Configure Microsoft Defender XDR with Graph API for Arctic Wolf monitoring
You can configure Microsoft Defender XDR® with Microsoft Graph API to send the necessary logs to Arctic Wolf® for security monitoring.
- Defender for Cloud
- Defender for Cloud Apps
- Defender for Endpoint
- Defender for Identity
- Defender for Office 365
Throttling can occur if too many requests are made to the Microsoft Graph API. This throttling threshold is reached because of a high volume of requests from multiple applications in one Azure tenant or from one application across all Azure tenants. Contention between the Arctic Wolf service and other applications running in the Azure tenant can affect timely log retrieval.
For more information, see Microsoft Graph throttling guidance.
These resources are required:
- A Microsoft account with administrator permissions.
- Microsoft requires these licenses for Microsoft Defender alerts to be generated and made available through Graph API:
Defender service Corresponding licenses Defender for Cloud Any workload protection Defender plan: - Defender for Servers
- Defender for Storage
- Defender for Azure
- Defender for Containers
- Defender for App Service
- Defender for Key Vault
- Defender for Resource Manager
- Defender for DNS
Defender for Cloud Apps - Microsoft Defender for Cloud Apps
- Microsoft 365 E5 (Microsoft E5/A5/G5)
- Microsoft 365 E5/A5/G5/F5 Security
- Enterprise Mobility + Security E5 (EMS E5/A5)
Defender for Endpoint - Defender for Endpoint Plan 1
- Defender for Endpoint Plan 2
- Microsoft 365 Defender
Defender for Identity - Enterprise Mobility + Security E5 (EMS E5/A5)
- Microsoft 365 E5 (Microsoft E5/A5/G5)
- Microsoft 365 E5/A5/G5/F5 Security
- Microsoft 365 F5 Security + Compliance
- A standalone Defender for Identity license
Defender for Office 365 - Defender for Office 365 Plan 2
- Microsoft 365 A5/E5/F5/G5 Security
Register the application
Configure API permissions
Optional: Enable app governance
As part of ingesting Microsoft Defender XDR logs, Arctic Wolf can also ingest security-relevant logs from app governance, a policy system that manages permissions for OAuth-enabled applications registered in Microsoft Entra ID, Google, and Salesforce.
-
You must have Microsoft Defender for Cloud Apps as a standalone product or part of your licensing package.
-
You must have an appropriate administrator role.
For more information about eligibility requirements, troubleshooting, and the app governance feature, see Turn on app governance for Microsoft Defender for Cloud Apps.
Provide Microsoft Defender XDR credentials to Arctic Wolf
Time-based events are polled with a delay to make sure that data is available. For new deployments, Arctic Wolf begins polling and reviewing activity from approximately one hour prior to configuration success. If API credentials fail, for example due to expired credentials, Arctic Wolf notifies you and requests a new set of credentials. After receiving refreshed credentials, Arctic Wolf can only retrieve data from the previous 12 hours. Provide refreshed credentials within 12 hours of expiry to enable complete data polling and coverage.