Server data from the Official MCP Registry
MCP server for Datto SaaS Protection — M365/GWS backups, restores, seats.
MCP server for Datto SaaS Protection — M365/GWS backups, restores, seats.
Well-structured MCP server with proper authentication and authorization patterns. Credentials are handled securely via environment variables (env mode) or request headers (gateway mode), with no hardcoded secrets. Permissions align appropriately with the server's purpose of interacting with Datto SaaS Protection APIs. Minor code quality observations around error handling and input validation do not significantly impact security. Supply chain analysis found 3 known vulnerabilities in dependencies (1 critical, 1 high severity).
7 files analyzed · 8 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: DATTO_SAAS_API_KEY
Environment variable: DATTO_SAAS_REGION
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-datto-saas-protection-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"DATTO_SAAS_REGION": "your-datto-saas-region-here",
"DATTO_SAAS_API_KEY": "your-datto-saas-api-key-here"
},
"args": [
"-y",
"@wyre-technology/datto-saas-protection-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
A Model Context Protocol server exposing the Datto SaaS Protection (Backupify) API to Claude and other MCP clients.
Surface SaaS backup posture for your M365 and Google Workspace tenants directly to AI assistants — list customer organizations, inspect protected domains and seats, browse backup history, queue restores, and audit activity logs and license usage.
| Tool | Purpose |
|---|---|
datto_saas_list_clients | List all customer organizations |
datto_saas_list_domains | List protected domains under a client |
datto_saas_list_seats | List seats in a domain (toggle archived) |
datto_saas_get_seat | Fetch a single seat detail |
datto_saas_list_backups | List backup runs for a seat |
datto_saas_queue_restore | Queue a restore (DESTRUCTIVE — requires confirmation) |
datto_saas_get_restore_status | Check restore progress |
datto_saas_list_activity | Org activity log (date-range elicitation) |
datto_saas_get_license_usage | Seat counts vs purchased |
export DATTO_SAAS_API_KEY="..."
export DATTO_SAAS_REGION="us" # or "eu"
The WYRE MCP Gateway injects credentials per request via headers:
X-Datto-SaaS-API-Key (required, secret)X-Datto-SaaS-Region (optional, default us)npm install
npm run build
npm start # stdio
MCP_TRANSPORT=http npm start # HTTP on :8080
Apache 2.0 — see LICENSE.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.