App Services | Certificate Orders
Certificates
Deleted Web Apps
Domains
Environments
Plans
Resource Health Metadata
Static Sites
Top Level Domains
Web App Auth Settings
Web App Configurations
Web App Vnet Connections
Web Apps |
Authorization | Classic Administrators
Provider Operations Metadata
Role Assignments
Role Definitions |
Batch | Account |
Bot Services | Bots |
CDN | Services Bots
Edge Nodes
Endpoints
Managed Rule Sets
Profiles
Rule Sets
Security Policies |
Compute | Availability Sets
Capacity Reservation Groups
Capacity Reservations
Cloud Services
Disk Accesses
Disk Encryption Sets
Disks
Galleries
Gallery Image Versions
Gallery Images
Images
Restore Point Collections
Snapshots
Ssh Public Keys
Virtual Machine Extensions
Virtual Machine Patch Assessments
Virtual Machine Scale Set Network Interfaces
Virtual Machine Scale Set VMs
Virtual Machine Scale Sets
Virtual Machines |
Container Registry | Registries |
Container Service | Managed Cluster Upgrade Profiles
Managed Clusters
Snapshots |
Cosmos | Database Accounts
Locations
MongoDB Databases
Restorable Database Accounts
SQL Databases |
Data Factory | Factories |
Data Lake Analytics | Accounts |
Data Lake Store | Accounts |
DNS | Record Sets
Zones
Forwarding Rulesets
Resolvers |
Event Grid | Topic Types |
Event Hub | Namespace Network Rule Sets
Namespaces |
Front Door | Front Doors
Managed Rule Sets
Network Experiment Profiles |
Key Vault | Keys
Managed HSMs
Secrets
Vaults |
Logic | Workflows |
Management Groups | Entities
Management Groups |
MariaDB | Server Configurations
Servers |
Monitor | Activity Log Alerts
Autoscale Settings
Diagnostic Settings
Log Profiles
Private Link Scopes
Resources
Subscription Diagnostic Settings
Tenant Activity Logs |
MySQL | Server Configurations
Server Databases
Servers |
Network | Application Gateways
Application Security Groups
Firewall FQDN Tags
Firewalls
Bastion Hosts
Bgp Service Communities
Custom IP Prefixes
DDOS Protection Plans
DSCP Configuration
Express Route Circuit Authorizations
Express Route Circuit Peerings
Express Route Circuits
Express Route Gateways
Express Route Ports
Express Route Ports Locations
Express Route Service Providers
Firewall Policies
Interface IP Configurations
Interfaces
IP Allocations
IP Groups
Load Balancers
NAT Gateways
Private Endpoints
Private Link Services
Profiles
Public IP Addresses
Public IP Prefixes
Route Filters
Route Tables
Security Groups
Security Partner Providers
Service Endpoint Policies
Subscription Network Manager Connections
Virtual Appliances
Virtual Hubs
Virtual Network Gateway Connections
Virtual Network Gateways
Virtual Network Subnets
Virtual Network Taps
Virtual Networks
Virtual Routers
Virtual WANs
VPN Gateways
VPN Server Configurations
VPN Sites
Watcher Flow Logs
Watchers
Web Application Firewall Policies |
Nginx | Deployments |
Peering Service | Countries
Locations
Providers |
Policy | Assignments
Data Policy Manifests
Exemptions
Set Definitions |
PostgreSQL | Databases
Flexible Servers
HSC Server Groups
Server Configurations
Server Firewall Rules
Servers |
Redis | Caches |
Resources | Links
Resource Groups
Resources |
Search | Services |
Security | Adaptive Application Controls
Alerts Suppression Rules
Allowed Connections
Applications
Assessments
Assessments Metadata
Auto Provisioning Settings
Automations
Connectors
Contacts
Discovered Security Solutions
External Security Solutions
Governance Rule
Jit Network Access Policies
Locations
Pricings
Regulatory Compliance Standards
Secure Score Control Definitions
Secure Score Controls
Secure Scores
Settings
Solutions
Sub Assessments
Tasks
Topology
Workspace Settings |
Service Bus | Namespace Topic Authorization Rules
Namespace Topic Rule Access Keys
Namespace Topics
Namespaces |
SQL | Instance Pools
Managed Instance Encryption Protectors
Managed Instance Vulnerability Assessments
Managed Instances
Server Admins
Server Advanced Threat Protection Settings
Server Blob Auditing Policies
Server Database Blob Auditing Policies
Server Database Long Term Retention Policies
Server Database Threat Protections
Server Database Vulnerability Assessment Scans
Server Database Vulnerability Assessments
Server Databases
Server Encryption Protectors
Server Firewall Rules
Server Security Alert Policies
Server Virtual Network Rules
Server Vulnerability Assessments
Servers
Transparent Data Encryptions
VM Groups
VMs
Virtual Clusters |
Storage | Accounts
Blob Services
Caches
Containers
File Shares
Queue Acl
Queue Services
Queues
Tables |
Subscription | Locations
Subscriptions
Tenants |
Synapse | Private Link Hubs
Workspaces |
Workloads | Monitors |