Azure Resources Collected

The following resources are actively monitored in the Secberus platform. If you need coverage for additional resources, please reach out to [email protected].

Azure Resources

App Services

Certificate Orders
Certificates
Deleted Web Apps
Domains
Environments
Plans
Resource Health Metadata
Static Sites
Top Level Domains
Web App Auth Settings
Web App Configurations
Web App Vnet Connections
Web Apps

Authorization

Classic Administrators
Provider Operations Metadata
Role Assignments
Role Definitions

Batch

Account

Bot Services

Bots

CDN

Services Bots
Edge Nodes
Endpoints
Managed Rule Sets
Profiles
Rule Sets
Security Policies

Compute

Availability Sets
Capacity Reservation Groups
Capacity Reservations
Cloud Services
Disk Accesses
Disk Encryption Sets
Disks
Galleries
Gallery Image Versions
Gallery Images
Images
Restore Point Collections
Snapshots
Ssh Public Keys
Virtual Machine Extensions
Virtual Machine Patch Assessments
Virtual Machine Scale Set Network Interfaces
Virtual Machine Scale Set VMs
Virtual Machine Scale Sets
Virtual Machines

Container Registry

Registries

Container Service

Managed Cluster Upgrade Profiles
Managed Clusters
Snapshots

Cosmos

Database Accounts
Locations
MongoDB Databases
Restorable Database Accounts
SQL Databases

Data Factory

Factories

Data Lake Analytics

Accounts

Data Lake Store

Accounts

DNS

Record Sets
Zones
Forwarding Rulesets
Resolvers

Event Grid

Topic Types

Event Hub

Namespace Network Rule Sets
Namespaces

Front Door

Front Doors
Managed Rule Sets
Network Experiment Profiles

Key Vault

Keys
Managed HSMs
Secrets
Vaults

Logic

Workflows

Management Groups

Entities
Management Groups

MariaDB

Server Configurations
Servers

Monitor

Activity Log Alerts
Autoscale Settings
Diagnostic Settings
Log Profiles
Private Link Scopes
Resources
Subscription Diagnostic Settings
Tenant Activity Logs

MySQL

Server Configurations
Server Databases
Servers

Network

Application Gateways
Application Security Groups
Firewall FQDN Tags
Firewalls
Bastion Hosts
Bgp Service Communities
Custom IP Prefixes
DDOS Protection Plans
DSCP Configuration
Express Route Circuit Authorizations
Express Route Circuit Peerings
Express Route Circuits
Express Route Gateways
Express Route Ports
Express Route Ports Locations
Express Route Service Providers
Firewall Policies
Interface IP Configurations
Interfaces
IP Allocations
IP Groups
Load Balancers
NAT Gateways
Private Endpoints
Private Link Services
Profiles
Public IP Addresses
Public IP Prefixes
Route Filters
Route Tables
Security Groups
Security Partner Providers
Service Endpoint Policies
Subscription Network Manager Connections
Virtual Appliances
Virtual Hubs
Virtual Network Gateway Connections
Virtual Network Gateways
Virtual Network Subnets
Virtual Network Taps
Virtual Networks
Virtual Routers
Virtual WANs
VPN Gateways
VPN Server Configurations
VPN Sites
Watcher Flow Logs
Watchers
Web Application Firewall Policies

Nginx

Deployments

Peering Service

Countries
Locations
Providers

Policy

Assignments
Data Policy Manifests
Exemptions
Set Definitions

PostgreSQL

Databases
Flexible Servers
HSC Server Groups
Server Configurations
Server Firewall Rules
Servers

Redis

Caches

Resources

Links
Resource Groups
Resources

Search

Services

Security

Adaptive Application Controls
Alerts Suppression Rules
Allowed Connections
Applications
Assessments
Assessments Metadata
Auto Provisioning Settings
Automations
Connectors
Contacts
Discovered Security Solutions
External Security Solutions
Governance Rule
Jit Network Access Policies
Locations
Pricings
Regulatory Compliance Standards
Secure Score Control Definitions
Secure Score Controls
Secure Scores
Settings
Solutions
Sub Assessments
Tasks
Topology
Workspace Settings

Service Bus

Namespace Topic Authorization Rules
Namespace Topic Rule Access Keys
Namespace Topics
Namespaces

SQL

Instance Pools
Managed Instance Encryption Protectors
Managed Instance Vulnerability Assessments
Managed Instances
Server Admins
Server Advanced Threat Protection Settings
Server Blob Auditing Policies
Server Database Blob Auditing Policies
Server Database Long Term Retention Policies
Server Database Threat Protections
Server Database Vulnerability Assessment Scans
Server Database Vulnerability Assessments
Server Databases
Server Encryption Protectors
Server Firewall Rules
Server Security Alert Policies
Server Virtual Network Rules
Server Vulnerability Assessments
Servers
Transparent Data Encryptions
VM Groups
VMs
Virtual Clusters

Storage

Accounts
Blob Services
Caches
Containers
File Shares
Queue Acl
Queue Services
Queues
Tables

Subscription

Locations
Subscriptions
Tenants

Synapse

Private Link Hubs
Workspaces

Workloads

Monitors