Microsoft Entra ID (formerly Azure AD) - Delete Assets
  • 18 Sep 2024
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Microsoft Entra ID (formerly Azure AD) - Delete Assets

  • Dark
    Light
  • PDF

Article summary

Microsoft Entra ID (formerly Azure AD) - Delete Assets deletes an asset record from an Entra ID for each asset that matches the parameters of the saved query supplied as a trigger (or devices that have been selected in the asset table).

See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.

Note:

General Settings

  • Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
  • Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.

Use stored credentials from the Entra ID Adapter - Select this option to use the first connected Entra ID adapter credentials.

NOTE
  • To use this option, you must successfully configure an Microsoft Entra ID adapter connection.

Required Fields

These fields must be configured to run the Enforcement Set.

Additional Fields

Connection and Credentials

When Use stored credentials from the adapter is toggled off, some of the connection fields below are required to create the connection, while other fields are optional.

  1. Azure Client ID (required) - The Application ID of the Axonius application, as detailed in the Required Permissions section.
  2. Azure Client Secret (required) - A user created key for the Axonius application, as detailed in the Required Permissions section.
  3. Azure Tenant ID (required) - The ID for Microsoft Entra ID, as detailed in the Required Permissions section.
  4. Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.

APIs

Axonius uses the following APIs
Delete a user
Delete a device

Required Ports

Axonius must be able to communicate with the value supplied in DC Address via the following ports:

  • TCP/UDP port 389.

If you choose to use the stored credentials from the adapter then refer to Required Ports for information about all additional ports required.

Required Permissions

To delete a user, the value supplied in User name must have one of the following permissions
Delegated/Application User.ReadWrite.All
The user must have one of the following Entra ID roles:

  • User Administrator

  • Privileged Authentication Administrator

  • Global Administrator

  • Intune Administrator

  • Windows 365 Administrator

  • Cloud Device Administrator.

  • The user name and the password used for the adapter connection must have the Add Users or Devices to Microsoft Entra ID Group to add assets.


For more details about other Enforcement Actions available, see Action Library.



Was this article helpful?