Azure Monitor Pipeline PNG and SVG Icon
Azure Monitor Pipeline facilitates the ingestion and processing of telemetry data across Azure services, providing actionable insights through custom metrics and alerting pipelines.
Explore More Icons
CDN Profiles
Azure CDN Profiles manage content delivery network (CDN) endpoints that accelerate the delivery of web content. It supports multiple CDN providers and improves performance by caching data closer to users.
Elastic SAN
Azure Elastic SAN is a fully managed, scalable storage area network service. It offers high throughput, low latency block storage that is ideal for large scale applications like SAP HANA or database clusters.
Application Group
Application Group in Azure Virtual Desktop defines sets of apps delivered to users, grouped for simplified assignment and management.
Network Security Groups
Network Security Groups (NSGs) in Azure control inbound and outbound traffic to resources, using rules to define allowed and denied connections.
Defender Engineering Station
Defender Engineering Station component in Azure's OT security suite monitors and secures engineering workstations that are crucial in designing and maintaining control systems. It helps safeguard critical infrastructure from advanced persistent threats.
Bastions
Azure Bastion provides secure and seamless RDP and SSH access to Azure virtual machines without exposing them to the public internet. It eliminates the need for public IPs and protects against port scanning attacks.
Azure DevOps
Azure DevOps offers a suite of services Azure Repos, Pipelines, Artifacts, Boards to support code collaboration, CI/CD automation, and agile project tracking for modern software teams.
Defender Freezer Monitor
Azure Defender Freezer Monitor ensures the security and health of cold storage monitoring systems used in industries like pharmaceuticals and food. It enables real time anomaly detection and operational assurance for temperature sensitive environments.
Dedicated HSM
Azure Dedicated HSM (Hardware Security Module) offers FIPS 140 2 Level 3 validated hardware for cryptographic key protection. Organizations with strict compliance or regulatory needs can manage and control their own HSMs in a secure, isolated environment.
Detonation
Detonation in Azure refers to the process of safely executing potentially malicious content in an isolated environment to analyze its behavior. This security approach helps detect advanced threats and zero day vulnerabilities by observing how the content acts, without putting your network at risk.
Intune App Protection
Intune App Protection policies help secure corporate data within mobile and cloud applications by enforcing rules like data encryption, copy blocking, and session timeout controls.
Azure Chaos Studio
Azure Chaos Studio is a fault injection platform that helps engineers proactively test system resilience by running chaos experiments. Simulate outages, latency, and service failures to validate reliability in production style scenarios.
Azure Workbooks
Azure Workbooks is a customizable and interactive data visualization tool in Azure Monitor that enables users to analyze metrics, logs, and traces. It supports diagnostics, reporting, and monitoring dashboards in a single interface.
Image Definitions
Image Definitions in Azure Shared Image Gallery define metadata and configuration policies for reusable VM image templates across teams or regions.
Microsoft Defender for Cloud
Microsoft Defender for Cloud enhances your security posture with threat protection and unified visibility across Azure, hybrid, and multi cloud environments.
Instance Pools
Azure Instance Pools group multiple SQL database instances under a shared compute resource. They optimize cost, performance, and scale for multi tenant and batch workloads.
Exchange On Premises Access
This service manages secure access to Exchange Server environments hosted on premises. It helps bridge legacy infrastructure with modern identity management tools in Azure.
Cost Analysis
Cost Analysis provides detailed visualizations and breakdowns of Azure spending, helping users track and optimize resource costs.
Entra Identity Risky Signins
Entra Identity Risky Sign ins tracks anomalous user login attempts that may indicate compromise. It flags suspicious activities like unfamiliar IPs or impossible travel to strengthen identity security.
API Management Services
API Management Services in Azure allow organizations to publish, secure, monitor, and analyze APIs, providing tools for API lifecycle management.
SignalR
Azure SignalR Service is a fully managed real time messaging service that enables live web experiences such as chat apps, dashboards, and real time notifications.
Defender External Management
Defender External Management module enhances security for third party or remote management interfaces connected to operational networks. It identifies and mitigates risks arising from externally managed systems in critical infrastructure settings.
Azure Programmable Connectivity
Azure Programmable Connectivity allows developers to integrate network aware capabilities into applications by using telecom APIs, improving performance, location accuracy, and connectivity management.
Resources Provider
The Resources Provider in Azure handles provisioning and management of resource types in subscriptions via the Azure Resource Manager API framework.