Back up and restore encrypted Azure VM
This article describes how to back up and restore Windows or Linux Azure virtual machines (VMs) with encrypted disks using the Azure Backup service.
If you want to learn more about how Azure Backup interacts with Azure VMs before you begin, review these resources:
- Review the Azure VM backup architecture.
- Learn about Azure VM backup, and the Azure Backup extension.
Azure Backup supports backup of Azure VMs that have their OS/data disks encrypted with Azure Disk Encryption (ADE). ADE uses BitLocker for encryption of Windows VMs, and the dm-crypt feature for Linux VMs. ADE integrates with Azure Key Vault to manage disk-encryption keys and secrets. Key Vault Key Encryption Keys (KEKs) can be used to add an additional layer of security, encrypting encryption secrets before writing them to Key Vault.
Azure Backup can back up and restore Azure VMs using ADE with and without the Azure AD app, as summarized in the following table.
|VM disk type||ADE (BEK/dm-crypt)||ADE and KEK|
- You can back up and restore encrypted VMs within the same subscription and region.
- Azure Backup supports VMs encrypted using standalone keys. Any key which is a part of a certificate used to encrypt a VM isn't currently supported.
- You can back up and restore encrypted VMs within the same subscription and region as the Recovery Services Backup vault.
- Encrypted VMs can’t be recovered at the file/folder level. You need to recover the entire VM to restore files and folders.
- When restoring a VM, you can't use the replace existing VM option for encrypted VMs. This option is only supported for unencrypted managed disks.
Before you start
Before you start, do the following:
- Make sure you have one or more Windows or Linux VMs with ADE enabled.
- Review the support matrix for Azure VM backup
- Create a Recovery Services Backup vault if you don't have one.
- If you enable encryption for VMs that are already enabled for backup, you simply need to provide Backup with permissions to access the Key Vault so that backups can continue without disruption. Learn more about assigning these permissions.
In addition, there are a couple of things that you might need to do in some circumstances:
- Install the VM agent on the VM: Azure Backup backs up Azure VMs by installing an extension to the Azure VM agent running on the machine. If your VM was created from an Azure marketplace image, the agent is installed and running. If you create a custom VM, or you migrate an on-premises machine, you might need to install the agent manually.
- Explicitly allow outbound access: Generally, you don't need to explicitly allow outbound network access for an Azure VM in order for it to communicate with Azure Backup. However, some VMs might experience connection issues, showing the ExtensionSnapshotFailedNoNetwork error when attempting to connect. If this happens, you should explicitly allow outbound access, so the Azure Backup extension can communicate with Azure public IP addresses for backup traffic.
Configure a backup policy
If you haven't yet created a Recovery Services backup vault, follow these instructions
Open the vault in the portal, and select Backup in the Getting Started section.
In Backup goal > Where is your workload running? select Azure.
In What do you want to back up? select Virtual machine > OK.
In Backup policy > Choose backup policy, select the policy that you want to associate with the vault. Then click OK.
- A backup policy specifies when backups are taken, and how long they are stored.
- The details of the default policy are listed under the drop-down menu.
If you don't want to use the default policy, select Create New, and create a custom policy.
Choose the encrypted VMs you want to back up using the select policy, and select OK.
If you're using Azure Key Vault, on the vault page, you see a message that Azure Backup needs read-only access to the keys and secrets in the Key Vault.
If you receive this message, no action is required.
If you receive this message, you need to set permissions as described in the procedure below.
Click Enable Backup to deploy the backup policy in the vault, and enable backup for the selected VMs.
Trigger a backup job
The initial backup will run in accordance with the schedule, but you can run it immediately as follows:
- In the vault menu, click Backup items.
- In Backup Items click Azure Virtual Machine.
- In the Backup Items list, click the ellipses (...).
- Click Backup now.
- In Backup Now, use the calendar control to select the last day that the recovery point should be retained. Then click OK.
- Monitor the portal notifications. You can monitor the job progress in the vault dashboard > Backup Jobs > In progress. Depending on the size of your VM, creating the initial backup may take a while.
Azure VM needs read-only access to back up the keys and secrets, along with the associated VMs.
- Your Key Vault is associated with the Azure AD tenant of the Azure subscription. If you're a Member user, Azure Backup acquires access to the Key Vault without further action.
- If you're a Guest user, you must provide permissions for Azure Backup to access the key vault.
To set permissions:
In the Azure portal, select All services, and search for Key vaults.
Select the key vault associated with the encrypted VM you're backing up.
Select Access policies > Add new.
Select Select principal, and then type Backup Management.
Select Backup Management Service > Select.
In Add access policy > Configure from template (optional), select Azure Backup.
- The required permissions are prefilled for Key permissions and Secret permissions.
- If your VM is encrypted using BEK only, remove the selection for Key permissions since you only need permissions for secrets.
Click OK. Backup Management Service is added to Access policies.
Click Save to provide Azure Backup with the permissions.
Restore an encrypted VM
You restore encrypted VMs as follows:
- Restore the VM disk.
- Then do one of the following:
If you run into any issues, review these articles: