Entra Identity Risky Users PNG and SVG Icon
Azure Entra identifies risky users based on unusual activity or known threat indicators. Admins can automate remediation steps such as password resets or conditional access blocking.
Explore More Icons
Azure Experimentation Studio
Azure Experimentation Studio is a platform to orchestrate, compare, and version machine learning experiments, track model performance, and manage data metrics for reproducible development.
Edge Actions
Edge Actions in Azure refer to processing logic that runs at the edge, close to IoT devices or users. This reduces latency and bandwidth usage while enabling fast, local decision making in distributed architectures.
Files
Azure Files is a fully managed cloud based SMB file share service, offering scalable storage for Windows and Linux, ideal for lift and shift applications and hybrid file access.
Globe Success
The Globe Success icon denotes a successful global deployment or configuration across Azure regions, reflecting consistent and reliable performance on a global scale.
Azure Backup Center
The Azure Backup Center consolidates backup management and monitoring across Azure subscriptions. It provides centralized dashboards, compliance reporting, alerts, and automated recovery for all protected workloads.
Resource Group List
Azure Resource Group List provides a consolidated view of all resource groups within your subscription, making it easier to manage logical containers of related resources.
Time Series Insights Event Sources
Time Series Insights Event Sources define where time series data comes from, enabling integration with Azure IoT Hub and Event Hubs for real time analytics.
Azure Dev Tunnels
Azure Dev Tunnels provides secure outbound access to locally hosted apps over HTTPS without exposing them publicly. Useful for development, testing, and collaboration across devices.
Defender Industrial Robot
Azure Defender for Industrial Robots offers cybersecurity for robotic systems used in manufacturing and logistics. It helps prevent sabotage, operational disruption, and unauthorized access through continuous monitoring and behavioral baselining.
Defender PLC
Azure Defender for PLCs (Programmable Logic Controllers) provides deep threat detection and anomaly monitoring for core industrial control units. It plays a vital role in protecting OT environments from targeted cyberattacks.
Partner Topic
Partner Topics are custom event sources in Azure Event Grid that allow partners to publish events that can trigger workflows in subscriber systems.
Spatial Anchor Accounts
Azure Spatial Anchors enable developers to create mixed reality experiences by anchoring digital content to physical spaces across devices and platforms.
Bare Metal Infrastructure
Azure Bare Metal Infrastructure offers dedicated, physical servers without hypervisor interference for high performance workloads. It's ideal for scenarios requiring low latency compute, such as SAP HANA and Oracle databases.
MachinesAzureArc
Azure Arc Machines represents virtual and physical servers onboarded to Azure using Arc, allowing centralized policy, compliance, and monitoring across hybrid compute environments.
Multifactor Authentication
Multifactor Authentication strengthens access controls by requiring users to authenticate with multiple factors like passwords, phone verification, or biometrics.
Content Moderators
Content Moderators in Azure use machine learning to filter offensive, inappropriate, or unwanted content from text, images, and video.
Azure Databricks
Azure Databricks is a performant, collaborative Apache Spark based analytics platform deeply integrated with Azure. It supports interactive notebooks, AutoML, data engineering pipelines, and real time analytics.
Device Security Google
Azure's Device Security for Google devices focuses on managing Android smartphones and tablets with enterprise grade compliance policies. It supports password rules, threat detection, and remote control through Microsoft Intune integration.
Azure Communication Services
Azure Communication Services provides programmable voice, video, chat, and SMS APIs built on Azure infrastructure. It enables developers to integrate communication features into applications at global scale.
DNS Security Policy
Azure DNS Security Policy enables organizations to enforce advanced security rules for DNS traffic, helping prevent malicious domain access, DNS tunneling, and data exfiltration. It enhances DNS level protection with policy based controls aligned with enterprise compliance standards.
VM Image Version
VM Image Version identifies specific builds of custom virtual machine images used for consistent deployments across Azure.
Device Enrollment
Device Enrollment is a key step in onboarding corporate or personal devices into Azure management. It automates the setup of security policies, compliance requirements, and application deployment through platforms like Intune or Azure AD.
Defender Slot
Defender Slot is designed to monitor and protect modular components within industrial systems, including input/output slots and expansion units. It safeguards against physical and network based tampering.
Azure Support Center Blue
Azure Support Center Blue provides centralized access to Azure support resources, enabling users to manage support tickets, track service health, and interact with Microsoft support teams effectively through a unified portal.