Azure Resources Collected
The following resources are actively monitored in the Secberus platform. If you need coverage for additional resources, please reach out to [email protected].
Azure Resources | |
---|---|
App Services | Certificate Orders Certificates Deleted Web Apps Domains Environments Plans Resource Health Metadata Static Sites Top Level Domains Web App Auth Settings Web App Configurations Web App Vnet Connections Web Apps |
Authorization | Classic Administrators Provider Operations Metadata Role Assignments Role Definitions |
Batch | Account |
Bot Services | Bots |
CDN | Services Bots Edge Nodes Endpoints Managed Rule Sets Profiles Rule Sets Security Policies |
Compute | Availability Sets Capacity Reservation Groups Capacity Reservations Cloud Services Disk Accesses Disk Encryption Sets Disks Galleries Gallery Image Versions Gallery Images Images Restore Point Collections Snapshots Ssh Public Keys Virtual Machine Extensions Virtual Machine Patch Assessments Virtual Machine Scale Set Network Interfaces Virtual Machine Scale Set VMs Virtual Machine Scale Sets Virtual Machines |
Container Registry | Registries |
Container Service | Managed Cluster Upgrade Profiles Managed Clusters Snapshots |
Cosmos | Database Accounts Locations MongoDB Databases Restorable Database Accounts SQL Databases |
Data Factory | Factories |
Data Lake Analytics | Accounts |
Data Lake Store | Accounts |
DNS | Record Sets Zones Forwarding Rulesets Resolvers |
Event Grid | Topic Types |
Event Hub | Namespace Network Rule Sets Namespaces |
Front Door | Front Doors Managed Rule Sets Network Experiment Profiles |
Key Vault | Keys Managed HSMs Secrets Vaults |
Logic | Workflows |
Management Groups | Entities Management Groups |
MariaDB | Server Configurations Servers |
Monitor | Activity Log Alerts Autoscale Settings Diagnostic Settings Log Profiles Private Link Scopes Resources Subscription Diagnostic Settings Tenant Activity Logs |
MySQL | Server Configurations Server Databases Servers |
Network | Application Gateways Application Security Groups Firewall FQDN Tags Firewalls Bastion Hosts Bgp Service Communities Custom IP Prefixes DDOS Protection Plans DSCP Configuration Express Route Circuit Authorizations Express Route Circuit Peerings Express Route Circuits Express Route Gateways Express Route Ports Express Route Ports Locations Express Route Service Providers Firewall Policies Interface IP Configurations Interfaces IP Allocations IP Groups Load Balancers NAT Gateways Private Endpoints Private Link Services Profiles Public IP Addresses Public IP Prefixes Route Filters Route Tables Security Groups Security Partner Providers Service Endpoint Policies Subscription Network Manager Connections Virtual Appliances Virtual Hubs Virtual Network Gateway Connections Virtual Network Gateways Virtual Network Subnets Virtual Network Taps Virtual Networks Virtual Routers Virtual WANs VPN Gateways VPN Server Configurations VPN Sites Watcher Flow Logs Watchers Web Application Firewall Policies |
Nginx | Deployments |
Peering Service | Countries Locations Providers |
Policy | Assignments Data Policy Manifests Exemptions Set Definitions |
PostgreSQL | Databases Flexible Servers HSC Server Groups Server Configurations Server Firewall Rules Servers |
Redis | Caches |
Resources | Links Resource Groups Resources |
Search | Services |
Security | Adaptive Application Controls Alerts Suppression Rules Allowed Connections Applications Assessments Assessments Metadata Auto Provisioning Settings Automations Connectors Contacts Discovered Security Solutions External Security Solutions Governance Rule Jit Network Access Policies Locations Pricings Regulatory Compliance Standards Secure Score Control Definitions Secure Score Controls Secure Scores Settings Solutions Sub Assessments Tasks Topology Workspace Settings |
Service Bus | Namespace Topic Authorization Rules Namespace Topic Rule Access Keys Namespace Topics Namespaces |
SQL | Instance Pools Managed Instance Encryption Protectors Managed Instance Vulnerability Assessments Managed Instances Server Admins Server Advanced Threat Protection Settings Server Blob Auditing Policies Server Database Blob Auditing Policies Server Database Long Term Retention Policies Server Database Threat Protections Server Database Vulnerability Assessment Scans Server Database Vulnerability Assessments Server Databases Server Encryption Protectors Server Firewall Rules Server Security Alert Policies Server Virtual Network Rules Server Vulnerability Assessments Servers Transparent Data Encryptions VM Groups VMs Virtual Clusters |
Storage | Accounts Blob Services Caches Containers File Shares Queue Acl Queue Services Queues Tables |
Subscription | Locations Subscriptions Tenants |
Synapse | Private Link Hubs Workspaces |
Workloads | Monitors |
Updated 2 days ago