Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 2 Next »

  1. Networking options

    1. Inbound IP restrictions

    2. Inbound Private Endpoints

    3. Virtual network integration

    4. Virtual network triggers (non-HTTP)

    5. Hybrid connections (windows only - on-premises)

    6. Outbound IP restrictions

  2. Identity management

  3. Data protection

  4. Threat detection

  • No labels