Microsoft Azure

Overview

Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data. The Microsoft Azure adapter fetches devices from the Microsoft Azure Cloud Environment.

Use cases the adapter solves

The Azure adapter allows Axonius users to evaluate their public cloud resources to ensure that they are correctly configured and managed, even across multiple tenants. Users can also leverage data from this adapter to modify software update deployments (including security agents).

Types of Assets Fetched

Devices | Vulnerabilities | Roles | Groups | SaaS Applications | Compute Services | Application Services | Networks | Load Balancers | Databases | Containers | Object Storage | Network Services | Accounts/Tenants | Serverless Functions | Disks | Compute Images | Secrets | Certificates | Network/Firewall Rules | Alerts/Incidents | Application Resources | Configurations

For the full list of asset types and services this adapter fetches, see Microsoft Azure Services Fetched as Assets.

Data Retrieved from Microsoft Azure

The Microsoft Azure adapter collects a broad range of cloud asset and configuration data from Azure. By default, the adapter retrieves information from the following resource types and their associated child objects:

  • Virtual Machines (VMs) – metadata, instance details, OS information, networking configuration, attached disks
  • Virtual Networks (VNets) & Network Security Groups (NSGs) – subnets, IP configurations, security rules, associations
  • Azure SQL Servers & Databases – server properties, database configurations, network and security settings
  • Load Balancers – front-end IP configurations, backend pools, health probes, rules
  • Storage Accounts – account properties, encryption settings, network access configurations
  • Key Vaults – vault metadata, access policies, networking restrictions
  • Azure Cache for Redis – instance properties, networking, configuration settings
  • Azure Kubernetes Service (AKS) – cluster properties, node pools, configurations

Before You Begin

Authentication Methods

You can connect the adapter using one of the following authentication methods:

  • Enterprise Application (Client ID / Client Secret) – Recommended for most scenarios.
  • Enterprise Application (Certificate) – Provides certificate-based authentication.

Required Permissions

The following roles are mandatory for all authentication methods:

  • Reader (Management Group and/or Subscription level)
  • Directory Reader

Additional Permissions

These roles and permissions are required only if you want to fetch specific Azure services.

Roles:

  • Key Vault Crypto Officer

Permissions:

  • Microsoft.KeyVault/vaults/keys/read
  • Microsoft.KeyVault/vaults/keys/update/action
  • Microsoft.KeyVault/vaults/keys/create/action
  • Microsoft.KeyVault/vaults/keys/import/action
  • Microsoft.KeyVault/vaults/keys/recover/action
  • Microsoft.KeyVault/vaults/keys/restore/action
  • Microsoft.KeyVault/vaults/keys/delete
  • Microsoft.KeyVault/vaults/keys/backup/action
  • Microsoft.KeyVault/vaults/keys/purge/action
  • Microsoft.KeyVault/vaults/keys/encrypt/action
  • Microsoft.KeyVault/vaults/keys/decrypt/action
  • Microsoft.KeyVault/vaults/keys/wrap/action
  • Microsoft.KeyVault/vaults/keys/unwrap/action
  • Microsoft.KeyVault/vaults/keys/sign/action
  • Microsoft.KeyVault/vaults/keys/verify/action
  • Microsoft.KeyVault/vaults/keys/release/action
  • Microsoft.KeyVault/vaults/keys/rotate/action

More Information About This Adapter