Virtual Machine PNG and SVG Icon

Virtual Machines in Azure offer scalable, on demand computing resources for running Windows or Linux workloads with full administrative access.


Mission Landing Zone icon in SVG and PNG formats

Mission Landing Zone

Mission Landing Zone represents a pre configured cloud environment in Azure designed to accelerate enterprise cloud adoption while ensuring compliance and governance.
Virtual WAN Hub icon in SVG and PNG formats

Virtual WAN Hub

Virtual WAN Hub is the central point of connectivity in an Azure Virtual WAN architecture, simplifying large scale branch connectivity and routing.
Entra ID Protection icon in SVG and PNG formats

Entra ID Protection

Entra ID Protection helps detect and respond to suspicious sign ins, risky users, and identity threats. It integrates with conditional access policies to automatically block or challenge high risk users.
Information icon in SVG and PNG formats

Information

The Information icon typically indicates context sensitive help, glossary terms, or metadata in the Azure Portal providing clarity in dashboards and resource views.
Commit icon in SVG and PNG formats

Commit

Commit represents the code commit action within Azure DevOps and development workflows, ensuring version tracking and progress history.
Metrics Advisor icon in SVG and PNG formats

Metrics Advisor

Metrics Advisor is an AI powered service that detects anomalies and monitors time series data to proactively identify issues in business and system metrics.
Device Security Apple icon in SVG and PNG formats

Device Security Apple

Device Security for Apple in Azure ensures iOS and macOS devices adhere to enterprise security standards. Through integration with Intune, organizations can enforce encryption, app control, and compliance policies on Apple hardware.
Controls Horizontal icon in SVG and PNG formats

Controls Horizontal

Controls Horizontal are UI elements arranged horizontally in Azure applications to enable intuitive management and navigation.
Anomaly Detector icon in SVG and PNG formats

Anomaly Detector

Anomaly Detector is an Azure Cognitive Service that uses machine learning to identify unusual patterns and outliers in time series data.
Entra Connect Health icon in SVG and PNG formats

Entra Connect Health

Entra Connect Health provides monitoring and analytics for your directory synchronization setup. It ensures the reliability of identity services by tracking sync errors, latency, and configuration issues.
Entra Identity Custom Roles icon in SVG and PNG formats

Entra Identity Custom Roles

Entra Identity Custom Roles allows administrators to create fine grained, custom role definitions in Azure AD. It enhances security by enforcing least privilege access tailored to specific user responsibilities.
Azure Cloud Shell icon in SVG and PNG formats

Azure Cloud Shell

Azure Cloud Shell is a browser based command line environment with preconfigured tools like Azure CLI, PowerShell, and VS Code integration. It allows on the fly management of Azure resources without local setup.
VM Scale Sets icon in SVG and PNG formats

VM Scale Sets

VM Scale Sets enable automatic scaling of virtual machines based on demand, offering high availability and resiliency for large scale workloads.
Device Update IoT Hub icon in SVG and PNG formats

Device Update IoT Hub

Device Update for Azure IoT Hub enables organizations to deploy firmware and software updates to IoT devices at scale. It ensures devices remain secure and up to date without requiring manual intervention or local access.
Disk Encryption Sets icon in SVG and PNG formats

Disk Encryption Sets

Azure Disk Encryption Sets provide enhanced security for your managed disks by offering control over encryption keys. This service integrates with Azure Key Vault to manage customer managed keys (CMK) at scale.
Service Endpoint Policies icon in SVG and PNG formats

Service Endpoint Policies

Azure Service Endpoint Policies help control traffic to Azure service endpoints, allowing granular access control from virtual networks to service instances.
Azure Token Service icon in SVG and PNG formats

Azure Token Service

Azure Token Service is a core identity service in Azure that issues access tokens for secure communication between client applications and APIs. It is foundational to Azure Active Directory and ensures authenticated access to resources.
VM App Versions icon in SVG and PNG formats

VM App Versions

VM App Versions track specific releases of virtual machine applications, allowing version control and smooth upgrades within deployment pipelines.
Azure Applied AI Services icon in SVG and PNG formats

Azure Applied AI Services

Azure Applied AI Services deliver prebuilt, domain specific AI models such as form recognizer, metrics advisor, anomaly detector, and video analyzer accelerating intelligent application development without deep AI expertise.
Compliance Center icon in SVG and PNG formats

Compliance Center

Compliance Center offers centralized visibility and management of compliance status, helping organizations meet industry and regional standards in Azure.
Bug icon in SVG and PNG formats

Bug

A Bug in Azure DevOps represents a defect or issue found during software development. It allows teams to track, prioritize, and resolve software errors using agile project management practices.
Elastic Job Agents icon in SVG and PNG formats

Elastic Job Agents

Azure Elastic Job Agents enable you to run T SQL jobs across multiple SQL databases at scale. This is particularly useful for enterprises managing hundreds of databases and needing centralized automation.
DNS Private Resolver icon in SVG and PNG formats

DNS Private Resolver

Azure DNS Private Resolver provides secure, fully managed DNS resolution between Azure virtual networks and on premises environments without requiring custom DNS solutions. It's essential for hybrid deployments, ensuring seamless name resolution across private networks while maintaining performance and security.
Intune App Protection icon in SVG and PNG formats

Intune App Protection

Intune App Protection policies help secure corporate data within mobile and cloud applications by enforcing rules like data encryption, copy blocking, and session timeout controls.