Edit

Share via


Supported objects and recoverable properties in Microsoft Entra Backup and Recovery (Preview)

Important

Microsoft Entra Backup and Recovery is currently in preview. See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Microsoft Entra Backup and Recovery supports recovery for a defined set of tenant object types and selected properties on those objects.

Note

The set of supported objects and properties expands over time. Recovery applies only to supported properties listed in this article and doesn't imply full object rollback.

User

Recovery for user objects supports these properties:

  • AccountEnabled
  • AgeGroup
  • City
  • CompanyName
  • ConsentProvidedForMinor
  • Country
  • Department
  • DisplayName
  • EmployeeHireDate
  • EmployeeId
  • EmployeeLeaveDate
  • EmployeeOrgData
  • EmployeeType
  • FaxNumber
  • GivenName
  • JobTitle
  • Mail
  • MailNickname
  • Mobile
  • OtherMail
  • PasswordPolicies
  • PerUserMfaState
  • PhysicalDeliveryOfficeName
  • PostalCode
  • PreferredDataLocation
  • PreferredLanguage
  • State
  • StreetAddress
  • Surname
  • TelephoneNumber
  • UsageLocation
  • UserPrincipalName
  • UserType

Note

Manager and sponsor changes aren't in scope.

For reference, view the full set of user properties in the Microsoft Graph user resource type.

Group

Recovery for group objects supports these properties:

  • Classification
  • Description
  • DisplayName
  • GroupType
  • IsPublic
  • Mail
  • MailEnabled
  • MailNickname
  • PreferredDataLocation
  • PreferredLanguage
  • SecurityEnabled
  • Theme

Note

Group ownership changes aren't in scope. Dynamic groups can be restored or soft-deleted during recovery, but dynamic group rule changes aren't in scope.

For reference, view the full set of group properties in the Microsoft Graph group resource type.

Conditional access policy

All properties of conditional access policies are in scope. View all conditional access policy properties in the Microsoft Graph conditionalAccessPolicy resource type.

Named location policy

All properties of named location policies are in scope. View all named location policy properties in the Microsoft Graph namedLocation resource type.

Authorization policy

Recovery for authorization policy objects supports these properties:

  • blockMsolPowerShell
  • guestUserRoleId

Here's a mapping of guest user role IDs with guest user permission levels:

Permission level Description Role ID
Member User Guest users have the same access as members a0b1b346-4d3e-4e8b-98f8-753987be4970
Guest User Guest users have limited access to properties and memberships of directory objects 10dae51f-b6af-4016-8d66-8c2a99b929b3
Restricted Guest User Guest user access is restricted to properties and memberships of their own directory objects 2af84b1e-32c8-42b7-82bc-daa82404023b

For reference, view the full set of authorization policy properties in the Microsoft Graph authorizationPolicy resource type.

Authentication methods policy

Recovery supports these authentication method policies:

  • Email one-time password (OTP)
  • FIDO2 passkey
  • Authenticator app
  • Voice call
  • SMS
  • Third-party software OATH
  • Temporary Access Pass
  • Certificate-based authentication

For reference, view the full set of authentication methods policy properties in the Microsoft Graph authenticationMethodConfiguration resource type.

Application

Recovery for application objects supports these properties:

  • DisplayName
  • Description
  • Notes
  • ApplicationTag
  • AppIdentifierUri
  • AppCreatedDateTime
  • PublicClient
  • PublisherDomain
  • IsDeviceOnlyAuthSupported
  • ServiceManagementReference
  • RequiredResourceAccess
  • NativeAuthenticationApisEnabled
  • SignInAudience
  • GroupMembershipClaims
  • OptionalClaims
  • IsDisabled
  • AddIns
  • ServicePrincipalLockConfiguration
  • AppInformationalUrl

For reference, view the full set of application properties in the Microsoft Graph application resource type.

Service principal

Recovery for service principal objects supports these properties:

  • AccountEnabled
  • AlternativeNames
  • ExplicitAccessGrantRequired
  • Description
  • LoginUrl
  • Notes
  • NotificationEmailAddresses
  • PreferredTokenSigningKeyThumbprint
  • ServicePrincipalTag
  • ServicePrincipalType
  • PreferredSingleSignOnMode
  • PublisherName
  • SamlSingleSignOnSettings
  • ServicePrincipalName

For reference, view the full set of service principal properties in the Microsoft Graph servicePrincipal resource type.

Service principal recovery is the anchor for related permissions. When a service principal is recovered, Microsoft Entra Backup and Recovery also restores:

  • OAuth2 permission grants where the recovered service principal is the target object
  • App role assignments where the recovered service principal is the target object

OAuth2 (delegated) permission grant

OAuth2 permission grant represents the delegated permissions granted to an application's service principal. An administrator can create delegated permission grants when a user consents to an application's request to access an API, or an administrator can grant them on behalf of all users. Permission grants that an admin creates on behalf of all users are in scope. You can identify these permission grants by consentType = AllPrincipals and principalId = null.

Permission grants created as a result of user consent aren't supported. View OAuth2 (delegated) permission grant properties in the Microsoft Graph oauth2PermissionGrant resource type.

OAuth2 permission grants aren’t recovered independently. For difference report and recovery scoping, service principals, OAuth2 permission grants, and app role assignments are grouped under a single filter in the Microsoft Entra admin center.

App role assignment

An app role assignment records when a user, group, or service principal is assigned an app role for an app. All properties of app role assignment are in scope. View all app role assignment details and properties in the Microsoft Graph appRoleAssignment resource type.

App role assignments aren’t recovered independently. For difference report and recovery scoping, service principals, OAuth2 permission grants, and app role assignments are grouped under a single filter in the Microsoft Entra admin center.

Organization

Recovery for the organization object supports these properties:

Tenant-level per-user multifactor authentication (MFA) settings:

  • StrongAuthenticationDetails

    • availableMFAMethods

      Screenshot showing the availableMFAMethods property under StrongAuthenticationDetails.

    • IsApplicationPasswordBlocked

      Screenshot showing the IsApplicationPasswordBlocked property under StrongAuthenticationDetails.

    • IsRememberDevicesEnabled

      Screenshot showing the IsRememberDevicesEnabled property under StrongAuthenticationDetails.

    • rememberDevicesDurationInDays

      Screenshot showing the rememberDevicesDurationInDays property under StrongAuthenticationDetails.

  • StrongAuthenticationPolicy

    • enabled

      Screenshot showing the enabled property under StrongAuthenticationPolicy.

    • ipAllowList

      Screenshot showing the ipAllowList property under StrongAuthenticationPolicy.

Limitations

Consider the following limitations when you use Microsoft Entra Backup and Recovery.

Job completion time

Completion time for difference reports and recovery depends on data loading and processing.

The first time you access a backup through a difference report or recovery, the recovery service loads the backup data. This loading takes a fixed amount of time, even for small tenants. The service reuses loaded data across operations that reference the same backup, so subsequent operations complete faster. Creating a difference report before recovery can reduce recovery time by preloading the data.

After data loading completes, the operation moves into processing. For difference reports, processing identifies changes between the backup and the current tenant. For recovery, processing applies the required changes to restore the backup state. Processing time varies based on the number of objects, the scope of the operation, and the number of changes involved.

Hard-deleted objects

Microsoft Entra Backup and Recovery doesn't support the recovery or re-creation of hard-deleted objects. Only soft-deleted or modified objects can be restored.

Objects managed in on-premises Active Directory Domain Services

Any changes made to on-premises synced objects (except group memberships) appear in difference reports, but are automatically excluded from recovery. Organizations that use hybrid identity with Microsoft Entra ID can use difference reports to identify changes to objects synchronized from on-premises. For certain object types, such as users and groups, you can move the source of authority from on-premises to the cloud. After conversion, all Backup and Recovery functionality is available for those objects. Back up and recover objects managed on-premises by using an alternative solution.

If a user or group is converted to cloud-managed after the backup was taken, recovering from that backup doesn't revert the source of authority to on-premises Active Directory. Other supported changed attributes are recovered.

Broader recoverability

Microsoft Entra Backup and Recovery should be used as part of a broader approach to recoverability that helps your organization be more resilient. To reduce the risk of malicious and accidental directory data loss, follow recoverability best practices in Microsoft Entra ID. These practices include:

  • Establishing preventative operational security measures
  • Regularly documenting the known good state by using Microsoft Graph APIs
  • Preparing processes to recover from deletion and misconfiguration