Integrating Managed Security Awareness with Azure Active Directory or Microsoft 365

Configuration Guide


You can integrate Arctic Wolf Managed Security Awareness® (MA) into Azure Active Directory (AD) or Microsoft 365.

Integrating Managed Security Awareness

To integrate MA with Azure AD or Microsoft 365:

  1. If you are using:

    • Azure AD — Sign in to the Azure AD admin center, and then select Azure Active Directory.
    • Microsoft 365 — Sign in to the administration center, and then select Azure Active Directory from the navigation pane. This opens the Azure AD admin center.
  2. Under Manage, select App registrations > New registration.

  3. Enter the name that you want displayed for this application, such as Arctic Wolf Managed Security Awareness Integration.

  4. Confirm that Supported account types is set to Accounts in this organizational directory only (Single tenant).

  5. Click Register. This opens the page for the newly registered application.

  6. Note these values to provide to Arctic Wolf later:

    • Application (client) ID
    • Directory (tenant) ID
  7. In the navigation pane under Manage, select API permissions.

  8. Select Add a permission, and then select Microsoft Graph.

  9. Select Application permissions, and then enable these permissions:

    • Directory.Read.All

    • User.Read.All

      Note: If you receive a message similar to Not granted for <company name>, select Grant admin consent for <company name>.

  10. In the navigation pane, under Manage, select Certificates & secrets.

  11. In the Client secrets section, select + New client secret, and then create the secret:

    1. Enter a meaningful description for the client secret, such as Arctic Wolf Secret.
    2. Click Add.
  12. Verify that your new client secret appears in the Client secrets section, and then copy the Client Secret value to a secure location. You must provide this value to Arctic Wolf later.

    Note: This value is only viewable during the application registration.

  13. In the Azure Active Directory menu, select Manage > Groups. We use groups to query all users that partake in MA training. If you:

    • Have an existing group — Proceed to the next step.
    • Do not have an existing group — Click Groups > New Groups, and then enter group information and select the appropriate users for this group.
  14. Make note of the Group Name value. You must provide this value to Arctic Wolf in the next step.

  15. Provide these values for your Azure AD or Microsoft 365 environment to your Concierge Security Team® (CST) in a secure file on Egnyte:

    • Application (client) ID
    • Directory (tenant) ID
    • Client Secret value
    • Group Name

    Tip: Your CST provides the Egnyte link to you in advance.