Configure Generic Firewall Denylist for Arctic Wolf Active Response
With the Active Response service, Arctic Wolf® can perform network-based response actions in your network using various firewall applications.
Generic Firewall Denylist supports these response actions:
- Add a malicious IP address to a denylist
For more information, see Response action descriptions.
These resources are required:
- Access to the AWS Management Console
- An AWS user or AWS Identity and Access Management (IAM) role with administrator permissions or an equivalent IAM policy
- An administrator account for the firewall product that you are integrating
- If you want to use AWS CLI, AWS CLI
- Contact your CST to validate the Active Response integration. Have an IP address ready that Arctic Wolf can use to validate the desired response actions without causing interruptions.
Configure an AWS S3 bucket for firewall Active Response
Deploy the CloudFormation stack using AWS CLI
Deploy the CloudFormation stack using the AWS console
Confirm stack deployment and gather credentials
Optional: Upload your existing denylist
If you have an existing denylist, you can upload it to the S3 bucket.
Note: Arctic Wolf only supports CSV and text files, and the files must meet these requirements:
- Text file — Each IP address needs to be on a new line.
- CSV file — Each IP address needs to be in its own column.