FAQ
MANAGED DETECTION AND RESPONSE
GENERAL
What is Managed Detection and Response?
Arctic Wolf Managed Detection and Response solution is delivered by the Arctic Wolf Concierge Security Team, built on the foundation of the industry’s only cloud native platform to deliver security operations as a concierge service. It provides 24×7 monitoring of your networks, endpoints, and cloud environments, along with a managed approach to detection, response, and recovery from modern cyber threats through managed triage and concierge services—guiding you along every step of your security journey.
How is pricing determined?
What do I need to install to get started?
Security operations experts from your Concierge Security Team (CST) are paired with you to get you up and running quickly with the Arctic Wolf MDR service. Your CST works with you to learn your network topology, configure and deploy Arctic Wolf Sensors, Arctic Wolf Agents, and cloud connectors to monitor your cloud environment. Your CST also works with you to configure your external scans, alert thresholds, country allowlisting, and more to customize the service directly to your environment.
DETECT
What log sources can Arctic Wolf monitor?
Can I customize what Arctic Wolf monitors?
RESPOND
What happens when Arctic Wolf finds suspicious activity in my log data?
When suspicious activity is observed by Arctic Wolf, an incident is automatically created by the Arctic Wolf team to investigate further. Important details about the incident are included, such as the site(s) and system(s) affected, a description about the activity, when it was detected, etc. Resolution information about why this incident was created and how to remediate is also included and managed by the CST until the incident is closed.
Can I customize how events are triaged?
How does Arctic Wolf minimize false positives?
Can Arctic Wolf help me contain threats?
RECOVER
How does Arctic Wolf proactively mitigate security incidents?
- 24×7 monitoring
- Alert triage and prioritization
- Custom protection rules
- Guided remediation
- Detailed reporting and audit support
- Ongoing strategic security reviews