You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-files-faq.yml
+5-1Lines changed: 5 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,11 @@ sections:
112
112
Will the retention policy delete a recovery point selected for restore before the restore operation completes?
113
113
answer: |
114
114
No. Azure Backup takes a lease on the recovery point during restore, ensuring it isn't deleted before completion.
115
-
115
+
116
+
- question: |
117
+
What are the permissions used by Azure Backup during backup and restore operation?
118
+
answer: |
119
+
Azure Backup uses key-based access for backup and restore operations. Ensure that you [enable keys access](../storage/common/shared-key-authorization-prevent.md?tabs=portal) on both source and target storage accounts, even if using identity-based access is configured.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-troubleshoot-vm-backup-fails-snapshot-timeout.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Troubleshoot Azure Backup failures caused by agent or extension issues
3
3
description: Symptoms, causes, and resolutions of Azure Backup failures related to agent, extension, and disks.
4
4
ms.topic: troubleshooting
5
-
ms.date: 04/15/2025
5
+
ms.date: 11/12/2025
6
6
ms.service: azure-backup
7
7
ms.custom: engagement-fy24
8
8
ms.reviewer: sooryar
@@ -168,8 +168,8 @@ After you register and schedule a VM for the Azure Backup service, Backup initia
168
168
**C:\Packages\Plugins\Microsoft.Azure.RecoveryServices.VMSnapshot\\<extension version\>\iaasvmprovider.dll** <br> To resolve this issue, check if the module is compatible with x86 (32-bit)/x64 (64-bit) version of _regsvr32.exe_, and then follow these steps:
169
169
170
170
1. In the affected VM, go to **Control panel** -> **Program and features**.
171
-
1. Uninstall **Visual C++ Redistributable x64** for **Visual Studio 2013**.
172
-
1. Reinstall **Visual C++ Redistributable** for **Visual Studio 2013** in the VM. To install, follow these steps:
171
+
1. Uninstall **Visual C++ Redistributable (x64)** for **Visual Studio 2015**.
172
+
1. Reinstall **Visual C++ Redistributable (x64)** for **Visual Studio 2015** in the VM. To install, follow these steps:
173
173
1. Go to the folder: **C:\Packages\Plugins\Microsoft.Azure.RecoveryServices.VMSnapshot\\<LatestVersion\>**
174
174
1. Search and run the **vcredist2013_x64** file to install.
* Identify all versions of the .NET Framework present in your system. They're present under the hierarchy of registry key **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft**.
347
347
* For each .NET Framework present in the registry key, add the following key: <br> **SchUseStrongCrypto"=dword:00000001**. </ol>
348
348
349
-
### ExtensionVCRedistInstallationFailure - The snapshot operation failed because of failure to install Visual C++ Redistributable for Visual Studio 2012
349
+
### ExtensionVCRedistInstallationFailure - The snapshot operation failed because of failure to install Visual C++ Redistributable for Visual Studio 2015
350
350
351
-
Error code: ExtensionVCRedistInstallationFailure <br/> Error message: The snapshot operation failed because of failure to install Visual C++ Redistributable for Visual Studio 2012.
351
+
Error code: ExtensionVCRedistInstallationFailure <br/> Error message: The snapshot operation failed because of failure to install Visual C++ Redistributable for Visual Studio 2015.
352
352
353
353
* Navigate to `C:\Packages\Plugins\Microsoft.Azure.RecoveryServices.VMSnapshot\agentVersion` and install vcredist2013_x64.<br/>Make sure that the registry key value that allows the service installation is set to the correct value. That is, set the **Start** value in**HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Msiserver** to **3** and not **4**. <br><br>If you still have issues with installation, restart the installation service by running **MSIEXEC /UNREGISTER** followed by **MSIEXEC /REGISTER** from an elevated command prompt.
354
-
* Check the event log to verify if you're noticing access related issues. For example: *Product: Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005 -- Error 1401.Could not create key: Software\Classes. System error 5. Verify that you have sufficient access to that key, or contact your support personnel.* <br><br> Ensure the administrator or user account has sufficient permissions to update the registry key **HKEY_LOCAL_MACHINE\SOFTWARE\Classes**. Provide sufficient permissions and restart the Windows Azure Guest Agent.<br><br> <li> If you have antivirus products in place, ensure they have the right exclusion rules to allow the installation.
354
+
* Check the event log to verify if you're noticing access related issues. For example: *Product: Microsoft Visual C++ 2015 x64 Minimum Runtime - 12.0.21005 -- Error 1401.Could not create key: Software\Classes. System error 5. Verify that you have sufficient access to that key, or contact your support personnel.* <br><br> Ensure the administrator or user account has sufficient permissions to update the registry key **HKEY_LOCAL_MACHINE\SOFTWARE\Classes**. Provide sufficient permissions and restart the Windows Azure Guest Agent.<br><br> <li> If you have antivirus products in place, ensure they have the right exclusion rules to allow the installation.
355
355
356
356
### UserErrorRequestDisallowedByPolicy - An invalid policy is configured on the VM which is preventing Snapshot operation
Copy file name to clipboardExpand all lines: articles/backup/backup-reports-email.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Email Azure Backup Reports
3
3
description: Create automated tasks to receive periodic reports via email
4
4
ms.topic: how-to
5
-
ms.date: 12/12/2024
5
+
ms.date: 12/10/2025
6
6
ms.service: azure-backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-mallicka
@@ -20,15 +20,17 @@ Using the **Email Report** feature available in Backup Reports, you can create a
20
20
21
21
To configure email tasks via Backup Reports, perform the following steps:
22
22
23
-
1. Go to **Business Continuity Center** > **Backup Reports** and click on the **Email Report** tab.
24
-
2. Create a task by specifying the following information:
23
+
1. Go to **Resiliency** > **Monitoring + Reporting** > **Reports**.
24
+
1. On the **Reports** pane, select **Backup Reports (consolidated)**.
25
+
1. On the **Backup Reports (consolidated)** pane, select the **Email Report** tab.
26
+
1. Create a task by specifying the following information:
25
27
* **Task Details** - The name of the logic app to be created, and the subscription, resource group, and location in which it should be created. Note that the logic app can query data across multiple subscriptions, resource groups, and locations (as selected in the Report Filters section), but is created in the context of a single subscription, resource group and location.
26
28
* **Data To Export** - The tab which you wish to export. You can either create a single task app per tab, or email all tabs using a single task, by selecting the **All Tabs** option.
27
29
* **Email options**: The email frequency, recipient email ID(s), and the email subject.
28
30
29
31
:::image type="content" source="./media/backup-azure-configure-backup-reports/email-tab.png" alt-text="Screenshot shows the Email tab." lightbox="./media/backup-azure-configure-backup-reports/email-tab.png":::
30
32
31
-
3. After you click**Submit** and **Confirm**, the logic app will get created. The deployed logic app uses the [Consumption plan](../../articles/logic-apps/single-tenant-overview-compare.md#logic-app-workflow-types-and-environments) pricing. The logic app and the associated API connections are created with the tag **UsedByBackupReports: true** for easy discoverability. You'll need to perform a one-time authorization step for the logic app to run successfully, as described in the section below.
33
+
1. After you select**Submit** and **Confirm**, the logic app will get created. The deployed logic app uses the [Consumption plan](../../articles/logic-apps/single-tenant-overview-compare.md#logic-app-workflow-types-and-environments) pricing. The logic app and the associated API connections are created with the tag **UsedByBackupReports: true** for easy discoverability. You'll need to perform a one-time authorization step for the logic app to run successfully, as described in the section below.
32
34
33
35
> [!NOTE]
34
36
> Support for Backup vault workloads (Azure Database for PostgreSQL Server, Azure Blobs, Azure Disks) is added to the logic app templates in April 2023. So, if you've deployed these logic apps on an earlier date, you'll have to redeploy these using the above steps if you want to see data for Backup vault workloads in your email reports.
@@ -44,7 +46,7 @@ To perform the authorization, follow the steps below:
44
46
45
47
:::image type="content" source="./media/backup-azure-configure-backup-reports/logic-apps.png" alt-text="Screenshot shows the Logic Apps." lightbox="./media/backup-azure-configure-backup-reports/logic-apps.png":::
46
48
47
-
3. Click on the **API connections** menu item.
49
+
3. Select the **API connections** menu item.
48
50
49
51
:::image type="content" source="./media/backup-azure-configure-backup-reports/api-connections.png" alt-text="Screenshot shows the API Connections." lightbox="./media/backup-azure-configure-backup-reports/api-connections.png":::
50
52
@@ -62,7 +64,7 @@ To perform the authorization, follow the steps below:
62
64
63
65
* All the charts and graphs shown in the portal are available as inline content in the email. [Learn more](configure-reports.md) about the information shown in Backup Reports.
64
66
* The grids shown in the portal are available as *.csv attachments in the email.
65
-
* The data shown in the email uses all the report-level filters selected by the user in the report, at the time of creating the email task.
67
+
* The data shown in the email uses the report-level filters selected by the user in the report, at the time of creating the email task.
66
68
* Tab-level filters such as **Backup Instance Name**, **Policy Name** and so on, aren't applied. The only exception to this is the **Retention Optimizations** grid in the **Optimize** tab, where the filters for **Daily**, **Weekly**, **Monthly** and **Yearly** RP retention are applied.
67
69
* The time range and aggregation type (for charts) are based on the user’s time range selection in the reports. For example, if the time range selection is last 60 days (translating to weekly aggregation type), and email frequency is daily, the recipient will receive an email every day with charts spanning data taken over the last 60-day period, with data aggregated at a weekly level.
68
70
@@ -74,7 +76,7 @@ If you aren't receiving emails as expected even after successful deployment of t
74
76
75
77
* This issue could be occurring because the Outlook API connector isn't authorized. To authorize the connection, follow the authorization steps provided above.
76
78
77
-
* This issue could also be occurring if you've specified an incorrect email recipient while creating the logic app. To verify that the email recipient has been specified correctly, you can go to the logic app in the Azure portal, open the Logic App designer and select email step to see whether the correct email IDs are being used.
79
+
* This issue could also be occurring if you've specified an incorrect email recipient while creating the logic app. To verify that the email recipient has been specified correctly, you can go to the logic app in the Azure portal, open the Logic App designer, and select email step to see whether the correct email IDs are being used.
78
80
79
81
### Scenario 2: Receiving an error email that says that the logic app failed to execute to completion
80
82
@@ -86,7 +88,7 @@ To troubleshoot this issue:
86
88
87
89
### Scenario 3: Error in authorizing Microsoft 365 API connection
88
90
89
-
When attempting to authorize the Microsoft 365 API connection, you might see an error of the form _Test connection failed. Error 'REST API is not yet supported for this mailbox. This error can occur for sandbox (test) accounts or for accounts that are on a dedicated (on-premises) mail server._
91
+
When attempting to authorize the Microsoft 365 API connection, you might see an error of the form _Test connection failed. Error 'REST API isn't yet supported for this mailbox. This error can occur for sandbox (test) accounts or for accounts that are on a dedicated (on-premises) mail server._
90
92
91
93
This error can occur if the mailbox is on a dedicated Microsoft Exchange Server and isn't a valid Office 365 mailbox. [Learn more](/connectors/office365/#common-errors)
92
94
@@ -114,19 +116,19 @@ To update the authentication type for the Office 365 connection via the Azure po
114
116
115
117
Learn about [how to authorize the Azure Monitor Logs connection](#authorize-connections-to-azure-monitor-logs-and-office-365).
116
118
117
-
1. Once deployed, go to the logic app in the Azure portal and click**Logic app designer** from the menu.
119
+
1. Once deployed, go to the logic app in the Azure portal and select**Logic app designer** from the menu.
1.Click**Change connection** and click the *information icon*.
129
+
1.Select**Change connection** and select the *information icon*.
128
130
129
-
:::image type="content" source="./media/backup-azure-configure-backup-reports/email-information-icon.png" alt-text="Screenshot showing to click information icon.":::
131
+
:::image type="content" source="./media/backup-azure-configure-backup-reports/email-information-icon.png" alt-text="Screenshot shows how to select information icon.":::
130
132
131
133
1. A popup opens where you can select the authentication type for GCC High.
132
134
@@ -136,11 +138,11 @@ Once you select the correct authentication type in all the places where the Offi
136
138
137
139
You can also directly update the ARM template, which is used for deploying the logic app, to ensure that the GCC High endpoint is used for authorization. Follow these steps:
138
140
139
-
1. Go to the **Email Report** tab, provide the required inputs, and then click**Submit**.
141
+
1. Go to the **Email Report** tab, provide the required inputs, and then select**Submit**.
title: Frequently Asked Questions About Azure Blob Backup
4
+
description: 'Learn how to answer common questions about Azure Blob Backup.'
5
+
ms.topic: faq
6
+
ms.service: azure-backup
7
+
ms.date: 12/11/2025
8
+
author: AbhishekMallick-MS
9
+
ms.author: v-mallicka
10
+
ms.reviewer: v-mallicka
11
+
ms.custom: engagement-fy24
12
+
13
+
title: Frequently asked questions about Azure Blob Backup
14
+
summary: This article answers frequently asked questions about Azure Blob Backup. For more information on the Azure Blob backup region availability, supported scenarios, and limitations, see the [support matrix](blob-backup-support-matrix.md).
15
+
16
+
sections:
17
+
- name: Backup
18
+
questions:
19
+
- question: |
20
+
Why does Azure Backup require to keep all versions for Blob backups?
21
+
answer: |
22
+
Azure Backup doesn’t manage blob versioning because it’s a storage account feature. When you enable vaulted backup, Azure Backup uses the Object Replication Service (ORS) to replicate blobs, including all versions, to the Backup Vault. The Backup Vault applies retention policies, such as 42 days, at the backup layer and not at the source storage account. Azure Backup doesn't change versioning settings in the storage account, as there might be independent compliance or operational requirements for retaining versions.
23
+
24
+
- question: |
25
+
Does Backup vault reconcile or delete older blob versions in the source account?
26
+
answer: |
27
+
No, the Backup vault doesn't delete or reconcile blob versions in the source storage account. The retention policy applies only to restore points stored in the vault. For blob version cleanup in the source account, manage it separately using Lifecycle Management (LCM) policies or manual configuration.
28
+
29
+
- question: |
30
+
Can I align blob versioning retention with my backup policy, such as 42 days?
31
+
answer: |
32
+
Yes, you can configure blob version retention in the storage account, but it works independently of the backup policy.
33
+
34
+
- For operational backup, set version retention to backup retention plus seven days. For example, if backup retention is 30 days, set version retention to 37 days.
35
+
36
+
- For vaulted backup only, reduce version retention after the first successful backup. We recommend you to keep versions for at least seven days after backup completion, or longer for large accounts with frequent changes.
37
+
38
+
- If you use both operational and vaulted backup, apply the higher of the two retention requirements.
39
+
40
+
additionalContent: |
41
+
## Related content
42
+
43
+
- [Create a backup policy for Azure Blob using REST API](backup-azure-dataprotection-use-rest-api-create-update-blob-policy.md).
44
+
- [Back up Azure Blob using REST API](backup-azure-dataprotection-use-rest-api-backup-blobs.md).
45
+
- [Restore Azure Blob using REST API](backup-azure-dataprotection-use-rest-api-restore-blobs.md).
Copy file name to clipboardExpand all lines: articles/backup/blob-backup-support-matrix.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,6 +78,7 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
78
78
- Enabling backups isn't supported for the blob container that are configured with native replication using data factory.
79
79
- The protection of a container that is part of any object replication isn't supported, either as a source or destination. Attempting to back up such a container will result in backup failure.
80
80
- Containers with **legal hold** enabled aren't supported.
81
+
- If your storage account is large or contains huge number of versions, the first backup can take multiple days to complete.
Copy file name to clipboardExpand all lines: articles/backup/restore-afs-powershell.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,7 @@ You can restore an entire File Share or specific files on the share. You can res
20
20
21
21
>[!NOTE]
22
22
>- Azure Files restore is only supported within the same subscription when using PowerShell or CLI.
23
+
>- Cross Region Restore is not supported using PowerShell or CLI.
23
24
>- Azure Backup now supports restoring multiple files or folders to the original or alternate Location using PowerShell. Refer to [this section](#restore-multiple-files-or-folders-to-original-or-alternate-location) of the document to learn how.
0 commit comments