Configure Entra ID in a cloud environment for Arctic Wolf Active Response
With the Active Response service, Arctic Wolf® can perform identity-based response actions in your cloud network using Microsoft Entra ID.
Microsoft Entra ID, when configured in a cloud environment, supports these response actions:
- Disable/Enable a user
- Close user connections
- Add/Remove a user from a security group
- Force a password reset
- Add/Remove user from MFA requirement
Note: The Conditional Access policy created by Arctic Wolf in Entra ID is required for this response action. The policy is called Require multifactor authentication for risky sign-ins, and it requires the Microsoft Entra ID P2 license, which includes Microsoft Entra ID Protection signals. Do not modify the policy.
For more information, see Response action descriptions.
Note: Arctic Wolf does not support active response actions in Office 365 Government Community Cloud (GCC) environments.
These resources are required:
- A user account with Global Administrator permissions
- An Owner or User Access Administrator role on the subscription with
Microsoft.Authorization/*/Writepermissions -
If you want Arctic Wolf to contain privileged accounts, the user account that you configure must have Privileged Authentication Administrator permissions. For more information, see Privileged Authentication Administrator.
- If you want to Add/Remove user from MFA requirement, a Microsoft Entra ID P2 license is required.
- Contact your CST to validate the Active Response integration. Have an account or environment ready that Arctic Wolf can use to validate the desired response actions without causing interruptions.