Unisys Zero Trust Security Operations
Zero trust security operations workflow for dynamic endpoint and user isolation, security incident response, and Stealth network management. Used by security operations teams, SIEM/SOAR platforms, and incident response workflows integrating Unisys Stealth zero trust network segmentation.
What You Can Do
MCP Tools
get-stealth-roles
Retrieve Stealth network role configurations for use in isolation requests
isolate-endpoint
Isolate a compromised or suspected endpoint from the Stealth zero trust network
unisolate-endpoint
Restore a previously isolated endpoint to normal Stealth network access
isolate-user
Isolate a compromised or suspected user from the Stealth zero trust network
unisolate-user
Restore a previously isolated user to normal Stealth network access
isolate-machine-and-user
Simultaneously isolate both an endpoint and user in response to a security incident
unisolate-machine-and-user
Simultaneously restore both an endpoint and user to normal Stealth network access