

  • You have an Akto API token

  • uninstall MCP Endpoint Shield if installed previously using installers

Step 1: Set Your API Token

Set the AKTO_API_TOKEN environment variable:

Make it permanent (optional):

For bash users, add to ~/.bashrc:

For zsh users, add to ~/.zshrc:

Verify it's set:

Step 2: Start the Agent

The agent automatically discovers and protects your MCP servers.

Expected output:

Keep this terminal running. The agent will:

  • Find your MCP configuration files (Cursor, VS Code, Claude Desktop)

  • Wrap your MCP servers with security

  • Sync security policies from Akto backend

  • Watch for changes and auto-update configs

Note: If you want the agent to run in the background, use:

Step 3: Protecting Local MCP Servers (STDIO)

If the agent is running (Step 2), it will automatically detect and wrap your config. Your MCP configuration will be automatically modified to route through the security shield.

Example transformation:

Before:

After (automatic):

Restart your MCP client (Cursor/VS Code) to apply changes.

Option B: Manual Wrapping (If Not Using Agent)

If you're not running the agent, manually edit your MCP config file (e.g., ~/.cursor/mcp.json):

Before:

After:

Key changes:

  1. Change command to the full path of mcp-endpoint-shield

  2. Add "stdio", "--name", "<server-name>", "--akto-api-token", "<your-token>", "--exec" to the start of args

  3. Place the original command (npx) and arguments (-y, chrome-devtools) after --exec

Restart your MCP client to apply changes.

Step 4: Protecting Remote MCP Servers (HTTP)

For HTTP-based MCP servers, run the HTTP proxy in a new terminal:

Expected output:

Keep this terminal running.

Note: The proxy runs on port 57294 by default.

Configure Your Remote MCP Server

Original config (direct connection to remote server):

Protected config (route through proxy):

Key changes:

  1. Change url to http://localhost:57294/mcp/streamable

  2. Keep your existing Authorization header (or any other headers)

  3. Add new header mcp-server-base-url with the original remote server URL

The proxy will:

  • Receive requests at http://localhost:57294/mcp/streamable

  • Read the mcp-server-base-url header to know where to forward

  • Apply security policies

  • Forward to your actual remote MCP server

  • Return the response back to your client

Restart your MCP client to apply changes.

Step 5: Verify Everything is Working

Check Agent Status

Look at the agent terminal - you should see:

No errors means it's working!

Check HTTP Proxy Status

Look at the proxy terminal:

Test Your MCP Server

Open your MCP client (Cursor, VS Code, Claude Desktop) and try using your wrapped MCP server. It should work normally, but now with security protection.

Quick Command Reference

Terminal 1 - Agent:

Terminal 2 - HTTP Proxy:

Get Help:

This protects:

  • STDIO servers (like npx -y chrome-devtools) via agent

  • HTTP servers (remote MCP servers) via proxy


⚙️ Common Flags

  • --name <project_name> → Friendly label used in logs and insights

  • --akto-api-token <token> → Your Akto API token

  • --exec <command> [args...] → Command to start your MCP server

  • --env KEY=VALUE (repeatable) → Pass additional environment variables to the MCP process


📜 Logging

Log File Locations

Manual Run

When you manually run mcp-endpoint-shield, logs are written to:

Example:

MacOS System Service (LaunchDaemon)

When installed and running as a system service on macOS:

Agent logs:

HTTP Proxy logs:

View logs:

Linux System Service (systemd)

When installed and running as a systemd service on Linux:

Agent logs:

HTTP Proxy logs:

View logs:

STDIO Wrapped MCP servers (Manual and Installer)

Each wrapped STDIO MCP server gets its own log file named after the --name attribute:


🧩 Troubleshooting

Issue: AKTO_API_TOKEN is not set ➡ Cause: Environment variable not configured. ➡ Fix: Set the token with export AKTO_API_TOKEN="your-token" and verify with echo $AKTO_API_TOKEN.

Issue: Port already in use (HTTP Proxy) ➡ Cause: Port 57294 is already being used by another process. ➡ Fix 1: Find and kill the process with lsof -i :57294 and kill -9 PID. ➡ Fix 2: Use a different port with ./mcp-endpoint-shield http --port 8080 and update your config.

Issue: MCP server not working after wrapping ➡ Cause: Multiple possible causes. ➡ Fix:

  1. Restart your MCP client,

  2. Verify binary path with which mcp-endpoint-shield,

  3. Check logs at ~/.akto-mcp-endpoint-shield/logs/ or /var/log/akto-mcp-endpoint-shield/ (if installed using installer)

  4. Test original command works standalone.

Issue: permission denied: ./mcp-endpoint-shield ➡ Cause: Binary doesn't have execute permissions. ➡ Fix: Run chmod +x ./mcp-endpoint-shield.

Issue: command not found: mcp-endpoint-shield ➡ Cause: Binary not in PATH or wrong path used. ➡ Fix: Use full path (./mcp-endpoint-shield or /usr/local/bin/mcp-endpoint-shield) or add to PATH with export PATH=$PATH:/path/to/binary/directory.


🔒 Guarantees

  • Transparency: Safe traffic is never altered.

  • Clarity: Unsafe traffic always results in a clear JSON-RPC error.

  • Minimal footprint: Designed to stay invisible unless an issue occurs.


Get Support for your Akto setup

There are multiple ways to request support from Akto. We are 24X7 available on the following:

  1. In-app intercom support. Message us with your query on intercom in Akto dashboard and someone will reply.

  2. Join our discord channel for community support.

  3. Contact [email protected] for email support.

  4. Contact us here.

Last updated

Was this helpful?