home home
Other Sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo Internal Documentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
Sign In
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo
Internal Documentation
Sign In

Active Response, Log Forwarding, and Security Monitoring

You can configure various Microsoft Defender XDR® products to send the necessary logs to Arctic Wolf® for security monitoring.

Active Response, Log Forwarding, and Security Monitoring
  • Cloud Detection and Response Integrations
    • Cloud Detection and Response Overview
    • Cloud Detection and Response Integrations
    • Configure Abnormal Cloud Email Security
    • Configure Amazon Web Services (AWS)
    • Configure Auth0
    • Configure Box
    • Configure Cato SSE 360
    • Configure Cisco Duo
    • Configure Cisco Meraki
    • Configure Cisco Secure Email
    • Configure Cisco Umbrella
    • Configure CyberArk
    • Delinea
    • Configure Google Cloud Platform (GCP)
    • Configure Google Workspace
    • Configure iManage Threat Manager
    • Configure JumpCloud Directory Insights
    • Configure Microsoft 365
    • Configure Microsoft Azure
    • Configure Microsoft Defender XDR
      • Microsoft Defender XDR – Graph API
      • Microsoft Defender XDR – Azure Event Hubs
    • Configure Microsoft Entra ID
    • Configure Mimecast
    • Configure Netskope
    • Configure Okta
    • Configure OneLogin
    • Configure Oracle Cloud Guard
    • Configure PAN Prisma Access
    • Configure PingOne
    • Configure Proofpoint Targeted Attack Protection (TAP)
    • Configure Salesforce
    • Configure Wiz
    • Configure Zscaler Internet Access (ZIA) – Cloud
Home ▸ Active Response, Log Forwarding, and Security Monitoring ▸ Cloud Detection and Response Integrations
Share this page
  • LinkedIn
  • X
  • Facebook
  • Email
Print page

Configure Microsoft Defender XDR for Arctic Wolf log monitoring

You can configure various Microsoft Defender XDR® products to send the necessary logs to Arctic Wolf® for security monitoring.

Do one of these actions:
  • Configure Microsoft Defender XDR with Graph API for Arctic Wolf monitoring
  • Configure Microsoft Defender XDR with Azure Event Hubs for Arctic Wolf monitoring
Cloud Detection and Response (CDR) Integrations and Log Forwarding Managed Detection and Response (MDR) Installation or Configuration Public

Last updated: May 4, 2026

Previous Supported Microsoft Azure Regions Next Microsoft Defender XDR – Graph API
Arctic Wolf Help Documentation
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.
Privacy Policy Terms of Use Cookie Policy Accessibility Statement Information Security Sustainability Statement