Configure Microsoft 365 for Arctic Wolf monitoring manually
You can manually configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring.
Complete these steps for each tenant that you want Arctic Wolf to monitor.
These resources are required:
- An account in the Microsoft Azure Portal with a role that can register an application, such as the Application Administrator role.
For more information, see Microsoft Entra built-in roles.
-
Based on your cloud firewall settings, add firewall exceptions for Arctic Wolf IP addresses if necessary. To see all the IP addresses that you must allowlist, sign in to the Arctic Wolf Unified Portal, click
, and then view the IP addresses in the section for your product.
- If you have Microsoft Defender for Office 365, complete Configure Microsoft Defender XDR with Graph API for Arctic Wolf monitoring.
Register the application
Assign permissions to the application
- On the application page, in the navigation menu, click .
- Remove the User.Read permission for Microsoft Graph:
- In the Microsoft Graph section, click
Menu next to the User.Read permission, and then select Remove permission.
- In the resulting dialog, click Yes, remove.
- In the Microsoft Graph section, click
- Add Office 365 Management API permissions:
- Add Microsoft Graph permissions:
- Click Grant admin consent for <tenant>, where
<tenant>is your tenant name, and then click Yes in the resulting dialog.
Enable auditing
Audit logs record user and administrative activity within your organization. For more information, see Turn auditing on or off.
-
By default, only users with E5/A5/G5 licenses have audit events in the Microsoft Purview compliance portal or Office 365 (O365) Management Activity API. For more information, see Manage mailbox auditing.
-
Auditing can take up to 24 hours to update in the Microsoft 365 environment.