Entra ID

Microsoft Entra Backup and Recovery Enters Preview

3분 읽기

요약

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

Entra ID 관련 도움이 필요하신가요?전문가와 상담하기

Introduction

Identity failures can quickly become business outages. If a Conditional Access policy is misconfigured, user attributes are overwritten, or a privileged account makes unauthorized changes, IT teams need a fast way to investigate and recover. Microsoft is addressing that gap with Microsoft Entra Backup and Recovery, now in public preview.

What’s new in Microsoft Entra Backup and Recovery

Microsoft Entra Backup and Recovery is an always-on, Microsoft-managed service designed to improve identity resilience inside the tenant, not just platform availability.

Key capabilities in preview

  • Automatic backups of critical Entra ID objects
  • Point-in-time visibility into configuration changes
  • Built-in safeguards that prevent backups from being disabled, deleted, or altered
  • Difference Reports to compare current settings with a previous backup
  • Targeted recovery jobs to restore only affected objects or configurations

Supported restore scope in public preview

Microsoft says the service can restore one backup per day within the last five days for core directory objects, including:

  • Users
  • Groups
  • Applications
  • Service principals
  • Conditional Access policies
  • Authentication method policy
  • Authorization policy
  • Named locations

Why this matters for IT administrators

This release gives Entra administrators a structured recovery option for common identity incidents that are often difficult to reverse manually.

Microsoft highlights several real-world scenarios:

  • Conditional Access lockouts: Restore a known-good policy after a mistaken change blocks users from signing in.
  • HR provisioning errors: Identify and roll back incorrect user attribute updates pushed at scale.
  • Malicious configuration changes: Recover from unauthorized edits made through a compromised privileged account.

For IT teams, the biggest benefit is reduced recovery time. Instead of manually recreating policies or scripting bulk corrections, admins can use Difference Reports to confirm what changed and then run a more precise recovery.

Licensing and availability

Microsoft Entra Backup and Recovery is available now in public preview and requires an Entra ID P1 or P2 license. Admins can access it from the Entra ID blade in the Microsoft Entra admin center.

Next steps

If your organization relies heavily on Conditional Access, automated provisioning, and privileged role administration, this preview is worth evaluating.

Recommended actions:

  • Review whether your tenant has Entra ID P1 or P2 licensing
  • Open the Microsoft Entra admin center and explore the Backup and Recovery experience
  • Identify high-risk identity scenarios where backup-based recovery would reduce downtime
  • Update your identity incident response and disaster recovery procedures to include this capability

Microsoft Entra already focuses on service availability, but this preview adds a much-needed layer for recovering from tenant-level mistakes and security events.

Entra ID 관련 도움이 필요하신가요?

전문가가 Microsoft 솔루션 구현 및 최적화를 도와드립니다.

전문가와 상담하기

Microsoft 기술 최신 정보 받기

Microsoft EntraEntra IDbackup and recoveryConditional Accessidentity resilience

관련 기사

Entra ID

Microsoft Entra External MFA Now Generally Available

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access 변경: 모든 리소스 정책 적용

Microsoft는 2026년 3월 27일부터 6월까지 Entra Conditional Access의 '모든 리소스(All cloud apps)' 정책 적용 방식을 변경해, 제한된 OIDC·디렉터리 scope만 요청하는 로그인 흐름에도 정책이 일관되게 적용되도록 강화합니다. 이에 따라 그동안 우회되던 일부 로그인에서도 MFA나 디바이스 준수 같은 추가 챌린지가 나타날 수 있어, 특히 리소스 제외가 포함된 '모든 리소스' CA 정책과 제한된 scope를 요청하는 커스텀 앱을 사용하는 조직은 사전 점검과 테스트가 중요합니다.

Entra ID

Microsoft Entra Access Priorities: AI 접근 보안과 에이전트 ID 구현

Microsoft가 IT 실무자를 위해 Microsoft Entra Access Priorities 웨비나 시리즈를 공개하며, 피싱 저항 인증·적응형 접근·Zero Trust 기반의 접근 보안부터 AI 시대의 인력 및 AI 에이전트 ID 거버넌스까지 4개 세션으로 구현 방법을 안내합니다. 이는 사용자뿐 아니라 앱, 디바이스, AI 에이전트까지 포함하는 통합 접근 제어를 통해 보안 일관성을 높이고, AI로 정교해지는 피싱과 ID 탈취 위협에 대응하면서도 최종 사용자 경험의 마찰을 줄이는 데 중요합니다.

Entra ID

Microsoft Entra Internet Access Secure Web & AI Gateway 프리뷰

Microsoft가 Entra Internet Access에 Secure Web & AI Gateway 프리뷰를 추가해, 네트워크 계층에서 비승인 AI 도구 탐지, 파일·민감정보 유출 방지, 프롬프트 인젝션 차단, AI 에이전트 및 MCP 서버 제어를 지원한다고 밝혔다. 이는 앱 수정 없이 Entra ID와 Conditional Access, Purview, Defender 연동으로 생성형 AI 사용을 더 일관되게 통제할 수 있게 해, 기업의 데이터 유출과 AI 기반 보안 위협 대응 역량을 높인다는 점에서 중요하다.