Conditional Access PNG and SVG Icon
Conditional Access is a security feature in Azure Active Directory that controls access to apps and data based on specific conditions and risk factors.
Explore More Icons
Folder Website
The Folder Website icon denotes a directory hosting static web content in Azure Storage. It's used when serving HTML, CSS, or JavaScript files for web hosting without servers.
Identity Secure Score
Azure Identity Secure Score gives recommendations to improve identity related security, helping you track progress and reinforce identity protection strategies.
Virtual Clusters
Virtual Clusters provide isolated compute environments within Azure SQL Database, offering greater control and predictable performance.
Mindaro
Mindaro streamlines the process of debugging and developing microservices across distributed environments by improving visibility and traceability.
Consortium
Consortium in Azure Blockchain Service enables multiple organizations to collaboratively manage decentralized applications and smart contracts.
VM Image Version
VM Image Version identifies specific builds of custom virtual machine images used for consistent deployments across Azure.
Web Jobs
Azure Web Jobs enable background processing in App Service by running scripts or programs alongside your web applications.
Network Security Perimeters
Network Security Perimeters help secure Azure environments by restricting access to critical resources based on identity, device health, and other conditions.
Azure VMware Solution
Azure VMware Solution enables enterprises to run native VMware workloads in Azure without the need to refactor applications. It provides a seamless extension or migration path from on premises VMware environments to Azure.
AI Studio
AI Studio is a development environment in Azure for building, training, and deploying artificial intelligence models using an intuitive interface and integrated tools.
Device Compliance
Azure Device Compliance helps ensure that only compliant and secure devices can access organizational resources. It integrates with Microsoft Intune and other tools to enforce policies based on device health, OS version, encryption status, and more.
Management Groups
Azure Management Groups allow you to organize subscriptions into hierarchical containers, making it easier to enforce policies and manage access across multiple accounts.
AVS VM
AVS VM refers to virtual machines deployed in Azure VMware Solution, providing a native VMware environment on Azure infrastructure.
Kubernetes Services
Azure Kubernetes Services (AKS) enables fast build and deployment of containerized applications on a fully managed Kubernetes platform with built in developer tools.
Toolchain Orchestrator
Toolchain Orchestrator helps automate and coordinate complex development workflows across different CI/CD tools within Azure DevOps and third party services.
Storage Container
Azure Storage Containers organize blob data in a structured way, offering secure and scalable cloud object storage for unstructured data.
Managed Service Fabric
Azure Managed Service Fabric streamlines deployment and lifecycle management for service fabric clusters, supporting microservices architectures with high scale and reliability.
Website Staging
Website Staging refers to isolated environments used for testing web apps before publishing to production, ensuring stable releases.
Reserved IP Addresses (Classic)
Reserved IP Addresses (Classic) were part of legacy Azure configurations that enabled users to assign and retain public IP addresses within older network models.
Device Update IoT Hub
Device Update for Azure IoT Hub enables organizations to deploy firmware and software updates to IoT devices at scale. It ensures devices remain secure and up to date without requiring manual intervention or local access.
Entra Identity Risky Signins
Entra Identity Risky Sign ins tracks anomalous user login attempts that may indicate compromise. It flags suspicious activities like unfamiliar IPs or impossible travel to strengthen identity security.
Elastic Job Agents
Azure Elastic Job Agents enable you to run T SQL jobs across multiple SQL databases at scale. This is particularly useful for enterprises managing hundreds of databases and needing centralized automation.
Defender Distributer Control System
Defender Distributer Control System supports cybersecurity for industrial control systems by monitoring distributed assets and processes. It provides real time threat detection and compliance insights tailored to operational technology networks.
Connected Vehicle Platform
Connected Vehicle Platform provides a framework for automakers to build connected mobility solutions with real time insights and edge analytics.