Microsoft quietly rolled out one of the most requested enterprise features in the history of Azure Active Directory / Microsoft Entra ID: native Backup & Recovery. The preview was released to tenants on March 19, 2026, and lets administrators back up and restore critical identity configuration directly from the Entra admin center — without needing third-party tools or complex scripting workarounds.
Note on Documentation: As of late March 2026, Microsoft has not yet published official documentation for this feature on Microsoft Learn. The guidance in this post is based on hands-on experience with the preview. Treat it as a practical field guide and verify behavior in your own tenant.
If you've ever lost a Conditional Access policy, accidentally deleted a group that controlled access to a production app, or experienced a configuration drift that took hours to untangle, this feature is for you.
Preview Notice: Microsoft Entra ID Backup & Recovery is currently in public preview. Features, behavior, and licensing requirements may change before general availability. Do not rely on this feature as your sole recovery mechanism in production environments.
What Is Microsoft Entra ID Backup & Recovery?
Microsoft Entra ID Backup & Recovery is a built-in capability that allows organizations to:
- Create scheduled or on-demand backups of their Entra ID tenant configuration
- Restore individual objects (users, groups, applications, service principals) or entire configuration sets
- Review backup history and compare configuration states across time
- Protect against accidental deletions, misconfiguration, and insider threat scenarios
This is a significant shift from the previous model, where recovery depended on the Recycle Bin (30-day soft delete), audit logs, or expensive third-party identity backup solutions like AvePoint, Veeam, or Quest.
Why This Feature Matters
The Identity Recovery Gap
Until now, Microsoft Entra ID had no native, point-in-time recovery for tenant configuration objects. Consider these common scenarios:
| Scenario | Previous Recovery Option | With Backup & Recovery |
|---|---|---|
| Conditional Access policy deleted | Manual recreation from audit logs | Restore from backup in minutes |
| Group membership wiped | Audit log review + manual re-add | Point-in-time restore |
| App registration misconfigured | Manually roll back settings | Restore previous configuration |
| Service principal permissions changed | Audit trail only | Restore prior permission state |
| Named location deleted | No recovery — recreate manually | Restore from backup |
Compliance and Governance
For organizations under ISO 27001, SOC 2, NIST 800-53, or NIS2, demonstrating that identity configuration can be reliably recovered is increasingly a hard audit requirement. Native backup dramatically simplifies this compliance evidence.
Key Features of the Preview
1. Automated Daily Backups
Entra ID Backup & Recovery automatically creates one backup per day on a fixed schedule managed by Microsoft. The schedule and frequency are not configurable — there is no option to set custom intervals or weekly archival snapshots. Backups are retained for 5 days, meaning you have access to the last 5 daily snapshots at any given time.
The backup captures a broad set of identity objects and settings, including:
- Users and user attributes
- Security groups and Microsoft 365 groups (membership included)
- Conditional Access policies
- Named locations
- Authentication methods and policies
- App registrations and enterprise applications
- Service principals and their permission grants
- Administrative Units
- Custom roles and role assignments
- Directory settings and tenant-wide policies
2. On-Demand Backup (Pre-Change Snapshot)
Before making major changes — such as a Conditional Access policy overhaul or a large group restructure — administrators can now trigger a manual on-demand backup. This gives you a known-good restore point before the change window.
This is a best practice I'd strongly recommend building into your change management process:
- Open a change request
- Trigger an on-demand Entra backup
- Apply the change
- Validate in a test scenario
- Keep the backup for the rollback window
3. Granular Object Restore
One of the most powerful aspects of this feature is granular restore. Rather than performing a full tenant rollback (which would be destructive), you can restore individual objects:
- Restore a single deleted user with all their attributes
- Recover a Conditional Access policy to a previous version
- Reinstate a group's membership to a point in time
- Restore an app registration's redirect URIs or API permissions
This granularity makes the feature safe to use in production — you're not restoring everything, just what broke.
4. Backup Comparison and Drift Detection
The preview includes a configuration comparison view that lets you diff two backup snapshots. This is extremely useful for:
- Security audits — detecting unauthorized changes to Conditional Access
- Configuration drift — identifying when policies diverged from your baseline
- Post-incident analysis — understanding exactly what changed and when
How to Enable Entra ID Backup & Recovery (Preview)
Prerequisites
- Microsoft Entra ID P1 or P2 license (check Microsoft's latest licensing page as requirements may change at GA)
- Global Administrator or Privileged Role Administrator role in the tenant
- Tenant must be enrolled in the Microsoft Entra preview program
Step 1: Enable the Preview Feature
- Sign in to the Microsoft Entra admin center
- Navigate to Identity > Overview > Preview features
- Locate Backup and restore and toggle it On
- Confirm the opt-in prompt
Step 2: Verify the Automatic Backup Schedule
There is no schedule to configure. Once the feature is enabled, Microsoft automatically runs one backup per day. The backup schedule and retention window (currently 5 days) are fixed and managed by Microsoft — no further admin action is required here.
You can verify backups are running by navigating to Identity > Backup and restore > Backups and confirming daily entries are present.
Step 3: Create an On-Demand Backup
- Navigate to Identity > Backup and restore > Backups
- Click + Create backup
- Add an optional description (e.g., "Pre-CA-policy-change 2026-03-23")
- Click Create and wait for the backup job to complete
Backup jobs typically complete within a few minutes for small-to-medium tenants. Large tenants with thousands of objects may take longer.
Step 4: Restore an Object
- Go to Identity > Backup and restore > Backups
- Select the backup version you want to restore from
- Browse to the object type (e.g., Conditional Access > Policies)
- Select the specific object to restore
- Click Restore and review the impact summary
- Confirm the restore operation
Limitations in the Current Preview
As with any preview feature, there are important limitations to be aware of:
- Password hashes are not backed up — user passwords cannot be restored from this feature
- Privileged Identity Management (PIM) assignments may have partial coverage
- External identities (guest users) have limited restore capability
- Soft-deleted objects already in the Recycle Bin behave differently than active objects
- Cross-tenant restore is not supported — backups are tenant-bound
- Retention is fixed at 5 days — only the last 5 daily snapshots are available; there is no option to extend this in the current preview
- Backup storage is managed by Microsoft — you cannot export backups to your own storage yet
- Intune policies are not included — Microsoft Intune configuration is outside the scope of this backup feature
- Official documentation is not yet published — Microsoft Learn does not have a formal reference page for this feature as of late March 2026
These limitations are expected to be addressed before general availability.
Backup & Recovery vs. Existing Recovery Options
It's worth understanding how this new feature fits alongside existing Entra ID recovery mechanisms:
| Recovery Method | Use Case | Limitations |
|---|---|---|
| Entra Recycle Bin | Recover soft-deleted users, groups, apps | 30-day window, configuration attributes not fully preserved |
| Audit Logs | Understand what changed and who did it | Read-only, must manually recreate objects |
| Microsoft Graph API scripts | Automated exports via scripting | Requires custom tooling, no native restore |
| Third-party tools (AvePoint, Quest) | Full tenant backup & restore | Costly, requires separate licensing |
| Entra Backup & Recovery (Preview) | Native point-in-time restore | Preview limitations, licensing TBD |
The new native feature covers the most common day-to-day recovery scenarios, but it does not replace third-party tools entirely. Solutions like AvePoint, Veeam, Arcserve, and Keepit remain relevant for:
- Long-term retention — the native backup keeps only 5 days; third-party tools can retain months or years of history
- Intune policy backup — Intune configuration is not covered by the native feature
- Cross-tenant restore — not supported natively
- Organizations with strict recovery SLAs that require more granular or auditable restore processes
Best Practices for Entra ID Backup & Recovery
Based on my experience managing enterprise Entra ID tenants, here are the practices I recommend building around this feature:
1. Establish a Backup Baseline Before Any Change
Make on-demand backup creation a mandatory step in your change management tickets for any Entra ID configuration change. This is cheap insurance.
2. Use Backup Comparison for Security Audits
Schedule a weekly diff between your current configuration and a known-good baseline backup. Unexpected changes to Conditional Access policies or admin role assignments should trigger immediate investigation.
3. Document Your Recovery Runbooks
Create a documented recovery runbook for the most likely failure scenarios:
- Accidental deletion of a Conditional Access policy
- Bulk user attribute corruption
- App registration misconfiguration causing auth failures
Test these runbooks in a dev/test tenant before you need them in production.
4. Do Not Rely on Backup Alone
Until this feature reaches GA with full coverage, maintain your existing recovery processes:
- Keep audit log exports to a SIEM or Log Analytics Workspace
- Continue using the Recycle Bin for immediate soft-delete recovery
- For critical objects (break-glass accounts, core CA policies), maintain documented configuration exports
5. Monitor Preview Updates Closely
Microsoft is actively developing this feature. Subscribe to the Microsoft Entra blog and Message Center in the Microsoft 365 admin portal to track updates, especially around GA timelines and licensing changes.
What to Expect at General Availability
Based on Microsoft's preview progression patterns, the GA release of Entra ID Backup & Recovery is expected to bring:
- Extended retention periods beyond the current 5-day window
- Export to Azure Storage for customer-managed backup storage
- Full PIM assignment backup and restore
- Expanded external identity coverage
- API support via Microsoft Graph for programmatic backup management
- RBAC-scoped restore — allowing helpdesk staff to restore within their scope without Global Admin rights
Frequently Asked Questions
Q: Is Entra ID Backup & Recovery included in my existing license?
During preview, Microsoft has not finalized the licensing requirements. Check the official Microsoft Entra pricing page for the latest information. It is expected to require at minimum Entra ID P1.
Q: Can I back up and restore across tenants?
No. Backups are scoped to a single tenant and cannot be restored to a different tenant.
Q: Does this replace the need for third-party Entra backup tools?
Not fully — at least not in the current preview. The native feature covers short-term recovery (within 5 days) for core Entra objects. Third-party solutions remain necessary if you need retention beyond 5 days, Intune policy backup, cross-tenant restore, or enterprise-grade recovery SLAs. Evaluate your requirements before decommissioning existing tooling.
Q: Are user passwords included in the backup?
No. Password hashes are never included in Entra ID backups for security reasons.
Q: Can I schedule automatic restores?
Not in the current preview. Restores are manual, with an admin reviewing and confirming the operation.
Summary
Microsoft Entra ID Backup & Recovery is a long-overdue, genuinely useful addition to the identity management toolkit. Even in preview, it provides meaningful protection against the most common and painful Entra ID incidents: accidental deletions and configuration drift.
For enterprises running business-critical workloads on Microsoft identity infrastructure, I strongly recommend:
- Enabling the preview in a non-production tenant first
- Evaluating coverage against your specific recovery requirements
- Building backup steps into your change management process now, so the habit is established before GA
The days of rebuilding Conditional Access policies from audit logs at 2 AM may finally be behind us.
