home home
その他のサイト
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
デモをリクエスト 社内ドキュメント
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • 認証
  • センサー、スキャナー、およびログコレクター
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • 開発者およびOEM
  • 製品アップデート
  • 製品およびサービスに関する追加情報
  • レガシーリスクダッシュボード
  • レガシーアナリティクス
  • English
  • 日本語
  • Deutsch
  • Français
サインイン
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • 認証
  • センサー、スキャナー、およびログコレクター
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • 開発者およびOEM
  • 製品アップデート
  • 製品およびサービスに関する追加情報
  • レガシーリスクダッシュボード
  • レガシーアナリティクス
  • English
  • 日本語
  • Deutsch
  • Français
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
デモをリクエスト
社内ドキュメント
サインイン

Active Response, Log Forwarding, and Security Monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

Active Response, Log Forwarding, and Security Monitoring
  • Cloud Detection and Response Integrations
    • Cloud Detection and Response Overview
    • Cloud Detection and Response Integrations
    • Configure Abnormal Cloud Email Security
    • Configure Amazon Web Services (AWS)
    • Configure Auth0
    • Configure Box
    • Configure Cato SSE 360
    • Configure Cisco Duo
    • Configure Cisco Meraki
    • Configure Cisco Secure Email
    • Configure Cisco Umbrella
    • Configure CyberArk
    • Delinea
    • Configure Google Cloud Platform (GCP)
    • Configure Google Workspace
    • Configure iManage Threat Manager
    • Configure JumpCloud Directory Insights
    • Configure Microsoft 365
      • Configure Microsoft 365 - Deployment Application
      • Configure Microsoft 365 - Manual
      • Refresh Microsoft 365 Credentials
    • Configure Microsoft Azure
    • Configure Microsoft Defender XDR
    • Configure Microsoft Entra ID
    • Configure Mimecast
    • Configure Netskope
    • Configure Okta
    • Configure OneLogin
    • Configure Oracle Cloud Guard
    • Configure PAN Prisma Access
    • Configure PingOne
    • Configure Proofpoint Targeted Attack Protection (TAP)
    • Configure Salesforce
    • Configure Wiz
    • Configure Zscaler Internet Access (ZIA) – Cloud
ホーム ▸ Active Response, Log Forwarding, and Security Monitoring ▸ Cloud Detection and Response Integrations
このページをシェア
  • LinkedIn
  • X
  • Facebook
  • Email
ページを印刷

Configure Microsoft 365 for Arctic Wolf monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

  • Deployment application — See Configure the Arctic Wolf Microsoft 365 deployment application.
  • Manual — See Configure Microsoft 365 for Arctic Wolf monitoring manually.
Cloud Detection and Response (CDR) Integrations and Log Forwarding Managed Detection and Response (MDR) Installation or Configuration Public

最終更新日: May 4, 2026

Previous Configure JumpCloud Directory Insights Next Configure Microsoft 365 - Deployment Application
Arctic Wolf Help Documentation
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.
プライバシーポリシー 利用規約 Cookieポリシー アクセシビリティ声明 情報セキュリティ サステナビリティ声明