Configure Entra ID in a hybrid environment for Arctic Wolf Active Response
With the Active Response service, Arctic Wolf® can perform identity-based response actions in your hybrid network using Microsoft Entra ID.
- This configuration does not close the on-premises login connection. For example, an interactive active login user connection.
- Arctic Wolf does not support active response actions in Office 365 Government Community Cloud (GCC) environments.
- Close user connections, cloud-based
- Add/Remove a user from a security group, as long as the group is cloud-sourced, such as the restricted access group configuration
For more information, see Response action descriptions.
These resources are required:
- A user account with Global Administrator permissions
- An Owner or User Access Administrator role on the subscription with
Microsoft.Authorization/*/Writepermissions - A Microsoft Entra ID P1 license to configure conditional access groups
-
If you want Arctic Wolf to contain privileged accounts, the user account that you configure must have Privileged Authentication Administrator permissions. For more information, see Privileged Authentication Administrator.
These actions are required:
- If you are using the security defaults from Microsoft, you need to disable these defaults to be able to create a conditional access policy. We recommend following Microsoft documentation to set up the additional conditional access policies to keep your organization secure. For more information, see Disabling security defaults.
- Contact your CST to validate the Active Response integration. Have an account or environment ready that Arctic Wolf can use to validate the desired response actions without causing interruptions.
Register the application for response actions
Configure Entra ID permissions for response actions
Create a restricted access group
You can use a Microsoft Conditional Access policy to create a restricted access group. Arctic Wolf recommends creating a new cloud-only group for Active Response.