home home
Autres sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Demander une démo Documentation interne
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentification
  • Capteurs, scanners et collecteurs de logs
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Développeurs et OEM
  • Mises à jour des produits
  • Informations supplémentaires sur les produits et services
  • Legacy Risk Dashboard
  • Analyses legacy
  • English
  • 日本語
  • Deutsch
  • Français
Connexion
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentification
  • Capteurs, scanners et collecteurs de logs
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Développeurs et OEM
  • Mises à jour des produits
  • Informations supplémentaires sur les produits et services
  • Legacy Risk Dashboard
  • Analyses legacy
  • English
  • 日本語
  • Deutsch
  • Français
Connexion

Active Response, Log Forwarding, and Security Monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

Active Response, Log Forwarding, and Security Monitoring
  • Cloud Detection and Response Integrations
    • Cloud Detection and Response Overview
    • Cloud Detection and Response Integrations
    • Configure Abnormal Cloud Email Security
    • Configure Amazon Web Services (AWS)
      • Configure AWS
        • Step 1: Configure AWS Accounts
        • Step 2: Configure AWS CloudTrail Events
        • Step 3: Configure Amazon GuardDuty
          • Configure Amazon GuardDuty
          • Configure GuardDuty – Single Account
          • Configure GuardDuty – Multiple Accounts with AWS Control Tower
          • Configure GuardDuty – Multiple Accounts with AWS Organizations
        • Optional: Configure AWS Security Hub
        • Optional: Configure AWS WAF
        • Optional: Configure AWS S3 Buckets
      • Update AWS CloudFormation Stacks
      • AWS Permissions Granted to Arctic Wolf
      • Supported AWS Regions
    • Configure Auth0
      • Configure Auth0
      • Generate New Token – Auth0
    • Configure Box
    • Configure Cato SSE 360
    • Configure Cisco Duo
    • Configure Cisco Meraki
    • Configure Cisco Secure Email
    • Configure Cisco Umbrella
      • Configure Cisco Umbrella
      • Remove Cisco Umbrella
      • Refresh Cisco Umbrella Credentials
    • Configure CyberArk
      • Configure CyberArk Identity Security Platform
      • Configure CyberArk Privilege Cloud
    • Configure Google Cloud Platform (GCP)
    • Configure Google Workspace
    • Configure iManage Threat Manager
      • Configure iManage Threat Manager
      • Refresh iManage Threat Manager Credentials
    • Configure JumpCloud Directory Insights
    • Configure Microsoft 365
      • Configure Microsoft 365 - Deployment Application
      • Configure Microsoft 365 - Manual
      • Refresh Microsoft 365 Credentials
    • Configure Microsoft Azure
      • Configure Microsoft Azure
        • Deployment application
        • Manual without CloudShell
      • Remove Microsoft Azure App
      • Refresh Microsoft Azure Credentials
      • Supported Microsoft Azure Regions
    • Configure Microsoft Defender XDR
      • Microsoft Defender XDR – Graph API
        • Configure Microsoft Defender XDR – Graph API
        • Refresh Microsoft Defender XDR Credentials
      • Microsoft Defender XDR – Azure Event Hubs
        • Configure Microsoft Defender XDR – Azure Event Hubs
        • Increase Microsoft Defender XDR Azure Event Hubs Partition Count
    • Configure Mimecast
      • Configure Mimecast
      • Delete Mimecast API 1.0 Application
    • Configure Netskope
      • Configure Netskope
      • Refresh Netskope Credentials
    • Configure Okta
    • Configure OneLogin
    • Configure Oracle Cloud Guard
    • Configure PAN Prisma Access
      • Configure PAN Prisma Access
      • PAN Prisma Access Log Types
      • Troubleshoot PAN Prisma Access
    • Configure PingOne
    • Configure Proofpoint Targeted Attack Protection (TAP)
    • Configure Salesforce
    • Configure Wiz
    • Configure Zscaler Internet Access (ZIA) – Cloud
      • Configure Zscaler Internet Access (ZIA) Cloud
      • Generate New Webhook Token
Accueil ▸ Active Response, Log Forwarding, and Security Monitoring ▸ Cloud Detection and Response Integrations
Partager cette page
  • LinkedIn
  • X
  • Facebook
  • Email
Imprimer la page

Configure Microsoft 365 for Arctic Wolf monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

  • Deployment application — See Configure the Arctic Wolf Microsoft 365 deployment application.
  • Manual — See Configure Microsoft 365 for Arctic Wolf monitoring manually.
Cloud Detection and Response (CDR) Integrations and Log Forwarding Managed Detection and Response (MDR) Installation or Configuration Public

Dernière mise à jour : March 30, 2026

Précédent Configure JumpCloud Directory Insights Suivant Configure Microsoft 365 - Deployment Application

Explorer les sujets

Aurora Endpoint Security Managed Detection and Response (MDR) Managed Risk Managed Security Awareness (MA) Incident Readiness and Response Arctic Wolf Unified Portal MSP Portal Authentification Capteurs, scanners et collecteurs de logs Arctic Wolf Agent Onboarding Portal Active Response, Log Forwarding, and Security Monitoring Active Directory Cloud Security Posture Management (CSPM) IT Service Management (ITSM) Développeurs et OEM Mises à jour des produits Informations supplémentaires sur les produits et services Legacy Risk Dashboard Analyses legacy
Arctic Wolf Help Documentation
Politique de confidentialité
Conditions d'utilisation
Politique relative aux cookies
Déclaration d'accessibilité
Sécurité de l'information
Déclaration de développement durable
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.