Configure Abnormal Cloud Email Security for Arctic Wolf Active Response
With the Active Response service, Arctic Wolf® can perform email-based response actions in your network using Abnormal Cloud Email Security®.
Abnormal Security supports these response actions:
- Delete a malicious email
Note: The Abnormal Security response action cannot be reliably tested due to a key limitation in the integration. Specifically, the Abnormal Security platform must assign a valid threat ID to an email for the response action to activate. Currently, there is no supported method to simulate an alert. Arctic Wolf recommends monitoring the integration in a live environment to observe active response behavior during genuine threat detections.
These resources are required:
- Administrator access to the Abnormal Portal
These actions are required:
- Complete Configure Abnormal Cloud Email Security for Arctic Wolf monitoring.
- Verify that your Abnormal Security tenant is in Active Mode — In the Abnormal Portal, click Threat Log, select a recent entry, and review the Remediation Actions section for this note:
This tenant was in Passive Mode at this time. If it were in Active Mode, here is a preview of an action taken.Absence of the note indicates that your tenant is in Active Mode.
Obtain access token
- Sign in to the Abnormal Portal.
- Click .
- Find the Abnormal REST API integration and click Connected.
- Copy the Access Token value to a safe, encrypted location to provide to Arctic Wolf later.