Pick a scenario. Every chat below runs against the Senserva Zava Demo, which you can easily create once you get a key and download Siemserva. Names, counts, and findings are the actual deterministic output of the demo, not your tenant.
Conversations above run against the Zava Demo tenant in Senserva's demo database: 1,000 users, 4 Global Admins, 8 Conditional Access policies, 39 Maester tests, 12 narrative findings. Deterministic, repeatable, fictional.
Model Context Protocol is the plug. Senserva is the socket. Register once, then ask Claude anything about your Microsoft 365 and Entra ID posture.
The Senserva MCP server ships with Siemserva. It exposes your scan data, identity graph, patch state, and remediation catalog as native Claude tools. Claude calls them on demand, reads the results, and reasons about your environment in plain English.
MCP works in Claude Desktop, in Cursor, in any MCP-aware client, and programmatically via the Claude API. We are also shipping a dedicated Senserva Claude MCP CLI, and a managed Agent is next.
Scan the tenant, query findings, traverse the identity graph, generate reports, score compliance, propose validated remediation, check patch status, and more. Every tool lands the moment you run siemserva-win-x64 demo claude.
Siemserva ships a deterministic 1,000-user demo tenant called Zava Demo. Same seed every time, same names, same numbers. Claude Desktop wires into it the moment you run the installer, so you can ask it anything before you ever connect a real Microsoft 365 and Entra ID tenant.
Two extra demo tenants ship alongside Zava: Contoso Retail (90 users) and Fabrikam Engineering (220 users), so Claude can compare exposure across three tenants without you ever connecting to one. Named narratives baked in: a stale Privileged Role Admin (217 days inactive), a Global Admin with no MFA, a guest-owned service principal with Directory.ReadWrite.All whose credential expires in 21 days, and 11 anonymous SharePoint share links on a single Marketing Assets site.
Senserva's scan database is hybrid by design. The same file holds audit tables for finding-by-finding queries and a typed node + edge graph for relationship traversal. Claude reaches into both through the MCP tool surface.
Audits, CurrentAudit with severity, source tag, control mappingsNode_User, Node_App, Node_Patch, Node_CveEdge_DeviceMissingPatch, Edge_CvePatch, role chains, group nestingFilter and aggregate in tables. Walk relationships in the graph. Same Claude conversation, no schema gymnastics, no separate query language to learn.
First time? Run siemserva-win-x64 with no parameters and the full setup wizard opens. Pick Quick Setup for the demo + Claude MCP path in one keypress.
Download siemserva-win-x64.exe, siemserva-osx-arm64, or siemserva-linux-x64 from the Quick Start. Single signed binary. No separate runtime, no install wizard.
$ siemserva-win-x64 demo claude
One command wires the Senserva MCP server into Claude Desktop and points it at the Zava Demo database. No JSON config to edit by hand.
Open Claude Desktop, start a new chat, ask "what's in this tenant?". The 28 Senserva tools light up under Senserva MCP in the tools panel and Claude calls them on demand.
Senserva Claude MCP. Claude for IT and Security Management. Backed by the Senserva MCP, CLI, and soon a managed agent.
Senserva is a Microsoft MISA Member · Patented Technology · Senserva is Endorsed by the Microsoft Entra, Sentinel, and Intune Teams
These credentials belong to Senserva. They do not imply that Microsoft endorses Anthropic or Claude.
Microsoft 365 and Entra ID security commentary, research notes, and behind-the-scenes posts from the Senserva team.
How Siemserva is built, how the graph is modeled, and how Senserva Trustworthy AI turns raw findings into validated answers.
New posts from the Senserva team. Subscribe on blog.senserva.com or follow along for the latest.