User Settings PNG and SVG Icon

Azure User Settings allow individuals to customize their Azure portal experience, manage preferences, and configure default behaviors.


Managed File Shares icon in SVG and PNG formats

Managed File Shares

Azure Managed File Shares deliver fully managed SMB/NFS shares integrated with Azure Storage, providing scalable and durable file storage accessible across platforms.
Network Interfaces icon in SVG and PNG formats

Network Interfaces

Network Interfaces in Azure enable virtual machines to communicate with other resources, define IP configurations, and support multiple NICs per VM.
Azure IoT Operations icon in SVG and PNG formats

Azure IoT Operations

Azure IoT Operations enhances industrial IoT scenarios by offering secure and scalable monitoring, data analytics, and remote management of IoT devices across edge and cloud environments.
Device Security Windows icon in SVG and PNG formats

Device Security Windows

Device Security for Windows devices in Azure leverages Microsoft Defender and Intune to enforce robust security configurations. It supports features like secure boot, antivirus protection, and automatic updates for enterprise endpoints.
MedTech Service icon in SVG and PNG formats

MedTech Service

Azure MedTech Service supports medical technology solutions, providing cloud infrastructure tailored for certified, compliant, and secure medical applications.
Website Power icon in SVG and PNG formats

Website Power

Website Power represents the scalable performance and capabilities of websites hosted on Azure's reliable cloud infrastructure.
Defender Industrial Scale System icon in SVG and PNG formats

Defender Industrial Scale System

This component protects industrial scale measurement systems from tampering and cyber interference. It ensures accuracy, integrity, and regulatory compliance for mission critical metering equipment.
Video Analyzers icon in SVG and PNG formats

Video Analyzers

Azure Video Analyzer processes video streams in real time using AI to extract actionable insights for security, retail, or industrial use cases.
Images icon in SVG and PNG formats

Images

Azure Images aggregate all image related resources, including custom OS images, templates, and versioned deployments used for rapid VM provisioning.
Image icon in SVG and PNG formats

Image

The Image icon in Azure represents virtual machine images used to deploy preconfigured OS and app environments in Share Image Gallery or custom repositories.
Database Instance For SAP icon in SVG and PNG formats

Database Instance For SAP

Azure Database Instance for SAP is purpose built to host mission critical SAP workloads, offering high availability, fast I/O performance, and tight integration with SAP certified infrastructure. It's ideal for running ERP systems on a reliable cloud foundation.
Multifactor Authentication icon in SVG and PNG formats

Multifactor Authentication

Multifactor Authentication strengthens access controls by requiring users to authenticate with multiple factors like passwords, phone verification, or biometrics.
Network Watcher icon in SVG and PNG formats

Network Watcher

Azure Network Watcher provides tools to monitor, diagnose, and gain insights into network performance and connectivity in Azure environments.
Azure Database PostgreSQL Server Group icon in SVG and PNG formats

Azure Database PostgreSQL Server Group

Azure Database for PostgreSQL Server Group enables management of multiple PostgreSQL servers for scaling, high availability, failover, and cross zone replication under a unified group configuration.
Virtual Clusters icon in SVG and PNG formats

Virtual Clusters

Virtual Clusters provide isolated compute environments within Azure SQL Database, offering greater control and predictable performance.
VM Images (Classic) icon in SVG and PNG formats

VM Images (Classic)

VM Images (Classic) refer to legacy image management used in the classic deployment model for creating and provisioning Azure virtual machines.
Entra Identity Risky Users icon in SVG and PNG formats

Entra Identity Risky Users

Azure Entra identifies risky users based on unusual activity or known threat indicators. Admins can automate remediation steps such as password resets or conditional access blocking.
Defender Web Guiding System icon in SVG and PNG formats

Defender Web Guiding System

This Defender module secures web guiding mechanisms used in manufacturing to control material alignment and flow. It ensures uninterrupted operations while monitoring for threats or system anomalies.
Intune Trends icon in SVG and PNG formats

Intune Trends

Intune Trends provides actionable insights and analytics into device deployment, app usage, compliance posture, and user behavior to help optimize device management strategies.
Detonation icon in SVG and PNG formats

Detonation

Detonation in Azure refers to the process of safely executing potentially malicious content in an isolated environment to analyze its behavior. This security approach helps detect advanced threats and zero day vulnerabilities by observing how the content acts, without putting your network at risk.
Azure Sustainability icon in SVG and PNG formats

Azure Sustainability

Azure Sustainability services help organizations monitor, analyze, and reduce their environmental impact using Microsoft Cloud for Sustainability. It provides insights into carbon emissions, energy consumption, and sustainability goals.
Business Process Tracking icon in SVG and PNG formats

Business Process Tracking

Business Process Tracking in Azure allows organizations to monitor, log, and visualize business workflows and integrations. It is crucial for identifying bottlenecks and ensuring process compliance.
Storage Accounts (Classic) icon in SVG and PNG formats

Storage Accounts (Classic)

Classic Azure Storage Accounts represent the original storage model offering blobs, queues, and tables under the Azure Service Manager (ASM) model.
Relays icon in SVG and PNG formats

Relays

Azure Relay enables secure hybrid messaging between cloud based services and on premises applications without exposing network endpoints or requiring firewall changes.