An Azure personalized recommendation engine that helps users follow best practices to optimize Azure deployments.
Hello Rock Steps
Thank you for posting your query on Microsoft Q&A platform.
Azure does not currently provide a single native report or export that lists all Azure services available or consumed across an entire tenant. However, you can build a live service catalog by combining Azure Resource Graph, Microsoft Entra ID (AAD) data, and subscription‑level exports.
- There is no tenant‑wide “service catalog” export in Azure
- Azure does not track “enabled but unused” services
- Azure only exposes services that have deployed resources or billable usage
- Platform services like AAD, SSL, RBAC, Policy do not appear as ARM resources in one place
Please have a look into below supported & recommended approaches:
- Azure Resource Graph – deployed services (core method): It gives you All Azure services that currently have resources deployed, Covers compute, storage, networking, App Services, databases, etc. Works across all subscriptions in the tenant
Below query returns Microsoft.Compute/virtualMachines, Microsoft.Web/sites and Microsoft.Storage/storageAccounts
Resources
| summarize ResourceCount = count() by type
| order by ResourceCount desc
Reference: https://learn.microsoft.com/en-us/azure/governance/resource-graph/overview
- Azure Cost Management – billable services : it gives you the services that incurred cost and includes platform services that may not create ARM resources
You can:
- Go to Cost Management → Cost analysis
- Group by Service name
- Export to CSV
This is useful to validate actively used services.
Reference: https://learn.microsoft.com/en-us/azure/cost-management-billing/costs/cost-analysis-common-uses
- Microsoft Entra ID (AAD) – identity & directory services: AAD will not appear in Resource Graph.
You must document separately:
- Microsoft Entra ID
- Conditional Access
- Enterprise Applications
- App registrations
- Identity Protection
Supported ways:
- Entra Admin Center (manual export)
- Microsoft Graph APIYou must document separately:
- Microsoft Entra ID
- Conditional Access
- Enterprise Applications
- App registrations
- Identity Protection
- Entra Admin Center (manual export)
- Microsoft Graph API
- SSL / Certificates: There is no central tenant‑wide SSL inventory.
You must collect from:
- Key Vault (certificates)
- App Service TLS bindings
- Application Gateway / Front Door
Example (Key Vault via ARG):
Resources
| where type == "microsoft.keyvault/vaults"
Could you please let us know if the solution shared in the comment addressed your query. If you have any other questions or need further support, please feel free to contact us.
Thanks,
Suchitra.