VM Image Version PNG and SVG Icon
VM Image Version identifies specific builds of custom virtual machine images used for consistent deployments across Azure.
Explore More Icons
Table
Azure Table Storage is a NoSQL key value store designed for fast access to large volumes of structured, non relational data.
Service Catalog MAD
Service Catalog MAD (Managed Application Definition) in Azure lets organizations define and distribute curated resources, enabling secure and controlled service deployments.
Error
The Error icon in Azure typically represents a failed operation or misconfigured resource. It is commonly used in monitoring dashboards, logs, or troubleshooting interfaces.
Cost Analysis
Cost Analysis provides detailed visualizations and breakdowns of Azure spending, helping users track and optimize resource costs.
Serverless Search
Azure Serverless Search allows developers to implement scalable and cost effective search functionality without provisioning or managing infrastructure.
Virtual Machines (Classic)
Virtual Machines (Classic) refer to legacy IaaS deployments in Azure, using the older service management model instead of Azure Resource Manager.
Analysis Services
Azure Analysis Services is a fully managed data modeling service for delivering enterprise grade BI semantic models via tools like Power BI.
Private Endpoints
Azure Private Endpoints enable secure, private connectivity from your virtual network to Azure PaaS services over Azure Private Link. It eliminates exposure to the public internet and enhances resource security.
Defender Robot Controller
Defender Robot Controller enhances cybersecurity for robot command units by offering real time behavior analysis and intrusion detection. It ensures secure, reliable execution of industrial automation tasks.
Entra Privleged Identity Management
Entra Privileged Identity Management (PIM) helps manage, monitor, and control access to sensitive resources. It offers just in time access, approval workflows, and auditing for elevated privileges.
VM App Versions
VM App Versions track specific releases of virtual machine applications, allowing version control and smooth upgrades within deployment pipelines.
App Registrations
App Registrations in Azure AD represent applications registered to use identity services like authentication and authorization.
Load Testing
Azure Load Testing provides a managed service for performance testing web apps at scale with diagnostics, reporting, and automated load simulation tools.
Policy
Azure Policy helps enforce organizational standards and assess compliance at scale by creating, assigning, and managing policies across resources.
Blockchain Applications
Azure Blockchain Services simplify the development, governance, and deployment of blockchain applications. It offers secure infrastructure, dev tools, and connectors for building decentralized applications.
Globe Warning
The Globe Warning icon flags potential or partial issues in worldwide service deployment, serving as a diagnostic prompt for administrators to investigate region specific concerns.
Entra Managed Identities
Azure Entra Managed Identities eliminate the need for app secrets by providing secure identity management for services. They are used to authenticate resources without storing credentials.
Azure Databox Gateway
Azure Databox Gateway is a virtual appliance that acts as a local cache for transferring large volumes of data to Azure storage using secure, scheduled data uploads.
Hosts
Azure Hosts refer to dedicated compute hardware where VMs reside. They offer isolation and control for compliance sensitive workloads and consistent performance.
Scheduler
Azure Scheduler lets you run automated jobs and tasks on a schedule ideal for orchestrating backups, batch processing, or periodic alerts across cloud services.
Local Network Gateways
Azure Local Network Gateways define on premises VPN endpoints in Azure, facilitating secure site to site and point to site connections with controlled access.
Load Test
Azure Load Test allows teams to simulate user traffic to test application performance, scalability, and reliability before deployment, helping to ensure service level commitments.
Entra Private Access
Entra Private Access allows secure user connectivity to private apps across hybrid networks without exposing them to the public internet. It leverages Zero Trust and identity based access.
Defender Distributer Control System
Defender Distributer Control System supports cybersecurity for industrial control systems by monitoring distributed assets and processes. It provides real time threat detection and compliance insights tailored to operational technology networks.