Skip to content

Commit befb5d5

Browse files
Merge pull request #257576 from AbhishekMallick-MS/Nov-2-2023-MARS
Save passphrase in Key Vault GA
2 parents 18ccf9d + b210822 commit befb5d5

File tree

5 files changed

+81
-17
lines changed

5 files changed

+81
-17
lines changed

articles/backup/backup-azure-manage-mars.md

Lines changed: 29 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Manage and monitor MARS Agent backups
33
description: Learn how to manage and monitor Microsoft Azure Recovery Services (MARS) Agent backups by using the Azure Backup service.
44
ms.reviewer: srinathv
55
ms.topic: how-to
6-
ms.date: 12/28/2022
6+
ms.date: 11/07/2023
77
ms.service: backup
88
ms.custom: engagement-fy23
99
author: AbhishekMallick-MS
@@ -21,7 +21,7 @@ When you modify backup policy, you can add new items, remove existing items from
2121
- **Remove Items** use this option to remove items from being backed up.
2222
- Use **Exclusion Settings** for removing all items within a volume instead of **Remove Items**.
2323
- Clearing all selections in a volume causes old backups of the items, to be retained according to retention settings at the time of the last backup, without scope for modification.
24-
- Reselecting these items, leads to a first full-backup and new policy changes aren't applied to old backups.
24+
- By reselecting these items, lead to a first full-backup and new policy changes aren't applied to old backups.
2525
- Unselecting entire volume retains past backup without any scope for modifying retention policy.
2626
- **Exclusion Settings** use this option to exclude specific items from being backed up.
2727

@@ -84,7 +84,7 @@ You can add exclusion rules to skip files and folders that you don't want to be
8484

8585
## Stop protecting Files and Folder backup
8686

87-
There are two ways to stop protecting Files and Folders backup:
87+
There are three ways to stop protecting Files and Folders backup:
8888

8989
- **Stop protection and retain backup data**.
9090
- This option will stop all future backup jobs from protection.
@@ -94,6 +94,12 @@ There are two ways to stop protecting Files and Folders backup:
9494
- **Stop protection and delete backup data**.
9595
- This option will stop all future backup jobs from protecting your data. If the vault security features are not enabled, all recovery points are immediately deleted.<br>If the security features are enabled, the deletion is delayed by 14 days, and you'll receive an alert email with a message: *Your data for this Backup item has been deleted. This data will be temporarily available for 14 days, after which it will be permanently deleted* and a recommended action *Reprotect the Backup item within 14 days to recover your data.*<br>In this state, the retention policy continues to apply, and the backup data remains billable. [Learn more](backup-azure-security-feature.md#enable-security-features) on how to enable vault security features.
9696
- To resume protection, reprotect the server within 14 days from the delete operation. In this duration, you can also restore the data to an alternate server.
97+
- **Stop protection and retain data by policy**.
98+
- This option stops future backup jobs from protection.
99+
- Azure Backup service will prune recovery points as per the policy configured.
100+
- You can restore the backed-up data from existing recovery points.
101+
- To resume protection, use the **Re-enable backup schedule** option. After that, data will be retained based on the new retention policy.
102+
- If all recovery points expire before reenabling backup, you need to do a full initial backup of the data source.
97103

98104
### Stop protection and retain backup data
99105

@@ -134,6 +140,26 @@ There are two ways to stop protecting Files and Folders backup:
134140

135141
After you delete the on-premises backup items, follow the next steps from the portal.
136142

143+
144+
145+
146+
### Stop protection and retain backup data by policy
147+
148+
Follow these steps:
149+
150+
1. Open the *MARS management* console, go to the **Actions** pane, and then select **Schedule Backup**.
151+
2. On the **Select Policy Item** page, select **Modify a backup schedule for your files and folders** > **Next**.
152+
3. On the **Modify or Stop a Scheduled Backup** page, select **Stop using this backup schedule, and enable RP pruning as per policy** > **Next**.
153+
4. On **Pause Scheduled Backup**, review the information and select **Finish**.
154+
5. On **Modify backup progress**, check if your schedule backup pause is in *Success* status, and select **Close** to finish.
155+
156+
>[!Note]
157+
>This feature is supported from MARS *2.0.9262.0* or later.
158+
159+
160+
161+
162+
137163
## Re-enable protection
138164

139165
If you stopped protection while retaining data and decided to resume protection, then you can re-enable the backup schedule using modify backup policy.

articles/backup/backup-azure-security-feature.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,12 @@ Checks have been added to make sure only valid users can perform various operati
7979

8080
### Authentication to perform critical operations
8181

82-
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform **Stop Protection with Delete data** and **Change Passphrase** operations.
82+
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform **Stop Protection with Delete data** and **Change Passphrase** operations for DPM, MABS, and MARS.
83+
84+
Additionally, with MARS version *2.0.9262.0* and later, the operations to remove a volume from MARS file/folder backup, add a new exclusion setting for an existing volume, reduce retention duration, and move to a less-frequent backup schedule are also protected with a security pin for additional security.
85+
86+
87+
8388

8489
> [!NOTE]
8590
> Currently, for the following DPM and MABS versions, security PIN is supported for **Stop Protection with Delete data** to online storage:
@@ -141,9 +146,9 @@ The following table lists the disallowed operations for MARS when immutability i
141146
| Disallowed operation | Result with latest MARS agent | Result with old MARS agent |
142147
| --- | --- | --- |
143148
| **Stop protection with delete data for system state** | Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
144-
| **Stop protection with delete data for file/folder** | Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
149+
| **Stop protection with delete data** | Error 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. | Error 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> MARS *2.0.9262.0* and later provide the option of stopping protection and retaining recovery points according to the policy in the console. |
145150
| **Reduce online retention period** | User trying to modify policy or protection with reduction of retention. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. |
146-
| **Remove-OBPolicy with -DeleteBackup flag** | 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. <br><br> Use *–EnablePruning* flag to retain backups up to their retention period. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> Don't use the *-DeleteBackup* flag. |
151+
| **Remove-OBPolicy with -DeleteBackup flag** | 810001 <br><br> User trying to delete backup item or stop protection with delete data where backup item has valid (unexpired) recovery point. <br><br> Use *–EnablePruning* flag to retain backups up to their retention period. | 130001 <br><br> Microsoft Azure Backup encountered an internal error. <br><br> Don't use the *-DeleteBackup* flag. <br><br> MARS *2.0.9262.0* and later provide the option of stopping protection and retaining recovery points according to the policy in the console. |
147152

148153

149154
## Next steps

articles/backup/install-mars-agent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Install the Microsoft Azure Recovery Services (MARS) agent
33
description: Learn how to install the Microsoft Azure Recovery Services (MARS) agent to back up Windows machines.
44
ms.topic: how-to
5-
ms.date: 08/18/2023
5+
ms.date: 11/07/2023
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -62,7 +62,7 @@ To modify the storage replication type:
6262
> You can't modify the storage replication type after the vault is set up and contains backup items. If you want to do this, you need to re-create the vault.
6363
>
6464
65-
## Configure Recovery Services vault to save passphrase to Recovery Services vault (preview)
65+
## Configure Recovery Services vault to save passphrase to Recovery Services vault
6666

6767
Azure Backup using the Recovery Services agent (MARS) allows you to back up file or folder and system state data to Azure Recovery Services vault. This data is encrypted using a passphrase provided during the installation and registration of the MARS agent. This passphrase is required to retrieve and restore the backup data and needs to be saved in a secure external location, such as Azure Key Vault.
6868

@@ -130,7 +130,7 @@ If you've already installed the agent on any machines, ensure you're running the
130130

131131
After granting the required permissions, you can save the passphrase to the Key Vault by copying the *Key Vault URI* from the Azure portal and to the Register Server Wizard.
132132

133-
:::image type="content" source="./media/backup-configure-vault/encryption-settings-passphrase-to-encrypt-decrypt-backups.png" alt-text="Screenshot showing to specify a passphrase to be used to encrypt and decrypt backups for machines.":::
133+
134134

135135
1. Select **Finish**. The agent is now installed, and your machine is registered to the vault. You're ready to configure and schedule your backup.
136136

articles/backup/save-backup-passphrase-securely-in-azure-key-vault.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Save and manage MARS agent passphrase securely in Azure Key Vault (preview)
2+
title: Save and manage MARS agent passphrase securely in Azure Key Vault
33
description: Learn how to save MARS agent passphrase securely in Azure Key Vault and retrieve them during restore.
44
ms.topic: how-to
5-
ms.date: 08/18/2023
5+
ms.date: 11/07/2023
66
ms.reviewer: sooryar
77
ms.service: backup
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell
99
author: AbhishekMallick-MS
1010
ms.author: v-abhmallick
1111
---
1212

13-
# Save and manage MARS agent passphrase securely in Azure Key Vault (preview)
13+
# Save and manage MARS agent passphrase securely in Azure Key Vault
1414

1515
Azure Backup using the Recovery Services agent (MARS) allows you back up files/folders and system state data to Azure Recovery Services vault. This data is encrypted using a passphrase you provide during the installation and registration of the MARS agent. This passphrase is required to retrieve and restore the backup data and needs to be saved in a secure external location.
1616

@@ -26,7 +26,7 @@ Now, you can save your encryption passphrase securely in Azure Key Vault as a Se
2626
- You should use a single Azure Key Vault to store all your passphrases. [Create a Key Vault](../key-vault/general/quick-create-portal.md) in case you don't have one.
2727
- [Azure Key Vault pricing](https://azure.microsoft.com/pricing/details/key-vault/) is applicable when you create a new Azure Key Vault to store your passphrase.
2828
- After you create the Key Vault, to protect against accidental or malicious deletion of passphrase, [ensure that soft-delete and purge protection is turned on](../key-vault/general/soft-delete-overview.md).
29-
- This feature is supported only in Azure public regions with MARS agent version *2.0.9254.0* or above.
29+
- This feature is supported only in Azure public regions with MARS agent version *2.0.9262.0* or above.
3030

3131
## Configure the Recovery Services vault to store passphrase to Azure Key Vault
3232

@@ -326,7 +326,7 @@ Before proceeding to install the MARS agent, ensure that you have [configured t
326326

327327
6. After providing the *Recovery Services vault credentials* during registration, in the **Encryption Setting**, select the option to save the passphrase to Azure Key Vault.
328328

329-
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/save-passphrase.png" alt-text="Screenshot shows the option to save the passphrase to Azure Key Vault to be selected." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/save-passphrase.png":::
329+
330330

331331
7. Enter your *passphrase* or select **Generate Passphrase**.
332332
4. In the *Azure portal*, open your *Key Vault*, copy the *Key Vault URI*.
@@ -347,7 +347,7 @@ You can automate this process by using the new KeyVaultUri option in `Set-OBMach
347347

348348
## Save passphrase to Azure Key Vault for an existing MARS installation
349349

350-
If you have an existing MARS agent installation and want to save your passphrase to Azure Key Vault, [update your agent](upgrade-mars-agent.md) to version *2.0.9254.0* or above and perform a change passphrase operation.
350+
If you have an existing MARS agent installation and want to save your passphrase to Azure Key Vault, [update your agent](upgrade-mars-agent.md) to version *2.0.9262.0* or above and perform a change passphrase operation.
351351

352352
After updating your MARS agent, ensure that you have [configured the Recovery Services vault to store passphrase to Azure Key Vault](#configure-the-recovery-services-vault-to-store-passphrase-to-azure-key-vault) and you have successfully:
353353

@@ -371,7 +371,7 @@ To save the passphrase to Key Vault:
371371
>[!Note]
372372
>If the machine is already configured to save passphrase to Key Vault, the Key Vault URI will be populated in the text box automatically.
373373
374-
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/enter-key-vault-url.png" alt-text="Screenshot shows the option to save passphrase to Key Vault by providing a Key Vault URI gets generated." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/enter-key-vault-url.png":::
374+
375375

376376
3. Open the *Azure portal*, open your *Key Vault*, and then *copy the Key Vault URI*.
377377

@@ -450,6 +450,19 @@ This section lists commonly encountered errors when saving the passphrase to Azu
450450

451451
:::image type="content" source="./media/save-backup-passphrase-securely-in-azure-key-vault/copy-key-vault-url.png" alt-text="Screenshot shows how to copy Kay Vault URL." lightbox="./media/save-backup-passphrase-securely-in-azure-key-vault/copy-key-vault-url.png":::
452452

453+
454+
### UserErrorSecretExistsSoftDeleted (391282)
455+
456+
**Cause**: A secret in the expected format already exists in the Key Vault, but it's in a soft-deleted state. Unless the secret is restored, MARS can't save the passphrase for that machine to the provided Key Vault.
457+
458+
**Recommended action**: Check if a secret exists in the vault with the name `AzBackup-<machine name>-<vaultname>` and if it's in a soft-deleted state. Recover the soft deleted Secret to save the passphrase to it.
459+
460+
### UserErrorKeyVaultSoftDeleted (391283)
461+
462+
**Cause**: The Key Vault provided to MARS is in a soft-deleted state.
463+
464+
**Recommended action**: Recover the Key Vault or provide a new Key Vault.
465+
453466
### Registration is incomplete
454467

455468
**Cause**: You didn't complete the MARS registration by registering the passphrase. So, you'll not be able to configure backups until you register.

articles/backup/whats-new.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What's new in Azure Backup
33
description: Learn about the new features in the Azure Backup service.
44
ms.topic: conceptual
5-
ms.date: 11/02/2023
5+
ms.date: 11/07/2023
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -17,6 +17,8 @@ You can learn more about the new releases by bookmarking this page or by [subscr
1717
## Updates summary
1818

1919
- November 2023
20+
- [Save your MARS backup passphrase securely to Azure Key Vault is now generally available.](#save-your-mars-backup-passphrase-securely-to-azure-key-vault-is-now-generally-available)
21+
- [Update Rollup 1 for Microsoft Azure Backup Server v4 is now generally available](#update-rollup-1-for-microsoft-azure-backup-server-v4-is-now-generally-available)
2022
- [SAP HANA instance snapshot backup support is now generally available](#sap-hana-instance-snapshot-backup-support-is-now-generally-available)
2123
- September 2023
2224
- [Multi-user authorization using Resource Guard for Backup vault is now generally available](#multi-user-authorization-using-resource-guard-for-backup-vault-is-now-generally-available)
@@ -70,6 +72,24 @@ You can learn more about the new releases by bookmarking this page or by [subscr
7072
- February 2021
7173
- [Backup for Azure Blobs (in preview)](#backup-for-azure-blobs-in-preview)
7274

75+
## Save your MARS backup passphrase securely to Azure Key Vault is now generally available.
76+
77+
Azure Backup now allows you to save the MARS passphrase to Azure Key Vault automatically from the MARS console during registration or changing passphrase with MARS agent.
78+
79+
The MARS agent from Azure Backup requires a passphrase that you provide to encrypt the backups sent to and stored on Azure Recovery Services vault. This passphrase isn't shared with Microsoft and needs to be saved in a secure location to ensure that the backups can be retrieved if the server backed up with MARS goes down.
80+
81+
For more information, see [Save and manage MARS agent passphrase securely in Azure Key Vault](save-backup-passphrase-securely-in-azure-key-vault.md).
82+
83+
## Update Rollup 1 for Microsoft Azure Backup Server v4 is now generally available
84+
85+
Azure Backup now provides Update Rollup 1 for Microsoft Azure Backup Server (MABS) V4.
86+
87+
- It contains new features, such as item-level recovery from online recovery points for VMware VMs, support for Windows and Basic SMTP authentication for MABS email reports and alerts, and other enhancements.
88+
- It also contains stability improvements and bug fixes on MABS V4.
89+
90+
For more information, see [What's new in MABS](backup-mabs-whats-new-mabs.md).
91+
92+
7393
## SAP HANA instance snapshot backup support is now generally available
7494

7595
Azure Backup now supports SAP HANA instance snapshot backup and enhanced restore, which provides a cost-effective backup solution using managed disk incremental snapshots. Because instant backup uses snapshot, the effect on the database is minimum.

0 commit comments

Comments
 (0)