Cisco Umbrella MonitoringUpdated Sep 27, 2023
This document describes how to retrieve the API token credentials that Arctic Wolf® needs to monitor Cisco Umbrella®. After you complete this configuration, Arctic Wolf can monitor logs from your Cisco Umbrella environment.
As part of this configuration, you must provide this information for your Cisco Umbrella environment to Arctic Wolf using the Arctic Wolf Portal:
- Organization ID
- API key
- API secret
Note: If you use the legacy Cisco Umbrella monitoring setup, which forwards Cisco Umbrella logs to Arctic Wolf from an Amazon Web Services (AWS) Simple Storage Service (S3) bucket:
- Arctic Wolf recommends completing these configuration steps to initiate your migration to an API-based Cisco Umbrella cloud sensor.
- With the new setup, you must generate new Umbrella Reporting API credentials, after which Arctic Wolf receives no Cisco Umbrella logs from your S3 bucket until you provision these credentials to Arctic Wolf and the status of your new Cisco Umbrella account in the Arctic Wolf Portal changes to Healthy.
- Sign in to the Cisco Umbrella console as an administrator.
- If you are:
- An MSP customer — Open the end-customer Cisco Umbrella configuration page. Then, in the navigation pane, click Console Settings > API Keys.
- Not an MSP customer — In the navigation pane, click Admin > API Keys.
- Click API Keys.
- Click Add.
- Enter a name for your API key.
- For the Key Scope, select the Reports checkbox.
- Select Read-Only from the Reports dropdown.
- For the Expiry Date, select Never expire.
- Click Create Key.
- Copy the API Key and Key Secret values to a secure location.
Note: The Key Secret value is only displayed once during API key creation.
- Copy the Organization ID to a secure location.
This is the integer value in your Cisco Umbrella console URL. For example, if your Cisco Umbrella console URL is
https://dashboard.umbrella.com/o/1111111, then your organization ID is
Sign in to the Arctic Wolf Unified Portal.
In the menu bar, click Telemetry Management > Connected Accounts.
Click Add Account +.
On the Add Account page, from the Account Type list, select Cloud Detection and Response.
From the list of cloud services, select Cisco Umbrella API V2.
On the Add Account page, complete these steps:
- Account Name — Enter a unique and descriptive name for the account.
- For each of these fields, paste the appropriate value from Create the Cisco Umbrella credentials:
- Org ID
- Credential Expiry — (Optional) Enter the expiration date if the credentials have an expiry date.
Click Test and Submit Credentials.
After your Concierge Security® Team (CST) enables security monitoring for this account, the connected account status changes to Healthy.
- If you have a legacy Cisco Umbrella monitoring setup based on S3 log forwarding, proceed to Remove Cisco Umbrella from your AWS environment.