Recoverability best practices

Unintended deletions and misconfigurations will happen to your tenant. To minimize the impact of these unintended events, you must prepare for their occurrence.

Recoverability is the preparatory processes and functionality that enable you to return your services to a prior functioning state after an unintended change. Unintended changes include the soft or hard deletion or misconfiguration of applications, groups, users, policies, and other objects in your Microsoft Entra tenant.

Recoverability helps your organization be more resilient. Resilience, while related, is different. Resilience is the ability to endure disruption to system components and recover with minimal impact to your business, users, customers, and operations. For more information about how to make your systems more resilient, see Building resilience into identity and access management with Microsoft Entra ID.

This article describes the best practices in preparing for deletions and misconfigurations to minimize the unintended consequences to your organization's business.

Deletions and misconfigurations

Deletions and misconfigurations have different impacts on your tenant.

Deletions

The impact of deletions depends on the object type.

Users, Microsoft 365 Groups, and applications can be soft deleted. Soft-deleted items are sent to the Microsoft Entra ID recycle bin. While in the recycle bin, items aren't available for use. However, they retain all their properties and can be restored via a Microsoft Graph API call or in the Azure portal. Items in the soft-delete state that aren't restored within 30 days are permanently, or hard, deleted.

Diagram that shows that users, Microsoft 365 Groups, and applications are soft deleted and then hard deleted after 30 days.

Important

All other object types are hard deleted immediately when they're selected for deletion. When an object is hard deleted, it can't be recovered. It must be re-created and reconfigured.

For more information on deletions and how to recover from them, see Recover from deletions.

Misconfigurations

Misconfigurations are configurations of a resource or policy that diverge from your organizational policies or plans and cause unintended or unwanted consequences. Misconfiguration of tenant-wide settings or Conditional Access policies can seriously affect your security and the public image of your organization. Misconfigurations can:

  • Change how administrators, tenant users, and external users interact with resources in your tenant.
  • Change the ability of your users to interact with other tenants and external users to interact with your tenant.
  • Cause denial of service.
  • Break dependencies among data, systems, and applications.

For more information on misconfigurations and how to recover from them, see Recover from misconfigurations.

Shared responsibility

Recoverability is a shared responsibility between Microsoft as your cloud service provider and your organization.

Diagram that shows shared responsibilities between Microsoft and customers for planning and recovery.

You can use the tools and services that Microsoft provides to prepare for deletions and misconfigurations.

Business continuity and disaster planning

Restoring a hard-deleted or misconfigured item is a resource-intensive process. You can minimize the resources needed by planning ahead. Consider having a specific team of admins in charge of restorations.

Test your restoration process

Rehearse your restoration process for different object types and the communication that will go out as a result. Be sure to rehearse with test objects, ideally in a test tenant.

Testing your plan can help you determine the:

  • Validity and completeness of your object state documentation.
  • Typical time to resolution.
  • Appropriate communications and their audiences.
  • Expected successes and potential challenges.

Create the communication process

Create a process of predefined communications to make others aware of the issue and timelines for restoration. Include the following points in your restoration communication plan:

  • The types of communications to go out. Consider creating predefined templates.

  • Stakeholders to receive communications. Include the following groups, as applicable:

    • Affected business owners.
    • Operational admins who will perform recovery.
    • Business and technical approvers.
    • Affected users.
  • Define the events that trigger communications, such as:

    • Initial deletion.
    • Impact assessment.
    • Time to resolution.
    • Restoration.

Document known good states

Document the state of your tenant and its objects regularly. Then if a hard delete or misconfiguration occurs, you have a roadmap to recovery. The following tools can help you document your current state:

Commonly used Microsoft Graph APIs

You can use Microsoft Graph APIs to export the current state of many Microsoft Entra configurations. The APIs cover most scenarios where reference material about the prior state, or the ability to apply that state from an exported copy, could become vital to keeping your business running.

Microsoft Graph APIs are highly customizable based on your organizational needs. To implement a solution for backups or reference material requires developers to engineer code to query for, store, and display the data. Many implementations use online code repositories as part of this functionality.

Useful APIs for recovery

Resource types Reference links
Users, groups, and other directory objects directoryObject API
user API
group API
application API
servicePrincipal API
Directory roles directoryRole API
roleManagement API
Conditional Access policies Conditional Access policy API
Devices devices API
Domains domains API
Administrative units administrative unit API
Deleted items* deletedItems API

*Securely store these configuration exports with access provided to a limited number of admins.

The Microsoft Entra Exporter can provide most of the documentation you need:

  • Verify that you've implemented the desired configuration.
  • Use the exporter to capture current configurations.
  • Review the export, understand the settings for your tenant that aren't exported, and manually document them.
  • Store the output in a secure location with limited access.

Note

Settings in the legacy multifactor authentication portal for Application Proxy and federation settings might not be exported with the Microsoft Entra Exporter, or with the Microsoft Graph API. The Microsoft 365 Desired State Configuration module uses Microsoft Graph and PowerShell to retrieve the state of many of the configurations in Microsoft Entra ID. This information can be used as reference information or, by using PowerShell Desired State Configuration scripting, to reapply a known good state.

Use Conditional Access Graph APIs to manage policies like code. Automate approvals to promote policies from preproduction environments, backup and restore, monitor change, and plan ahead for emergencies.

Map the dependencies among objects

The deletion of some objects can cause a ripple effect because of dependencies. For example, deletion of a security group used for application assignment would result in users who were members of that group being unable to access the applications to which the group was assigned.

Common dependencies

Object type Potential dependencies
Application object Service principal (enterprise application).
Groups assigned to the application.
Conditional Access policies affecting the application.
Service principals Application object.
Conditional Access policies Users assigned to the policy.
Groups assigned to the policy.
Service principal (enterprise application) targeted by the policy.
Groups other than Microsoft 365 Groups Users assigned to the group.
Conditional Access policies to which the group is assigned.
Applications to which the group is assigned access.

Monitoring and data retention

The Microsoft Entra audit log contains information on all delete and configuration operations performed in your tenant. We recommend that you export these logs to a security information and event management tool such as Microsoft Sentinel. You can also use Microsoft Graph to audit changes and build a custom solution to monitor differences over time. For more information on finding deleted items by using Microsoft Graph, see List deleted items - Microsoft Graph v1.0.

Audit logs

The Audit log always records a "Delete <object>" event when an object in the tenant is removed from an active state, either from active to soft deleted or active to hard deleted.

Screenshot that shows Audit log detail.

A Delete event for applications, service principals, users, and Microsoft 365 Groups is a soft delete. For any other object type, it's a hard delete.

Object type Activity in log Result
Application Delete application and service principal Soft deleted
Application Hard delete application Hard deleted
Service principal Delete service principal Soft deleted
Service principal Hard delete service principal Hard deleted
User Delete user Soft deleted
User Hard delete user Hard deleted
Microsoft 365 Groups Delete group Soft deleted
Microsoft 365 Groups Hard delete group Hard deleted
All other objects Delete “objectType” Hard deleted

Note

The Audit log doesn't distinguish the group type of a deleted group. Only Microsoft 365 Groups are soft deleted. If you see a Delete group entry, it might be the soft delete of a Microsoft 365 Group or the hard delete of another type of group. Your documentation of your known good state should include the group type for each group in your organization.

For information on monitoring configuration changes, see Recover from misconfigurations.

Use workbooks to track configuration changes

Azure Monitor workbooks can help you monitor configuration changes.

The Sensitive operations report workbook can help identify suspicious application and service principal activity that might indicate a compromise, including:

  • Modified application or service principal credentials or authentication methods.
  • New permissions granted to service principals.
  • Directory role and group membership updates for service principals.
  • Modified federation settings.

The Cross-tenant access activity workbookcan help you monitor which applications in external tenants your users are accessing and which applications in your tenant external users are accessing. Use this workbook to look for anomalous changes in either inbound or outbound application access across tenants.

Operational security

Preventing unwanted changes is far less difficult than needing to re-create and reconfigure objects. Include the following tasks in your change management processes to minimize accidents:

  • Use a least privilege model. Ensure that each member of your team has the least privileges necessary to complete their usual tasks. Require a process to escalate privileges for more unusual tasks.
  • Administrative control of an object enables configuration and deletion. Use less privileged roles, like Security Reader, for tasks that don't require operations to create, update, or delete (CRUD). When CRUD operations are required, use object-specific roles when possible. For example, User Administrators can delete only users, and Application Administrators can delete only applications. Use these more limited roles whenever possible.
  • Use Privileged Identity Management (PIM). PIM enables just-in-time escalation of privileges to perform tasks like hard deletion. You can configure PIM to have notifications or approvals for the privilege escalation.

Next steps