Blueprints PNG and SVG Icon

Azure Blueprints enable cloud architects and IT teams to define repeatable sets of Azure resources, policies, and compliance rules. It helps automate governance and enforce standards across multiple subscriptions.


Dashboard icon in SVG and PNG formats

Dashboard

Azure Dashboard offers a customizable, interactive interface for visualizing resources and monitoring key metrics across your Azure environment. It helps administrators and teams track system health, usage, and performance in real time through a personalized workspace.
Targets Management icon in SVG and PNG formats

Targets Management

Azure Targets Management helps manage deployment endpoints or targets for automation and CI/CD pipelines within multi environment setups.
Azure Experimentation Studio icon in SVG and PNG formats

Azure Experimentation Studio

Azure Experimentation Studio is a platform to orchestrate, compare, and version machine learning experiments, track model performance, and manage data metrics for reproducible development.
Information icon in SVG and PNG formats

Information

The Information icon typically indicates context sensitive help, glossary terms, or metadata in the Azure Portal providing clarity in dashboards and resource views.
Device Security Google icon in SVG and PNG formats

Device Security Google

Azure's Device Security for Google devices focuses on managing Android smartphones and tablets with enterprise grade compliance policies. It supports password rules, threat detection, and remote control through Microsoft Intune integration.
Data Share Invitations icon in SVG and PNG formats

Data Share Invitations

Azure Data Share Invitations allow secure and controlled sharing of data across organizational boundaries. Through invitation based sharing, enterprises can distribute datasets without replicating or duplicating storage, ensuring data governance and compliance.
Azure Media Service icon in SVG and PNG formats

Azure Media Service

Azure Media Service enables secure, scalable video streaming, encoding, and content delivery solutions. It supports on demand and live media workflows with AI powered indexing and analytics.
Detonation icon in SVG and PNG formats

Detonation

Detonation in Azure refers to the process of safely executing potentially malicious content in an isolated environment to analyze its behavior. This security approach helps detect advanced threats and zero day vulnerabilities by observing how the content acts, without putting your network at risk.
User Subscriptions icon in SVG and PNG formats

User Subscriptions

User Subscriptions refer to the Azure subscriptions associated with a user, enabling access to services, billing, and resource management.
Arc Kubernetes icon in SVG and PNG formats

Arc Kubernetes

Arc Kubernetes extends Azure management capabilities to Kubernetes clusters running outside Azure, providing governance, policy, and monitoring.
Cognitive Services Decisions icon in SVG and PNG formats

Cognitive Services Decisions

Cognitive Services Decisions helps build applications that simulate human decision making using advanced machine learning and AI models in Azure.
Immersive Readers icon in SVG and PNG formats

Immersive Readers

Azure Immersive Reader embeds read aloud, translation, and literacy tools into applications enhancing accessibility and comprehension across languages and reading levels.
Web App + Database icon in SVG and PNG formats

Web App + Database

Web App + Database is a solution template in Azure that deploys a web application connected to a backend database, streamlining development.
Integration Environments icon in SVG and PNG formats

Integration Environments

Azure Integration Environments enable isolated and scalable environments for hybrid workflows using Logic Apps, API Management, and connectors, ideal for mission critical enterprise integrations.
Biz Talk icon in SVG and PNG formats

Biz Talk

BizTalk Server on Azure enables integration of cloud and on premises applications and services. It supports business to business (B2B) communication, EDI, and enterprise application integration with support for Azure Logic Apps.
Spot VM icon in SVG and PNG formats

Spot VM

Azure Spot VMs offer significant cost savings by using unused Azure compute capacity, ideal for workloads that can tolerate interruptions.
SSD icon in SVG and PNG formats

SSD

Azure SSD (Solid State Drive) provides high performance storage for I/O intensive workloads like databases and analytics, offering low latency and high throughput capabilities.
Troubleshoot icon in SVG and PNG formats

Troubleshoot

Azure Troubleshoot offers built in diagnostics and guided resolution for quickly identifying and fixing issues across Azure services and workloads.
Machine Learning Studio Web Service Plans icon in SVG and PNG formats

Machine Learning Studio Web Service Plans

Azure Machine Learning Studio Web Service Plans enable capacity based scaling and pricing for deployed models, balancing cost and performance in real time inference.
App Service Environments icon in SVG and PNG formats

App Service Environments

App Service Environments provide a fully isolated and highly scalable hosting environment for securely running Azure App Services.
App Registrations icon in SVG and PNG formats

App Registrations

App Registrations in Azure AD represent applications registered to use identity services like authentication and authorization.
Container Instances icon in SVG and PNG formats

Container Instances

Container Instances is a fast, serverless solution in Azure for running containers without managing virtual machines or orchestrators.
Availability Sets icon in SVG and PNG formats

Availability Sets

Azure Availability Sets distribute virtual machines across fault and update domains within a datacenter. This increases application uptime, ensures zero downtime maintenance, and meets SLA requirements.
Defender Slot icon in SVG and PNG formats

Defender Slot

Defender Slot is designed to monitor and protect modular components within industrial systems, including input/output slots and expansion units. It safeguards against physical and network based tampering.