Log Analytics Workspaces PNG and SVG Icon

Azure Monitor Log Analytics Workspaces centralize log and metric data in a structured environment, enabling cross resource analysis, alerting, and reporting capabilities.


Restore Points icon in SVG and PNG formats

Restore Points

Azure Restore Points allow you to capture snapshots of virtual machines at specific times, enabling health rollbacks or testing scenarios without impacting backups.
Biz Talk icon in SVG and PNG formats

Biz Talk

BizTalk Server on Azure enables integration of cloud and on premises applications and services. It supports business to business (B2B) communication, EDI, and enterprise application integration with support for Azure Logic Apps.
Updates icon in SVG and PNG formats

Updates

Azure Updates delivers important notifications about feature changes, security updates, and service improvements across the Microsoft Azure platform.
Azure HCP Cache icon in SVG and PNG formats

Azure HCP Cache

Azure HCP Cache provides high performance, low latency caching to accelerate application workloads. It enables faster data access and reduces latency for distributed applications and microservices.
Media icon in SVG and PNG formats

Media

Media in Azure refers to services designed to handle content encoding, streaming, and indexing at scale. Ideal for enterprises delivering video on demand or live content globally.
VM Image Version icon in SVG and PNG formats

VM Image Version

VM Image Version identifies specific builds of custom virtual machine images used for consistent deployments across Azure.
Web Slots icon in SVG and PNG formats

Web Slots

Web Slots allow you to deploy different versions of a web app in isolated environments, facilitating staging, testing, and seamless production swaps.
Azure SQL Server Stretch Databases icon in SVG and PNG formats

Azure SQL Server Stretch Databases

Azure SQL Server Stretch Databases enables SQL Server users to dynamically stretch data between on premises and Azure, keeping frequently accessed data local while offloading cold data to the cloud.
Azure Sphere icon in SVG and PNG formats

Azure Sphere

Azure Sphere provides end to end security for IoT devices with a secured microcontroller unit (MCU), a custom Linux based OS, and continuous cloud based security updates from Microsoft.
Kubernetes Fleet Manager icon in SVG and PNG formats

Kubernetes Fleet Manager

Azure Kubernetes Fleet Manager simplifies governance and operations at scale by managing policies, upgrades, and identity for federated AKS clusters across Azure regions.
Log Streaming icon in SVG and PNG formats

Log Streaming

Azure Log Streaming provides real time visibility into resource logs, enabling live diagnostics and monitoring of application health and behavior directly from Azure Portal.
Machine Learning Studio Web Service Plans icon in SVG and PNG formats

Machine Learning Studio Web Service Plans

Azure Machine Learning Studio Web Service Plans enable capacity based scaling and pricing for deployed models, balancing cost and performance in real time inference.
Defender Relay icon in SVG and PNG formats

Defender Relay

Azure Defender for Relays secures communication relays in OT environments by monitoring data flow and detecting suspicious behaviors or interference attempts. It is essential for maintaining secure communication in industrial networks.
IcM Troubleshooting icon in SVG and PNG formats

IcM Troubleshooting

Azure IcM Troubleshooting connects to Microsoft's Incident and Change Management system, enabling precise issue diagnosis and guidance within the Azure Portal.
Multi Factor Authentication icon in SVG and PNG formats

Multi Factor Authentication

Multi Factor Authentication (MFA) adds an extra layer of security to user sign ins by requiring more than one method of identity verification.
Azure Cloud Shell icon in SVG and PNG formats

Azure Cloud Shell

Azure Cloud Shell is a browser based command line environment with preconfigured tools like Azure CLI, PowerShell, and VS Code integration. It allows on the fly management of Azure resources without local setup.
Defender Industrial Printer icon in SVG and PNG formats

Defender Industrial Printer

Defender Industrial Printer protects connected industrial printing devices from unauthorized access and cyber threats. It offers real time monitoring and security posture management tailored to factory and manufacturing settings.
Intune icon in SVG and PNG formats

Intune

Microsoft Intune is a cloud based unified endpoint management service that controls mobile devices, desktops, and applications. It ensures compliance, application delivery, and security across all devices.
IoT Hub icon in SVG and PNG formats

IoT Hub

Azure IoT Hub is a central message broker for secure and reliable connectivity between billions of IoT devices and Azure services. It enables device provisioning, messaging, and telemetry ingestion at scale.
Dev Console icon in SVG and PNG formats

Dev Console

The Dev Console in Azure provides a powerful interface for developers to manage resources, test APIs, and streamline development workflows. It supports direct integration with Azure services, making it easier to debug and deploy cloud based applications efficiently.
Network Security Perimeters icon in SVG and PNG formats

Network Security Perimeters

Network Security Perimeters help secure Azure environments by restricting access to critical resources based on identity, device health, and other conditions.
Speech Services icon in SVG and PNG formats

Speech Services

Azure Speech Services offer speech to text, text to speech, and speech translation capabilities, enabling voice driven applications and intelligent assistants.
Information icon in SVG and PNG formats

Information

The Information icon typically indicates context sensitive help, glossary terms, or metadata in the Azure Portal providing clarity in dashboards and resource views.
Defender Industrial Robot icon in SVG and PNG formats

Defender Industrial Robot

Azure Defender for Industrial Robots offers cybersecurity for robotic systems used in manufacturing and logistics. It helps prevent sabotage, operational disruption, and unauthorized access through continuous monitoring and behavioral baselining.