You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-manage-mars.md
+29-3Lines changed: 29 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Manage and monitor MARS Agent backups
3
3
description: Learn how to manage and monitor Microsoft Azure Recovery Services (MARS) Agent backups by using the Azure Backup service.
4
4
ms.reviewer: srinathv
5
5
ms.topic: how-to
6
-
ms.date: 12/28/2022
6
+
ms.date: 11/07/2023
7
7
ms.service: backup
8
8
ms.custom: engagement-fy23
9
9
author: AbhishekMallick-MS
@@ -21,7 +21,7 @@ When you modify backup policy, you can add new items, remove existing items from
21
21
-**Remove Items** use this option to remove items from being backed up.
22
22
- Use **Exclusion Settings** for removing all items within a volume instead of **Remove Items**.
23
23
- Clearing all selections in a volume causes old backups of the items, to be retained according to retention settings at the time of the last backup, without scope for modification.
24
-
-Reselecting these items, leads to a first full-backup and new policy changes aren't applied to old backups.
24
+
-By reselecting these items, lead to a first full-backup and new policy changes aren't applied to old backups.
25
25
- Unselecting entire volume retains past backup without any scope for modifying retention policy.
26
26
-**Exclusion Settings** use this option to exclude specific items from being backed up.
27
27
@@ -84,7 +84,7 @@ You can add exclusion rules to skip files and folders that you don't want to be
84
84
85
85
## Stop protecting Files and Folder backup
86
86
87
-
There are two ways to stop protecting Files and Folders backup:
87
+
There are three ways to stop protecting Files and Folders backup:
88
88
89
89
-**Stop protection and retain backup data**.
90
90
- This option will stop all future backup jobs from protection.
@@ -94,6 +94,12 @@ There are two ways to stop protecting Files and Folders backup:
94
94
-**Stop protection and delete backup data**.
95
95
- This option will stop all future backup jobs from protecting your data. If the vault security features are not enabled, all recovery points are immediately deleted.<br>If the security features are enabled, the deletion is delayed by 14 days, and you'll receive an alert email with a message: *Your data for this Backup item has been deleted. This data will be temporarily available for 14 days, after which it will be permanently deleted* and a recommended action *Reprotect the Backup item within 14 days to recover your data.*<br>In this state, the retention policy continues to apply, and the backup data remains billable. [Learn more](backup-azure-security-feature.md#enable-security-features) on how to enable vault security features.
96
96
- To resume protection, reprotect the server within 14 days from the delete operation. In this duration, you can also restore the data to an alternate server.
97
+
-**Stop protection and retain data by policy**.
98
+
- This option stops future backup jobs from protection.
99
+
- Azure Backup service will prune recovery points as per the policy configured.
100
+
- You can restore the backed-up data from existing recovery points.
101
+
- To resume protection, use the **Re-enable backup schedule** option. After that, data will be retained based on the new retention policy.
102
+
- If all recovery points expire before reenabling backup, you need to do a full initial backup of the data source.
97
103
98
104
### Stop protection and retain backup data
99
105
@@ -134,6 +140,26 @@ There are two ways to stop protecting Files and Folders backup:
134
140
135
141
After you delete the on-premises backup items, follow the next steps from the portal.
136
142
143
+
144
+
145
+
146
+
### Stop protection and retain backup data by policy
147
+
148
+
Follow these steps:
149
+
150
+
1. Open the *MARS management* console, go to the **Actions** pane, and then select **Schedule Backup**.
151
+
2. On the **Select Policy Item** page, select **Modify a backup schedule for your files and folders** > **Next**.
152
+
3. On the **Modify or Stop a Scheduled Backup** page, select **Stop using this backup schedule, and enable RP pruning as per policy** > **Next**.
153
+
4. On **Pause Scheduled Backup**, review the information and select **Finish**.
154
+
5. On **Modify backup progress**, check if your schedule backup pause is in *Success* status, and select **Close** to finish.
155
+
156
+
>[!Note]
157
+
>This feature is supported from MARS *2.0.9262.0* or later.
158
+
159
+
160
+
161
+
162
+
137
163
## Re-enable protection
138
164
139
165
If you stopped protection while retaining data and decided to resume protection, then you can re-enable the backup schedule using modify backup policy.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-security-feature.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,12 @@ Checks have been added to make sure only valid users can perform various operati
79
79
80
80
### Authentication to perform critical operations
81
81
82
-
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform **Stop Protection with Delete data** and **Change Passphrase** operations.
82
+
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform **Stop Protection with Delete data** and **Change Passphrase** operations for DPM, MABS, and MARS.
83
+
84
+
Additionally, with MARS version *2.0.9262.0* and later, the operations to remove a volume from MARS file/folder backup, add a new exclusion setting for an existing volume, reduce retention duration, and move to a less-frequent backup schedule are also protected with a security pin for additional security.
85
+
86
+
87
+
83
88
84
89
> [!NOTE]
85
90
> Currently, for the following DPM and MABS versions, security PIN is supported for **Stop Protection with Delete data** to online storage:
@@ -141,9 +146,9 @@ The following table lists the disallowed operations for MARS when immutability i
141
146
| Disallowed operation | Result with latest MARS agent | Result with old MARS agent |
142
147
| --- | --- | --- |
143
148
|**Stop protection with delete data for system state**| Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
144
-
|**Stop protection with delete data for file/folder**| Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
149
+
|**Stop protection with delete data**| Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> MARS *2.0.9262.0* and later provide the option of stopping protection and retaining recovery points according to the policy in the console. |
145
150
|**Reduce online retention period**| User trying to modify policy or protection with reduction of retention. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
146
-
|**Remove-OBPolicy with -DeleteBackup flag**| 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. <br><br> Use *–EnablePruning* flag to retain backups up to their retention period. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> Don't use the *-DeleteBackup* flag. |
151
+
|**Remove-OBPolicy with -DeleteBackup flag**| 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. <br><br> Use *–EnablePruning* flag to retain backups up to their retention period. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> Don't use the *-DeleteBackup* flag. <br><br> MARS *2.0.9262.0* and later provide the option of stopping protection and retaining recovery points according to the policy in the console. |
Copy file name to clipboardExpand all lines: articles/backup/install-mars-agent.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Install the Microsoft Azure Recovery Services (MARS) agent
3
3
description: Learn how to install the Microsoft Azure Recovery Services (MARS) agent to back up Windows machines.
4
4
ms.topic: how-to
5
-
ms.date: 08/18/2023
5
+
ms.date: 11/07/2023
6
6
ms.service: backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-abhmallick
@@ -62,7 +62,7 @@ To modify the storage replication type:
62
62
> You can't modify the storage replication type after the vault is set up and contains backup items. If you want to do this, you need to re-create the vault.
63
63
>
64
64
65
-
## Configure Recovery Services vault to save passphrase to Recovery Services vault (preview)
65
+
## Configure Recovery Services vault to save passphrase to Recovery Services vault
66
66
67
67
Azure Backup using the Recovery Services agent (MARS) allows you to back up file or folder and system state data to Azure Recovery Services vault. This data is encrypted using a passphrase provided during the installation and registration of the MARS agent. This passphrase is required to retrieve and restore the backup data and needs to be saved in a secure external location, such as Azure Key Vault.
68
68
@@ -130,7 +130,7 @@ If you've already installed the agent on any machines, ensure you're running the
130
130
131
131
After granting the required permissions, you can save the passphrase to the Key Vault by copying the *Key Vault URI* from the Azure portal and to the Register Server Wizard.
132
132
133
-
:::image type="content" source="./media/backup-configure-vault/encryption-settings-passphrase-to-encrypt-decrypt-backups.png" alt-text="Screenshot showing to specify a passphrase to be used to encrypt and decrypt backups for machines.":::
133
+
134
134
135
135
1. Select **Finish**. The agent is now installed, and your machine is registered to the vault. You're ready to configure and schedule your backup.
# Save and manage MARS agent passphrase securely in Azure Key Vault (preview)
13
+
# Save and manage MARS agent passphrase securely in Azure Key Vault
14
14
15
15
Azure Backup using the Recovery Services agent (MARS) allows you back up files/folders and system state data to Azure Recovery Services vault. This data is encrypted using a passphrase you provide during the installation and registration of the MARS agent. This passphrase is required to retrieve and restore the backup data and needs to be saved in a secure external location.
16
16
@@ -26,7 +26,7 @@ Now, you can save your encryption passphrase securely in Azure Key Vault as a Se
26
26
- You should use a single Azure Key Vault to store all your passphrases. [Create a Key Vault](../key-vault/general/quick-create-portal.md) in case you don't have one.
27
27
-[Azure Key Vault pricing](https://azure.microsoft.com/pricing/details/key-vault/) is applicable when you create a new Azure Key Vault to store your passphrase.
28
28
- After you create the Key Vault, to protect against accidental or malicious deletion of passphrase, [ensure that soft-delete and purge protection is turned on](../key-vault/general/soft-delete-overview.md).
29
-
- This feature is supported only in Azure public regions with MARS agent version *2.0.9254.0* or above.
29
+
- This feature is supported only in Azure public regions with MARS agent version *2.0.9262.0* or above.
30
30
31
31
## Configure the Recovery Services vault to store passphrase to Azure Key Vault
32
32
@@ -326,7 +326,7 @@ Before proceeding to install the MARS agent, ensure that you have [configured t
326
326
327
327
6. After providing the *Recovery Services vault credentials* during registration, in the **Encryption Setting**, select the option to save the passphrase to Azure Key Vault.
328
328
329
-
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/save-passphrase.png" alt-text="Screenshot shows the option to save the passphrase to Azure Key Vault to be selected." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/save-passphrase.png":::
329
+
330
330
331
331
7. Enter your *passphrase* or select **Generate Passphrase**.
332
332
4. In the *Azure portal*, open your *Key Vault*, copy the *Key Vault URI*.
@@ -347,7 +347,7 @@ You can automate this process by using the new KeyVaultUri option in `Set-OBMach
347
347
348
348
## Save passphrase to Azure Key Vault for an existing MARS installation
349
349
350
-
If you have an existing MARS agent installation and want to save your passphrase to Azure Key Vault, [update your agent](upgrade-mars-agent.md) to version *2.0.9254.0* or above and perform a change passphrase operation.
350
+
If you have an existing MARS agent installation and want to save your passphrase to Azure Key Vault, [update your agent](upgrade-mars-agent.md) to version *2.0.9262.0* or above and perform a change passphrase operation.
351
351
352
352
After updating your MARS agent, ensure that you have [configured the Recovery Services vault to store passphrase to Azure Key Vault](#configure-the-recovery-services-vault-to-store-passphrase-to-azure-key-vault) and you have successfully:
353
353
@@ -371,7 +371,7 @@ To save the passphrase to Key Vault:
371
371
>[!Note]
372
372
>If the machine is already configured to save passphrase to Key Vault, the Key Vault URI will be populated in the text box automatically.
373
373
374
-
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/enter-key-vault-url.png" alt-text="Screenshot shows the option to save passphrase to Key Vault by providing a Key Vault URI gets generated." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/enter-key-vault-url.png":::
374
+
375
375
376
376
3. Open the *Azure portal*, open your *Key Vault*, and then *copy the Key Vault URI*.
377
377
@@ -450,6 +450,19 @@ This section lists commonly encountered errors when saving the passphrase to Azu
450
450
451
451
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/copy-key-vault-url.png" alt-text="Screenshot shows how to copy Kay Vault URL." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/copy-key-vault-url.png":::
452
452
453
+
454
+
### UserErrorSecretExistsSoftDeleted (391282)
455
+
456
+
**Cause**: A secret in the expected format already exists in the Key Vault, but it's in a soft-deleted state. Unless the secret is restored, MARS can't save the passphrase for that machine to the provided Key Vault.
457
+
458
+
**Recommended action**: Check if a secret exists in the vault with the name `AzBackup-<machine name>-<vaultname>` and if it's in a soft-deleted state. Recover the soft deleted Secret to save the passphrase to it.
459
+
460
+
### UserErrorKeyVaultSoftDeleted (391283)
461
+
462
+
**Cause**: The Key Vault provided to MARS is in a soft-deleted state.
463
+
464
+
**Recommended action**: Recover the Key Vault or provide a new Key Vault.
465
+
453
466
### Registration is incomplete
454
467
455
468
**Cause**: You didn't complete the MARS registration by registering the passphrase. So, you'll not be able to configure backups until you register.
Copy file name to clipboardExpand all lines: articles/backup/whats-new.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new in Azure Backup
3
3
description: Learn about the new features in the Azure Backup service.
4
4
ms.topic: conceptual
5
-
ms.date: 11/02/2023
5
+
ms.date: 11/07/2023
6
6
ms.service: backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-abhmallick
@@ -17,6 +17,8 @@ You can learn more about the new releases by bookmarking this page or by [subscr
17
17
## Updates summary
18
18
19
19
- November 2023
20
+
-[Save your MARS backup passphrase securely to Azure Key Vault is now generally available.](#save-your-mars-backup-passphrase-securely-to-azure-key-vault-is-now-generally-available)
21
+
-[Update Rollup 1 for Microsoft Azure Backup Server v4 is now generally available](#update-rollup-1-for-microsoft-azure-backup-server-v4-is-now-generally-available)
20
22
-[SAP HANA instance snapshot backup support is now generally available](#sap-hana-instance-snapshot-backup-support-is-now-generally-available)
21
23
- September 2023
22
24
-[Multi-user authorization using Resource Guard for Backup vault is now generally available](#multi-user-authorization-using-resource-guard-for-backup-vault-is-now-generally-available)
@@ -70,6 +72,24 @@ You can learn more about the new releases by bookmarking this page or by [subscr
70
72
- February 2021
71
73
-[Backup for Azure Blobs (in preview)](#backup-for-azure-blobs-in-preview)
72
74
75
+
## Save your MARS backup passphrase securely to Azure Key Vault is now generally available.
76
+
77
+
Azure Backup now allows you to save the MARS passphrase to Azure Key Vault automatically from the MARS console during registration or changing passphrase with MARS agent.
78
+
79
+
The MARS agent from Azure Backup requires a passphrase that you provide to encrypt the backups sent to and stored on Azure Recovery Services vault. This passphrase isn't shared with Microsoft and needs to be saved in a secure location to ensure that the backups can be retrieved if the server backed up with MARS goes down.
80
+
81
+
For more information, see [Save and manage MARS agent passphrase securely in Azure Key Vault](save-backup-passphrase-securely-in-azure-key-vault.md).
82
+
83
+
## Update Rollup 1 for Microsoft Azure Backup Server v4 is now generally available
84
+
85
+
Azure Backup now provides Update Rollup 1 for Microsoft Azure Backup Server (MABS) V4.
86
+
87
+
- It contains new features, such as item-level recovery from online recovery points for VMware VMs, support for Windows and Basic SMTP authentication for MABS email reports and alerts, and other enhancements.
88
+
- It also contains stability improvements and bug fixes on MABS V4.
89
+
90
+
For more information, see [What's new in MABS](backup-mabs-whats-new-mabs.md).
91
+
92
+
73
93
## SAP HANA instance snapshot backup support is now generally available
74
94
75
95
Azure Backup now supports SAP HANA instance snapshot backup and enhanced restore, which provides a cost-effective backup solution using managed disk incremental snapshots. Because instant backup uses snapshot, the effect on the database is minimum.
0 commit comments