- 09 Mar 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
Microsoft Entra ID (formerly Azure AD) - Enable or Disable Assets
- Updated on 09 Mar 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
Microsoft Entra ID (formerly Azure AD) - Enable or Disable Assets enables or disables each of the assets that are the results of the query, which are Microsoft Entra ID blocked/disabled managed devices or users or assets selected on the relevant asset page.
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
- Not all asset types are supported for all Enforcement Actions.
- See Actions supported for Activity Logs, Adapters Fetch History, and Asset Investigation modules.
- See Actions supported for Vulnerabilities.
- See Actions supported for Software.
Required Fields
These fields must be configured to run the Enforcement Set.
- Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
- Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
- Use stored credentials from Microsoft Entra ID (formerly Azure AD) adapter - Select this option to use credentials from the adapter connection.
- When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.
To use this option, you must successfully configure a Microsoft Entra ID adapter connection.
- Enable Status - The action you want to perform, select either Enable or Disable.
Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
Additional Fields
These fields are optional.
Connection and Credentials
When Use stored credentials from the adapter is toggled off, some of the connection fields below are required to create the connection, while other fields are optional.
- Azure Client ID - The Application ID of the Axonius application.
- Azure Client Secret - Specify a non-expired key generated from the new client secret.
- Azure Tenant ID - The ID for Microsoft Entra ID.
- Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
- Account Sub Domain - The Microsoft account's sub domain (<sub_domain>.onmicrosoft.com).
- User Name and Password - The credentials for a user account that has the permissions needed to fetch SaaS data.
- 2FA Secret Key - The secret generated in Microsoft Entra ID for setting up 2-factor authentication for the Microsoft user. For more information, see Enable or Exclude Multi-Factor Authentication.
- SSO Provider - If your organization uses Microsoft Entra ID for SSO, you can select this check box. For more information, see Connecting your SSO Solution Provider Adapter.
APIs
Axonius uses the following APIs:
Required Permissions
For more details about other Enforcement Actions available, see Action Library.