Azure Resources Collected

The following resources are actively monitored in the Secberus platform. If you need coverage for additional resources, please reach out to [email protected].

Azure Resources
App ServicesCertificate Orders
Certificates
Deleted Web Apps
Domains
Environments
Plans
Resource Health Metadata
Static Sites
Top Level Domains
Web App Auth Settings
Web App Configurations
Web App Vnet Connections
Web Apps
AuthorizationClassic Administrators
Provider Operations Metadata
Role Assignments
Role Definitions
BatchAccount
Bot ServicesBots
CDNServices Bots
Edge Nodes
Endpoints
Managed Rule Sets
Profiles
Rule Sets
Security Policies
ComputeAvailability Sets
Capacity Reservation Groups
Capacity Reservations
Cloud Services
Disk Accesses
Disk Encryption Sets
Disks
Galleries
Gallery Image Versions
Gallery Images
Images
Restore Point Collections
Snapshots
Ssh Public Keys
Virtual Machine Extensions
Virtual Machine Patch Assessments
Virtual Machine Scale Set Network Interfaces
Virtual Machine Scale Set VMs
Virtual Machine Scale Sets
Virtual Machines
Container RegistryRegistries
Container ServiceManaged Cluster Upgrade Profiles
Managed Clusters
Snapshots
CosmosDatabase Accounts
Locations
MongoDB Databases
Restorable Database Accounts
SQL Databases
Data FactoryFactories
Data Lake AnalyticsAccounts
Data Lake StoreAccounts
DNSRecord Sets
Zones
Forwarding Rulesets
Resolvers
Event GridTopic Types
Event HubNamespace Network Rule Sets
Namespaces
Front DoorFront Doors
Managed Rule Sets
Network Experiment Profiles
Key VaultKeys
Managed HSMs
Secrets
Vaults
LogicWorkflows
Management GroupsEntities
Management Groups
MariaDBServer Configurations
Servers
MonitorActivity Log Alerts
Autoscale Settings
Diagnostic Settings
Log Profiles
Private Link Scopes
Resources
Subscription Diagnostic Settings
Tenant Activity Logs
MySQLServer Configurations
Server Databases
Servers
NetworkApplication Gateways
Application Security Groups
Firewall FQDN Tags
Firewalls
Bastion Hosts
Bgp Service Communities
Custom IP Prefixes
DDOS Protection Plans
DSCP Configuration
Express Route Circuit Authorizations
Express Route Circuit Peerings
Express Route Circuits
Express Route Gateways
Express Route Ports
Express Route Ports Locations
Express Route Service Providers
Firewall Policies
Interface IP Configurations
Interfaces
IP Allocations
IP Groups
Load Balancers
NAT Gateways
Private Endpoints
Private Link Services
Profiles
Public IP Addresses
Public IP Prefixes
Route Filters
Route Tables
Security Groups
Security Partner Providers
Service Endpoint Policies
Subscription Network Manager Connections
Virtual Appliances
Virtual Hubs
Virtual Network Gateway Connections
Virtual Network Gateways
Virtual Network Subnets
Virtual Network Taps
Virtual Networks
Virtual Routers
Virtual WANs
VPN Gateways
VPN Server Configurations
VPN Sites
Watcher Flow Logs
Watchers
Web Application Firewall Policies
NginxDeployments
Peering ServiceCountries
Locations
Providers
PolicyAssignments
Data Policy Manifests
Exemptions
Set Definitions
PostgreSQLDatabases
Flexible Servers
HSC Server Groups
Server Configurations
Server Firewall Rules
Servers
RedisCaches
ResourcesLinks
Resource Groups
Resources
SearchServices
SecurityAdaptive Application Controls
Alerts Suppression Rules
Allowed Connections
Applications
Assessments
Assessments Metadata
Auto Provisioning Settings
Automations
Connectors
Contacts
Discovered Security Solutions
External Security Solutions
Governance Rule
Jit Network Access Policies
Locations
Pricings
Regulatory Compliance Standards
Secure Score Control Definitions
Secure Score Controls
Secure Scores
Settings
Solutions
Sub Assessments
Tasks
Topology
Workspace Settings
Service BusNamespace Topic Authorization Rules
Namespace Topic Rule Access Keys
Namespace Topics
Namespaces
SQLInstance Pools
Managed Instance Encryption Protectors
Managed Instance Vulnerability Assessments
Managed Instances
Server Admins
Server Advanced Threat Protection Settings
Server Blob Auditing Policies
Server Database Blob Auditing Policies
Server Database Long Term Retention Policies
Server Database Threat Protections
Server Database Vulnerability Assessment Scans
Server Database Vulnerability Assessments
Server Databases
Server Encryption Protectors
Server Firewall Rules
Server Security Alert Policies
Server Virtual Network Rules
Server Vulnerability Assessments
Servers
Transparent Data Encryptions
VM Groups
VMs
Virtual Clusters
StorageAccounts
Blob Services
Caches
Containers
File Shares
Queue Acl
Queue Services
Queues
Tables
SubscriptionLocations
Subscriptions
Tenants
SynapsePrivate Link Hubs
Workspaces
WorkloadsMonitors