Configure Microsoft Azure for Arctic Wolf monitoring manually without CloudShell
You can manually configure Microsoft Azure to send the necessary logs to Arctic Wolf for security monitoring without using CloudShell.
For information about Azure monitoring limitations and supported monitoring regions, see Microsoft Azure monitoring.
The manual configuration steps are an alternative to script configuration, and can be used to replicate the target state in environments that use Infrastructure as Code. For script configuration steps, see Microsoft Azure monitoring.
These resources are required:
- A Microsoft Azure account with access to the Azure Portal
- An active Azure subscription.
- Sufficient permissions to register an application with your Azure tenant.
- An Owner or User Access Administrator role on the subscription. This role provides you with the Microsoft.Authorization/*/Write access to assign an AD application to other roles.
These actions are required:
- If your Azure environment contains infrastructure, for example virtual machines (VM), containers, databases, and functions, make sure that the account used in this procedure has access to the Microsoft subscriptions for that infrastructure. If no subscriptions are found, review the account access, and then contact your Concierge Security® Team (CST) at security@arcticwolf.com.
Register the application
Confirm if the Log Analytics API is visible in the Azure tenant
The Log Analytics API is not displayed in the Azure tenant by default. To expose it using CloudShell, see Expose the Log Analytics API in the Azure tenant. Otherwise, to expose it manually, create a Log Analytics workspace:
Assign permissions to the application
- Go to the Microsoft Azure Portal homepage.
- In the navigation menu, click .
- Select the application created in Register the application.
- On the application page, in the navigation menu, click .
- Remove the User.Read permission for Microsoft Graph:
- In the Microsoft Graph section, click
Menu next to the User.Read permission, and then select Remove permission.
- In the resulting dialog, click Yes, remove.
- In the Microsoft Graph section, click
- Add Log Analytics API permissions:
- On the API permissions page, click + Add a permission.
- In the Request API permissions pane, click the APIs my organization uses tab.
- In the search bar, enter
log analytics API, and then select Log Analytics API. - Click Application Permissions.
- Select the Data.Read checkbox.
- Click Add permissions.
- Add Office 365 Management API permissions:
- Add Microsoft Graph permissions:
- Click Grant admin consent for <tenant>, where
<tenant>is your tenant name, and then click Yes in the resulting dialog.
Download and extract the Azure AD configuration file
Optional: Create a management group that contains multiple subscriptions
This is an optional step. To more easily complete the configuration, you can create a management group that contains multiple subscriptions for Arctic Wolf to monitor. Otherwise, you must individually assign the application to each subscription.
Create custom roles in the Azure tenant
Assign roles to the application
For each subscription that you want Arctic Wolf to monitor, complete these steps: