8 tools from the Windows Command Line MCP Server MCP Server, categorised by risk level.
View the Windows Command Line MCP Server policy →get_network_info Retrieve network configuration information including IP addresses, adapters, and DNS settings. Can be filtered to a specific interface. get_scheduled_tasks Retrieve information about scheduled tasks on the system. Can query all tasks or get detailed status of a specific task. get_service_info Retrieve information about Windows services. Can query all services or get detailed status of a specific service. get_system_info Retrieve system information including OS, hardware, and user details. Can provide basic or full details. list_allowed_commands List all commands that are allowed to be executed by this server. This helps understand what operations are permitted. list_running_processes List all running processes on the system. Can be filtered by providing an optional filter string that will match against process names. execute_command Execute a Windows command and return its output. Only commands in the allowed list can be executed. This tool should be used for running simple com... 4/5 execute_powershell Execute a PowerShell script and return its output. This allows for more complex operations and script execution. PowerShell must be in the allowed ... 4/5 The Windows Command Line MCP Server MCP server exposes 8 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Windows Command Line MCP Server server.
Windows Command Line MCP Server tools are categorised as Read (6), Execute (2). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept