You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/install-mars-agent.md
+18-14Lines changed: 18 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Install the Microsoft Azure Recovery Services (MARS) agent
3
3
description: Learn how to install the Microsoft Azure Recovery Services (MARS) agent to back up Windows machines.
4
4
ms.topic: how-to
5
-
ms.date: 11/07/2023
5
+
ms.date: 10/25/2024
6
6
ms.service: azure-backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-abhmallick
@@ -11,7 +11,7 @@ ms.author: v-abhmallick
11
11
12
12
# Install the Azure Backup MARS agent
13
13
14
-
This article explains how to install the Microsoft Azure Recovery Services (MARS) agent. MARS is also known as the Azure Backup agent.
14
+
This article describes how to install the Microsoft Azure Recovery Services (MARS) agent. MARS is also known as the Azure Backup agent.
15
15
16
16
## About the MARS agent
17
17
@@ -26,10 +26,12 @@ The data that's available for backup depends on where the agent is installed.
26
26
> [!NOTE]
27
27
> Generally, you back up an Azure VM by using an Azure Backup extension on the VM. This method backs up the entire VM. If you want to back up specific files and folders on the VM, install and use the MARS agent alongside the extension. For more information, see [Architecture of a built-in Azure VM backup](backup-architecture.md#architecture-built-in-azure-vm-backup).
28
28
29
-

29
+

30
30
31
31
## Before you start
32
32
33
+
Before you install the MARS agent, ensure that you have performed the following actions:
34
+
33
35
* Learn how [Azure Backup uses the MARS agent to back up Windows machines](backup-architecture.md#architecture-direct-backup-of-on-premises-windows-server-machines-or-azure-vm-files-or-folders).
34
36
* Learn about the [backup architecture](backup-architecture.md#architecture-back-up-to-dpmmabs) that runs the MARS agent on a secondary MABS or Data Protection Manager server.
35
37
* Review [what's supported and what you can back up](backup-support-matrix-mars-agent.md) by the MARS agent.
@@ -48,15 +50,15 @@ By default, vaults use [geo-redundant storage (GRS)](../storage/common/storage-r
48
50
* If the vault is your primary backup mechanism, we recommend that you use GRS.
49
51
* You can use [locally redundant storage (LRS)](../storage/common/storage-redundancy.md#locally-redundant-storage) to reduce Azure storage costs.
50
52
51
-
To modify the storage replication type:
53
+
To modify the storage replication type, follow these steps:
52
54
53
55
1. In the new vault, select **Properties** under the **Settings** section.
54
56
55
57
1. On the **Properties** page, under **Backup Configuration**, select **Update**.
56
58
57
59
1. Select the storage replication type, and select **Save**.

60
62
61
63
> [!NOTE]
62
64
> You can't modify the storage replication type after the vault is set up and contains backup items. If you want to do this, you need to re-create the vault.
@@ -80,46 +82,48 @@ If you've already installed the agent on any machines, ensure you're running the
80
82
81
83
1. In the vault, under **Getting Started**, select **Backup**.
82
84
83
-

85
+

84
86
85
87
1. Under **Where is your workload running?**, select **On-premises**. Select this option even if you want to install the MARS agent on an Azure VM.
86
88
1. Under **What do you want to back up?**, select **Files and folders**. You can also select **System State**. Many other options are available, but these options are supported only if you're running a secondary backup server. Select **Prepare Infrastructure**.
87
89
88
-

90
+

89
91
90
92
1. For **Prepare infrastructure**, under **Install Recovery Services agent**, download the MARS agent.
91
93
92
-

94
+

93
95
94
96
1. In the download menu, select **Save**. By default, the *MARSagentinstaller.exe* file is saved to your Downloads folder.
95
97
96
98
1. Select **Already download or using the latest Recovery Services Agent**, and then download the vault credentials.

99
101
100
102
1. Select **Save**. The file is downloaded to your Downloads folder. You can't open the vault credentials file.
101
103
102
104
## Install and register the agent
103
105
106
+
To install and register the MARRS agent, follow these steps:
107
+
104
108
1. Run the *MARSagentinstaller.exe* file on the machines that you want to back up.
105
109
1. In the MARS Agent Setup Wizard, select **Installation Settings**. There, choose where to install the agent, and choose a location for the cache. Then select **Next**.
106
110
* Azure Backup uses the cache to store data snapshots before sending them to Azure.
107
111
* The cache location should have free space equal to at least 5 percent of the size of the data you'll back up.
108
112
109
-

113
+

110
114
111
115
1. For **Proxy Configuration**, specify how the agent that runs on the Windows machine will connect to the internet. Then select **Next**.
112
116
113
117
* If you use a custom proxy, specify any necessary proxy settings and credentials.
114
118
* Remember that the agent needs access to [specific URLs](#before-you-start).
115
119
116
-

120
+

117
121
118
122
1. For **Installation**, review the prerequisites, and select **Install**.
119
123
1. After the agent is installed, select **Proceed to Registration**.
120
124
1. In **Register Server Wizard** > **Vault Identification**, browse to and select the credentials file that you downloaded. Then select **Next**.
121
125
122
-

126
+

123
127
124
128
1. On the **Encryption Setting** page, specify a passphrase that will be used to encrypt and decrypt backups for the machine. [Learn more](backup-azure-file-folder-backup-faq.yml#what-characters-are-allowed-for-the-passphrase-) about the allowed passphrase characters.
125
129
@@ -130,7 +134,7 @@ If you've already installed the agent on any machines, ensure you're running the
130
134
131
135
After granting the required permissions, you can save the passphrase to the Key Vault by copying the *Key Vault URI* from the Azure portal and to the Register Server Wizard.
132
136
133
-
:::image type="content" source="./media/backup-configure-vault/encryption-settings-passphrase-to-encrypt-decrypt-backups.png" alt-text="Screenshot showing to specify a passphrase to be used to encrypt and decrypt backups for machines.":::
137
+
:::image type="content" source="./media/backup-configure-vault/encryption-settings-passphrase-to-encrypt-decrypt-backups.png" alt-text="Screenshot shows how to specify a passphrase to be used to encrypt and decrypt backups for machines.":::
134
138
135
139
1. Select **Finish**. The agent is now installed, and your machine is registered to the vault. You're ready to configure and schedule your backup.
136
140
@@ -139,6 +143,6 @@ If you've already installed the agent on any machines, ensure you're running the
139
143
>[!Note]
140
144
>We recommend to save your passphrase in an alternate secure location, such as the Azure key vault. Microsoft can't recover the data without the passphrase. [Learn](save-backup-passphrase-securely-in-azure-key-vault.md) how to store a secret in a Key Vault.
141
145
142
-
## Next steps
146
+
## Next step
143
147
144
148
Learn how to [Back up Windows machines by using the Azure Backup MARS agent](backup-windows-with-mars-agent.md)
Copy file name to clipboardExpand all lines: articles/backup/quick-backup-aks.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: "Quickstart: Configure an Azure Kubernetes Services cluster backup"
3
3
description: Learn how to configure backup for an Azure Kubernetes Service (AKS) cluster, and then use Azure Backup to back up specific items in the cluster.
Copy file name to clipboardExpand all lines: articles/bastion/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ You can also find the latest Bastion updates and subscribe to the RSS feed [here
26
26
|Feature | [Graphical session recording](session-recording.md) | Graphical session recording is now in public preview in all regions that Bastion is available in. | June 2024 | Can't currently be used with native client.
27
27
| Feature | [Private Only Bastion](private-only-deployment.md)| Private Only Bastion is now in public preview in all regions that Bastion is available in.| June 2024 | N/A|
28
28
| SKU | [Bastion Premium SKU](bastion-overview.md#sku)| Bastion Premium SKU is now in public preview in all regions that Bastion is available in. | June 2024 | N/A|
29
-
|Feature | [Availability Zones for Bastion](../reliability/reliability-bastion.md?toc=/azure/bastion/TOC.json) |Availability Zones is now in public preview as a customer-enabled feature in select regions. | May 2024 | See available region list [here](../reliability/reliability-bastion.md?toc=%2Fazure%2Fbastion%2FTOC.json#prerequisites).
29
+
|Feature | [Availability Zones for Bastion](../reliability/reliability-bastion.md?toc=/azure/bastion/TOC.json) |Availability Zones is now in public preview as a customer-enabled feature in select regions. | May 2024 | See available region list [here](../reliability/reliability-bastion.md?toc=%2Fazure%2Fbastion%2FTOC.json#regions-supported).
30
30
|SKU | [Bastion Developer SKU](quickstart-developer-sku.md) | Bastion Developer SKU is now in GA for select regions. | May 2024 | See available region list [here](quickstart-developer-sku.md#about-the-developer-sku).
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/manage-teams-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ The service principal of the Contoso application in the Fabrikam tenant is creat
107
107
You can see that the status of the Communication Services Teams.ManageCalls and Teams.ManageChats permissions are *Granted for {Directory_name}*.
108
108
109
109
110
-
If you run into the issue "The app is trying to access a service '00001111-aaaa-2222-bbbb-3333cccc4444'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
110
+
If you run into the issue "The app is trying to access a service '1fd5118e-2576-4263-8130-9503064c837a'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
111
111
112
112
You will require **Application.ReadWrite.All** as shown below.
## Assign an Admin user to the Project Synergy application
@@ -161,7 +161,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
161
161
1. Run the following PowerShell commands. These commands add the following roles for Azure Communications Gateway: `TrunkManagement.Read`, `TrunkManagement.Write`, `partnerSettings.Read`, `NumberManagement.Read`, `NumberManagement.Write`, `Data.Read`, `Data.Write`.
162
162
```powershell
163
163
# Get the Service Principal ID for Project Synergy (Operator Connect)
@@ -223,13 +223,13 @@ Go to the [Operator Connect homepage](https://operatorconnect.microsoft.com/) an
223
223
224
224
You must enable Azure Communications Gateway within the Operator Connect or Teams Phone Mobile environment. This process requires configuring your environment with two Application IDs:
225
225
- The Application ID of the system-assigned managed identity that you found in [Find the Application ID for your Azure Communication Gateway resource](#find-the-application-id-for-your-azure-communication-gateway-resource). This Application ID allows Azure Communications Gateway to use the roles that you set up in [Set up application roles for Azure Communications Gateway](#set-up-application-roles-for-azure-communications-gateway).
226
-
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `11112222-bbbb-3333-cccc-4444dddd5555`.
226
+
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `8502a0ec-c76d-412f-836c-398018e2312b`.
227
227
228
228
To add the Application IDs:
229
229
230
230
1. Log into the [Operator Connect portal](https://operatorconnect.microsoft.com/operator/configuration).
231
231
1. Add a new **Application Id** for the Application ID that you found for the managed identity.
232
-
1. Add a second **Application Id** for the value `11112222-bbbb-3333-cccc-4444dddd5555`.
232
+
1. Add a second **Application Id** for the value `8502a0ec-c76d-412f-836c-398018e2312b`.
233
233
234
234
## Register your deployment's domain name in Microsoft Entra
Copy file name to clipboardExpand all lines: articles/confidential-computing/quick-create-confidential-vm-azure-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,15 +86,15 @@ To create a confidential [disk encryption set](/azure/virtual-machines/linux/dis
86
86
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role. [Install Microsoft Graph SDK](/powershell/microsoftgraph/installation) to execute the commands below.
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
89
+
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
90
90
```
91
91
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
0 commit comments