Entra Identity Roles and Administrators PNG and SVG Icon

This service allows organizations to assign roles and manage privileged accounts in Azure AD. It helps enforce role based access control and ensures clear accountability across administrative roles.


Load Balancer Hub icon in SVG and PNG formats

Load Balancer Hub

Load Balancer Hub centralizes management of Azure Load Balancer configurations, enabling administrators to monitor and scale across multiple services and workloads.
NAT icon in SVG and PNG formats

NAT

Azure NAT Gateway allows outbound internet connectivity for resources in a virtual network, enabling predictable IP usage and enhanced security for virtual machines.
Collaborative Service icon in SVG and PNG formats

Collaborative Service

Collaborative Service in Azure facilitates seamless teamwork and collaboration across distributed environments through integrated communication and productivity tools.
Azure HPC Workbenches icon in SVG and PNG formats

Azure HPC Workbenches

Azure HPC Workbenches offer a scalable platform for high performance computing workloads, allowing researchers and engineers to run simulations, data modeling, and analytics in the cloud.
Bug icon in SVG and PNG formats

Bug

A Bug in Azure DevOps represents a defect or issue found during software development. It allows teams to track, prioritize, and resolve software errors using agile project management practices.
Machine Learning Studio Workspaces icon in SVG and PNG formats

Machine Learning Studio Workspaces

Azure ML Studio Workspaces provide collaborative workspace environments where data scientists can develop experiments, track models, and manage resources in a governed setting.
Blueprints icon in SVG and PNG formats

Blueprints

Azure Blueprints enable cloud architects and IT teams to define repeatable sets of Azure resources, policies, and compliance rules. It helps automate governance and enforce standards across multiple subscriptions.
AzureAttestation icon in SVG and PNG formats

AzureAttestation

Azure Attestation is a service that enables verification of the trustworthiness of hardware and software components of a system. It plays a key role in zero trust security strategies and confidential computing scenarios.
Arc Machines icon in SVG and PNG formats

Arc Machines

Azure Arc Machines brings the power of Azure management to on premises and multicloud physical and virtual servers. You can easily onboard servers, apply policies, monitor compliance, and ensure consistent governance across hybrid infrastructure from a central portal.
Hosts icon in SVG and PNG formats

Hosts

Azure Hosts refer to dedicated compute hardware where VMs reside. They offer isolation and control for compliance sensitive workloads and consistent performance.
Journey Hub icon in SVG and PNG formats

Journey Hub

Journey Hub refers to tools that visualize and orchestrate multi channel customer engagement paths, helping organizations deliver personalized interactions and seamless journey tracking.
App Service Domains icon in SVG and PNG formats

App Service Domains

App Service Domains enable the purchase and management of custom domain names for use with Azure web apps.
Face APIs icon in SVG and PNG formats

Face APIs

Azure Face APIs offer reliable facial recognition capabilities including face detection, emotion analysis, identity verification, and grouping, powered by AI for secure and personalized user experiences.
Virtual Networks icon in SVG and PNG formats

Virtual Networks

Azure Virtual Networks provide secure, isolated network environments for running Azure resources and controlling inbound and outbound communication.
Managed File Shares icon in SVG and PNG formats

Managed File Shares

Azure Managed File Shares deliver fully managed SMB/NFS shares integrated with Azure Storage, providing scalable and durable file storage accessible across platforms.
App Service Environments icon in SVG and PNG formats

App Service Environments

App Service Environments provide a fully isolated and highly scalable hosting environment for securely running Azure App Services.
Microsoft Defender EASM icon in SVG and PNG formats

Microsoft Defender EASM

Microsoft Defender External Attack Surface Management (EASM) helps discover unknown and unmanaged internet facing assets, improving visibility and reducing security risks.
Gear icon in SVG and PNG formats

Gear

The Gear icon represents settings and configuration tools in Azure services, providing access to customization, management options, and advanced controls in the portal.
Azure AD B2C icon in SVG and PNG formats

Azure AD B2C

Azure Active Directory B2C (Business to Consumer) offers scalable identity management for external customers. It allows sign in via social accounts, custom branding, and policy based security for web and mobile applications.
AKS Istio icon in SVG and PNG formats

AKS Istio

AKS Istio integrates the Istio service mesh with Azure Kubernetes Service to manage microservices traffic, enforce policies, and secure communication.
Template Specs icon in SVG and PNG formats

Template Specs

Azure Template Specs store ARM templates as versioned resources, enabling secure sharing and reuse of infrastructure configurations.
Defender External Management icon in SVG and PNG formats

Defender External Management

Defender External Management module enhances security for third party or remote management interfaces connected to operational networks. It identifies and mitigates risks arising from externally managed systems in critical infrastructure settings.
Operation Log (Classic) icon in SVG and PNG formats

Operation Log (Classic)

Operation Log (Classic) contains historical records of management operations on Azure resources, useful for auditing and troubleshooting legacy services.
Network Managers icon in SVG and PNG formats

Network Managers

Network Managers in Azure centralize and automate network configuration and security policy management across large scale cloud deployments.