Entra ID

Microsoft Entra Backup and Recovery Enters Preview

3分钟阅读

摘要

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

需要Entra ID方面的帮助?咨询专家

Introduction

Identity failures can quickly become business outages. If a Conditional Access policy is misconfigured, user attributes are overwritten, or a privileged account makes unauthorized changes, IT teams need a fast way to investigate and recover. Microsoft is addressing that gap with Microsoft Entra Backup and Recovery, now in public preview.

What’s new in Microsoft Entra Backup and Recovery

Microsoft Entra Backup and Recovery is an always-on, Microsoft-managed service designed to improve identity resilience inside the tenant, not just platform availability.

Key capabilities in preview

  • Automatic backups of critical Entra ID objects
  • Point-in-time visibility into configuration changes
  • Built-in safeguards that prevent backups from being disabled, deleted, or altered
  • Difference Reports to compare current settings with a previous backup
  • Targeted recovery jobs to restore only affected objects or configurations

Supported restore scope in public preview

Microsoft says the service can restore one backup per day within the last five days for core directory objects, including:

  • Users
  • Groups
  • Applications
  • Service principals
  • Conditional Access policies
  • Authentication method policy
  • Authorization policy
  • Named locations

Why this matters for IT administrators

This release gives Entra administrators a structured recovery option for common identity incidents that are often difficult to reverse manually.

Microsoft highlights several real-world scenarios:

  • Conditional Access lockouts: Restore a known-good policy after a mistaken change blocks users from signing in.
  • HR provisioning errors: Identify and roll back incorrect user attribute updates pushed at scale.
  • Malicious configuration changes: Recover from unauthorized edits made through a compromised privileged account.

For IT teams, the biggest benefit is reduced recovery time. Instead of manually recreating policies or scripting bulk corrections, admins can use Difference Reports to confirm what changed and then run a more precise recovery.

Licensing and availability

Microsoft Entra Backup and Recovery is available now in public preview and requires an Entra ID P1 or P2 license. Admins can access it from the Entra ID blade in the Microsoft Entra admin center.

Next steps

If your organization relies heavily on Conditional Access, automated provisioning, and privileged role administration, this preview is worth evaluating.

Recommended actions:

  • Review whether your tenant has Entra ID P1 or P2 licensing
  • Open the Microsoft Entra admin center and explore the Backup and Recovery experience
  • Identify high-risk identity scenarios where backup-based recovery would reduce downtime
  • Update your identity incident response and disaster recovery procedures to include this capability

Microsoft Entra already focuses on service availability, but this preview adds a much-needed layer for recovering from tenant-level mistakes and security events.

需要Entra ID方面的帮助?

我们的专家可以帮助您实施和优化Microsoft解决方案。

咨询专家

获取微软技术最新资讯

Microsoft EntraEntra IDbackup and recoveryConditional Accessidentity resilience

相关文章

Entra ID

Microsoft Entra External MFA Now Generally Available

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access“所有资源”策略变更指南

微软将从 2026 年 3 月 27 日起逐步更新 Entra 条件访问策略:即使“所有资源”策略配置了资源排除项,只要客户端应用仅请求 OIDC 或少量目录 scopes,这类登录今后也会被一致地执行条件访问控制,不再出现可能绕过策略评估的情况。此变更对配置了“All resources + 资源排除”的租户尤其重要,因为用户可能开始收到新的 MFA、设备合规等验证提示,管理员也应尽快检查并测试那些刻意只请求最小 scopes 的自定义应用是否能正确处理这些质询。

Entra ID

Microsoft Entra Access Priorities:安全 AI 访问与代理身份

微软发布由四场网络研讨会组成的 Microsoft Entra Access Priorities 系列,聚焦构建统一访问基础、保护员工在 AI 时代的访问、治理 AI 代理身份,以及用 Security Copilot agents 提升身份运维效率。此举的重要性在于,随着身份成为用户、应用、设备和 AI 代理的统一控制平面,企业需要以 Zero Trust、抗钓鱼认证和统一访问策略来同时降低复杂性、应对 AI 驱动的新型攻击,并更安全地扩展 AI 应用。

Entra ID

Microsoft Entra Secure Web & AI Gateway 预览功能

微软宣布在 Entra Internet Access 中推出公开预览版 Secure Web & AI Gateway,把 AI 感知检测与策略执行下沉到网络层,新增 Shadow AI Detection、文件过滤与 Purview 集成、提示注入防护,以及对 AI agents 和 MCP servers 的访问控制。此更新的重要性在于企业可在无需改造应用的情况下,以“身份优先”的方式统一管理跨设备、跨云的 AI 使用风险,减少未批准 AI 工具使用、敏感数据外泄和恶意提示攻击带来的安全隐患。