Skip to content

Commit 0ba90af

Browse files
Merge pull request #304198 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-14 11:00 UTC
2 parents f048ed4 + dc149f5 commit 0ba90af

File tree

3 files changed

+48
-26
lines changed

3 files changed

+48
-26
lines changed

articles/backup/backup-azure-arm-restore-vms.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Restore VMs by using the Azure portal using Azure Backup
33
description: Restore an Azure virtual machine from a recovery point by using the Azure portal, including the Cross Region Restore feature.
44
ms.reviewer: nikhilsarode
55
ms.topic: how-to
6-
ms.date: 08/13/2025
6+
ms.date: 08/14/2025
77
ms.service: azure-backup
88
author: AbhishekMallick-MS
99
ms.author: v-mallicka
@@ -167,11 +167,15 @@ While you restore disks for a Managed VM from a Vault-Standard recovery point, i
167167

168168
After the disk is restored, use the template that was generated as part of the restore operation to customize and create a new VM:
169169

170-
1. In **Backup Jobs**, select the relevant restore job.
170+
1. Go to the **Recovery Services vault**, and then select **Monitoring** > **Backup Jobs**.
171+
172+
Alternatively, you can go to **Business Continuity Center**, and then select **Monitoring + Reporting** > **Jobs**.
173+
174+
1. On the **Backup Jobs** pane, select the relevant restore job.
171175

172176
1. In **Restore**, select **Deploy Template** to initiate template deployment.
173177

174-
![Restore job drill-down](./media/backup-azure-arm-restore-vms/restore-job-drill-down1.png)
178+
:::image type="content" source="./media/backup-azure-arm-restore-vms/restore-job-drill-down1.png" alt-text="Screenshot shows the restore job drill-down details." lightbox="./media/backup-azure-arm-restore-vms/restore-job-drill-down1.png":::
175179

176180
>[!Note]
177181
>For a shared access signature (SAS) that has **Allow storage account key access** set to disabled, the template won't deploy when you select **Deploy Template**.

articles/backup/backup-azure-backup-vault-troubleshoot.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot Azure Backup Vault
33
description: Symptoms, causes, and resolutions of the Azure Backup Vault related operations.
44
ms.topic: troubleshooting
5-
ms.date: 07/16/2025
5+
ms.date: 08/14/2025
66
ms.service: azure-backup
77
author: AbhishekMallick-MS
88
ms.author: v-mallicka
@@ -15,17 +15,31 @@ This article provides troubleshooting steps that help you resolve Azure Backup V
1515

1616
## Common user errors
1717

18-
#### Error code: UserErrorSystemIdentityNotEnabledWithVault
18+
### UserErrorSystemIdentityNotEnabledWithVault
1919

20-
**Possible Cause:** Backup Vault is created with System Identity enabled by default. This error appears when System Identity of the Backup Vault is in a disabled state and a backup related operation fails with this error.
20+
**Error code**: `UserErrorSystemIdentityNotEnabledWithVault`
2121

22-
**Resolution:** To resolve this error, enable the System Identity of the Backup Vault and reassign all the necessary roles to it. Else use a User Identity in its place with all the roles assigned and update Managed Identity for all the Backup Instances using the now disabled System Identity.
22+
**Cause**: Backup Vault is created with System Identity enabled by default. This error appears when System Identity of the Backup Vault is in a disabled state and a backup related operation fails with this error.
2323

24-
#### Error code: UserErrorUserIdentityNotFoundOrNotAssociatedWithVault
24+
**Recommended action**: To resolve this error, enable the System Identity of the Backup Vault and reassign all the necessary roles to it. Else use a User Identity in its place with all the roles assigned and update Managed Identity for all the Backup Instances using the now disabled System Identity.
2525

26-
**Possible Cause:** Backup Instances can be created with a User Identity having all the required roles assigned to it. In addition, User Identity can also be used for operations like Encryption using a Customer Managed Key. This error appears when the particular User Identity is deleted or not attached with the Backup Vault.
26+
### UserErrorUserIdentityNotFoundOrNotAssociatedWithVault
2727

28-
**Resolution:** To resolve this error, assign the same or alternate User Identity to the Backup Vault and update the Backup Instance to use the new identity in latter case. Otherwise, enable the System Identity of the Backup Vault, update the Backup Instance and assign all the necessary roles to it.
28+
**Error code**: `UserErrorUserIdentityNotFoundOrNotAssociatedWithVault`
29+
30+
**Cause**: Backup Instances can be created with a User Identity having all the required roles assigned to it. In addition, User Identity can also be used for operations like Encryption using a Customer Managed Key. This error appears when the particular User Identity is deleted or not attached with the Backup Vault.
31+
32+
**Recommended action**: To resolve this error, assign the same or alternate User Identity to the Backup Vault and update the Backup Instance to use the new identity in latter case. Otherwise, enable the System Identity of the Backup Vault, update the Backup Instance and assign all the necessary roles to it.
33+
34+
### UserErrorStorageAccountKeyAccessDisallowed
35+
36+
**Error code**: `UserErrorStorageAccountKeyAccessDisallowed`
37+
38+
**Error message**: The storage account doesn't support key based authentication.
39+
40+
**Cause**: Storage account doesn't permit key based authentication.
41+
42+
**Recommended action**: Ensure that storage account key access is enabled, and then retry the operation. [Learn more](azure-kubernetes-service-backup-troubleshoot.md).
2943

3044
## Related content
3145

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,33 @@
11
---
2-
title: Accidental Delete Protection for Azure file shares
3-
description: Learn how to soft delete can protect your Azure File Shares from accidental deletion.
2+
title: Accidental Delete Protection for Azure Files
3+
description: Learn how to soft delete can protect your Azure Files from accidental deletion.
44
ms.topic: how-to
5-
ms.date: 09/11/2024
5+
ms.date: 08/14/2025
66
ms.custom: references_regions
77
author: AbhishekMallick-MS
88
ms.author: v-mallicka
99
# Customer intent: As a storage administrator, I want to enable soft delete for file shares using Azure Backup, so that I can protect my data from accidental deletion or cyberattacks and ensure I can recover it within the retention period.
1010
---
1111

12-
# Accidental delete protection for Azure file shares using Azure Backup
12+
# Protect Azure Files from accidental deletion using Azure Backup
1313

14-
To provide protection against cyberattacks or accidental deletion, [soft delete](../storage/files/storage-files-prevent-file-share-deletion.md) is enabled for all file shares in a storage account when you configure backup for any file share in the respective storage account. With soft delete, even if a malicious actor deletes the file share, the file share’s contents and recovery points (snapshots) are retained for a minimum of 14 additional days, allowing the recovery of file shares with no data loss. Soft delete is supported for standard and premium storage accounts and the setting is enabled by Azure Backup for all the storage accounts hosting backed up file shares.
14+
Azure Backup automatically enables [soft delete](../storage/files/storage-files-prevent-file-share-deletion.md) for all file shares in a storage account when you configure backup for any file share. With soft delete, deleted file shares and their recovery points (snapshots) are retained for at least 14 days in soft-deleted state, helping you restore data in accidental deletion or cyberattacks. This protection applies to both standard and premium storage accounts and is managed by Azure Backup for all storage accounts containing protected file shares.
1515

16-
The following flow chart shows the different steps and states of a backup item when soft delete is enabled for file shares in a storage account:
16+
The following flow diagram shows the process and different states a file share experiences when soft delete is enabled in a storage account. It visually explains how backup items are protected and can be recovered after accidental deletion.
1717

18-
![Soft delete flow chart](./media/soft-delete-afs/soft-delete-flow-chart.png)
18+
:::image type="content" source="./media/soft-delete-afs/soft-delete-flow-chart.png" alt-text="Diagram shows the journey of deleted data when Soft delete is in enabled state on a vault.":::
1919

20-
## Frequently asked questions
20+
## Frequently asked questions: Azure Backup Soft Delete for Azure Files
2121

22-
### When will soft delete be enabled for file shares in my storage account?
22+
This section answers some common questions about Soft Delete for Azure Files when using Azure Backup.
23+
24+
### When does Azure Backup enable soft delete for file shares in my storage account?
2325

2426
When you configure backup for the first time for any file share in a storage account, Azure Backup service enables soft delete for all file shares in the respective storage account.
2527

26-
### Can I configure the number of days for which my snapshots and restore points will be retained in soft-deleted state after I delete the file share?
28+
### Can I set the retention duration of a soft-deleted file shares and snapshots?
29+
30+
Yes. You can set the retention period to match your needs. See [this document](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal) for steps. For backed-up file shares, the minimum retention is 14 days.
2731

2832
Yes, you can set the retention period according to your requirements. [This document](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal) explains the steps to configure the retention period. For storage accounts with backed-up file shares, the minimum retention setting should be 14 days.
2933

@@ -33,15 +37,15 @@ From a security perspective, we recommend having minimum retention of 14 days fo
3337

3438
### What is the cost incurred during the retention period?
3539

36-
During the soft-deleted period, the protected instance cost and snapshot storage cost will stay as is. Also, you'll be charged for the used capacity at the regular rate for standard file shares and at snapshot storage rate for premium file shares.
40+
During the soft-deleted period, the protected instance cost and snapshot storage cost stay as is. You're also charged for the used capacity at the regular rate for standard file shares and at snapshot storage rate for premium file shares.
3741

3842
### Can I perform a restore operation when my data is in soft deleted state?
3943

40-
You need to first undelete the soft deleted file share to perform restore operations. The undelete operation will bring the file share into the backed-up state where you can restore to any point in time. To learn how to undelete your file share, visit [this link](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal#restore-soft-deleted-file-share) or see the [Undelete File Share Script](./scripts/backup-powershell-script-undelete-file-share.md).
44+
You need to first undelete the soft deleted file share to perform restore operations. The undelete operation brings the file share into the backed-up state where you can restore to any point in time. To learn how to undelete your file share, visit [this link](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal#restore-soft-deleted-file-share) or see the [Undelete File Share Script](./scripts/backup-powershell-script-undelete-file-share.md).
4145

4246
### How can I purge the data of a file share in a storage account that has at least one protected file share?
4347

44-
If you have at least one protected file share in a storage account, it means that soft delete is enabled for all file shares in that account and your data will be retained for 14 days after the delete operation. But if you want to purge the data right away and don’t want it to be retained then follow these steps:
48+
If you have at least one protected file share in a storage account, it means that soft delete is enabled for all file shares in that account and your data is retained for 14 days after the delete operation. But if you want to purge the data right away and don’t want it to be retained then follow these steps:
4549

4650
1. If you already deleted the file share while Soft Delete was enabled, then first undelete the file share from the [Files portal](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal#restore-soft-deleted-file-share) or by using the [Undelete File Share Script](./scripts/backup-powershell-script-undelete-file-share.md).
4751
2. Disable soft delete for file shares in your storage account by following the steps mentioned in [this document](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal#disable-soft-delete).
@@ -51,12 +55,12 @@ If you have at least one protected file share in a storage account, it means tha
5155
>You should perform step 2 before the next scheduled backup job runs against the protected file share in your storage account. Because whenever the backup job runs, it re-enables soft delete for all file shares in the storage account.
5256
5357
>[!WARNING]
54-
>After disabling soft delete in step 2, any delete operation performed against the file shares is a permanent delete operation. So if you accidentally delete the backed-up file share after disabling soft delete, you'll lose all your snapshots and won’t be able to recover your data.
58+
>After you disable soft delete in step 2, any delete operation performed against the file shares is a permanent delete operation. So if you accidentally delete the backed-up file share after disabling soft delete, you'll lose all your snapshots and won’t be able to recover your data.
5559
56-
### In the context of a file share’s soft delete setting, what changes does Azure Backup do when I unregister a storage account?
60+
### What happens to the soft delete setting for file shares when I unregister a storage account from Azure Backup?
5761

5862
At the time of unregistration, Azure Backup checks the retention period setting for file shares and if it's greater than 14 days or less than 14 days, it leaves the retention as is. However, if the retention is 14 days, we consider it as being enabled by Azure Backup and so we disable the soft delete during the unregistration process. If you want to unregister the storage account while keeping the retention setting as is, enable it again from the storage account pane after completing unregistration. You can refer to [this link](../storage/files/storage-files-enable-soft-delete.md?tabs=azure-portal#restore-soft-deleted-file-share) for the configuration steps.
5963

6064
## Next steps
6165

62-
Learn how to [Backup Azure File Shares from the Azure portal](backup-afs.md)
66+
Learn how to [Backup Azure Files from the Azure portal](backup-afs.md).

0 commit comments

Comments
 (0)