SQL Server PNG and SVG Icon

Azure SQL Server is a logical resource instance used to group multiple databases and configure server level security, firewall, and auditing policies.


Conditional Access icon in SVG and PNG formats

Conditional Access

Conditional Access is a security feature in Azure Active Directory that controls access to apps and data based on specific conditions and risk factors.
Policy icon in SVG and PNG formats

Policy

Azure Policy helps enforce organizational standards and assess compliance at scale by creating, assigning, and managing policies across resources.
Download icon in SVG and PNG formats

Download

Azure Download services support the secure and high speed download of files, datasets, and application binaries from the cloud to local or on premises environments. Useful in hybrid cloud workflows and large scale data transfers.
IP Groups icon in SVG and PNG formats

IP Groups

IP Groups in Azure simplify network rule definitions by allowing administrators to group multiple IP addresses or ranges for use in NSG and firewall policies.
Microsoft Dev Box icon in SVG and PNG formats

Microsoft Dev Box

Microsoft Dev Box offers preconfigured, cloud hosted developer workstations, enabling quick onboarding and scalable development environments.
Azure Stack HCI Sizer icon in SVG and PNG formats

Azure Stack HCI Sizer

Azure Stack HCI Sizer is a tool that helps estimate hardware sizing for Azure Stack HCI clusters based on workload requirements, ensuring optimal performance and cost planning.
Azure Lighthouse icon in SVG and PNG formats

Azure Lighthouse

Azure Lighthouse provides service providers with scalable, secure, and automated management of customer Azure environments using delegated resource access and cross tenant management capabilities.
Firewalls icon in SVG and PNG formats

Firewalls

Azure Firewall is a robust, fully managed network security service that filters and inspects inbound and outbound traffic, protecting virtual networks with high availability and built in threat intelligence.
Network Interfaces icon in SVG and PNG formats

Network Interfaces

Network Interfaces in Azure enable virtual machines to communicate with other resources, define IP configurations, and support multiple NICs per VM.
Virtual Machines (Classic) icon in SVG and PNG formats

Virtual Machines (Classic)

Virtual Machines (Classic) refer to legacy IaaS deployments in Azure, using the older service management model instead of Azure Resource Manager.
Files icon in SVG and PNG formats

Files

Azure Files is a fully managed cloud based SMB file share service, offering scalable storage for Windows and Linux, ideal for lift and shift applications and hybrid file access.
Azure Managed Redis icon in SVG and PNG formats

Azure Managed Redis

Azure Managed Redis offers a fully managed, enterprise grade Redis cache that supports fast data access, real time analytics, and high throughput applications with built in scalability and security.
Endpoint Analytics icon in SVG and PNG formats

Endpoint Analytics

Endpoint Analytics in Azure provides data driven insights into user devices and performance. It helps IT teams identify issues, improve startup times, and track compliance across the device fleet.
Azure Workbooks icon in SVG and PNG formats

Azure Workbooks

Azure Workbooks is a customizable and interactive data visualization tool in Azure Monitor that enables users to analyze metrics, logs, and traces. It supports diagnostics, reporting, and monitoring dashboards in a single interface.
Service Endpoint Policies icon in SVG and PNG formats

Service Endpoint Policies

Azure Service Endpoint Policies help control traffic to Azure service endpoints, allowing granular access control from virtual networks to service instances.
Azure Experimentation Studio icon in SVG and PNG formats

Azure Experimentation Studio

Azure Experimentation Studio is a platform to orchestrate, compare, and version machine learning experiments, track model performance, and manage data metrics for reproducible development.
Microsoft Defender EASM icon in SVG and PNG formats

Microsoft Defender EASM

Microsoft Defender External Attack Surface Management (EASM) helps discover unknown and unmanaged internet facing assets, improving visibility and reducing security risks.
Defender External Management icon in SVG and PNG formats

Defender External Management

Defender External Management module enhances security for third party or remote management interfaces connected to operational networks. It identifies and mitigates risks arising from externally managed systems in critical infrastructure settings.
Monitor Health Models icon in SVG and PNG formats

Monitor Health Models

Monitor Health Models in Azure use machine learning to detect and predict health issues in applications and infrastructure, supporting proactive incident management.
Azure Object Understanding icon in SVG and PNG formats

Azure Object Understanding

Azure Object Understanding provides advanced AI driven object detection and classification capabilities for visual content, enabling applications in manufacturing, retail, and autonomous systems.
Entra Privleged Identity Management icon in SVG and PNG formats

Entra Privleged Identity Management

Entra Privileged Identity Management (PIM) helps manage, monitor, and control access to sensitive resources. It offers just in time access, approval workflows, and auditing for elevated privileges.
Disks Snapshots icon in SVG and PNG formats

Disks Snapshots

Azure Disk Snapshots provide point in time backups of managed disks. These are ideal for disaster recovery and testing scenarios, offering a quick way to restore data or clone environments.
Azure Storage Mover icon in SVG and PNG formats

Azure Storage Mover

Azure Storage Mover is a fully managed migration service that simplifies the process of moving large volumes of unstructured data from on premises storage to Azure Storage. It supports seamless data migration with minimal downtime, making it ideal for digital transformation initiatives.
Entra Identity Risky Signins icon in SVG and PNG formats

Entra Identity Risky Signins

Entra Identity Risky Sign ins tracks anomalous user login attempts that may indicate compromise. It flags suspicious activities like unfamiliar IPs or impossible travel to strengthen identity security.