Configure Cisco Secure Endpoint for Arctic Wolf monitoring
You can configure Cisco Secure Endpoint® to send the necessary logs to Arctic Wolf® for security monitoring.
These resources are required:
- Administrator permissions for the Cisco Secure Endpoint environment that you want Arctic Wolf to monitor.
Create API client credentials
Provide Cisco Secure Endpoint credentials to Arctic Wolf
Time-based events are polled with a delay to make sure that data is available. For new deployments, Arctic Wolf begins polling and reviewing activity from approximately one hour prior to configuration success. If API credentials fail, for example due to expired credentials, Arctic Wolf notifies you and requests a new set of credentials. After receiving refreshed credentials, Arctic Wolf can only retrieve data from the previous 12 hours. Provide refreshed credentials within 12 hours of expiry to enable complete data polling and coverage.