
Principal Cloud Solutions Architect
In a concise walkthrough, John Savill’s [MVP] YouTube video explains the new Entra Backup and Recovery capability and how it complements existing protections such as soft delete and protected actions. The video follows a clear chapter structure showing daily snapshots, difference reports, and recovery operations, and it demonstrates typical recovery scenarios step by step. Consequently, viewers gain a practical sense of how Microsoft stages automatic backups and how administrators can use the features in the Microsoft Entra admin center.
The presenter describes that Entra Backup and Recovery automatically takes daily snapshots of supported directory objects and retains up to five snapshots on a rolling basis. These backups cover core items such as users, groups, apps, service principals, and several policy types, and Microsoft manages the snapshots so administrators cannot delete or alter them. As a result, organizations receive tamper-resistant snapshots with point-in-time recovery options while the data remains in the tenant’s geo-location for compliance reasons.
During the demo, Savill highlights three primary workflows: viewing available backups, generating a difference report to compare a backup against the current state, and performing recoveries that range from full restores to targeted object-level restores. He shows that administrators can scope recoveries by object type or specify up to 100 object IDs for precision, and he notes that all recovery actions write to audit logs. Furthermore, recovery jobs return status updates such as Loading data, In progress, and Completed, which helps operators track progress and spot warnings early.
Savill also discusses important limits and behaviors that affect real-world use, including the fact that only one recovery or report job can run at a time and that job duration scales with the number of changes being applied. For very large recovery windows, he warns that operations may take many hours, which requires planning to avoid surprises during an incident. In addition, administrators must assign the correct roles—such as Microsoft Entra Backup Reader for viewing and Microsoft Entra Backup Administrator for recovery actions—to maintain both security and proper operational control.
Although the system adds a convenient native restore path, the video makes clear there are tradeoffs to weigh. For example, five days of daily snapshots provide a quick safety net but fall short of longer retention needs that some organizations require, so teams must balance convenience against compliance and long‑term retention policies. Moreover, the preview state means supported object types and behaviors may change, so relying solely on this feature without complementary protections can leave gaps.
The demo explains how soft delete and protected actions work alongside backups: soft delete allows administrators to recover deleted items within a longer window, while protected actions guard critical operations with additional checks. Together, these features reduce the risk of accidental or malicious changes, but Savill stresses that administrators should still use difference reports to avoid unintended overwrites during recovery. Therefore, combining safeguards improves resilience but requires operational discipline and testing.
Recovering large sets of objects introduces several practical challenges that the video addresses, such as job contention, latency in applying many changes, and the need to reconcile links or group memberships after a restore. Additionally, because recovery actions are irreversible, teams must validate difference reports and maintain clear change management processes before committing to a restore. Consequently, organizations should run rehearsal recoveries and build playbooks that account for time, scope, and potential downstream impacts.
Savill recommends using difference reports as a first step to understand the scope of changes and to target restores precisely, which reduces unnecessary disruption. He also suggests integrating Entra Backup and Recovery into a broader protection strategy that includes role governance, alerting for anomalous changes, and periodic restore tests to verify procedures. Finally, if longer retention or archival needs exist, teams should plan for complementary measures while treating the native backups as a fast-response tool.
For administrators, the video offers a practical introduction to a feature that simplifies several routine recovery tasks and strengthens tenant resilience. Yet it also makes clear that administrators must understand the limits—such as retention windows, single-job concurrency, and supported object coverage—to use the tool effectively in incident response. Ultimately, the feature represents a meaningful step toward built-in protection, but it should be part of a layered approach that includes governance, monitoring, and regular testing.
John Savill’s walkthrough provides a balanced and actionable look at Entra Backup and Recovery, showing how daily snapshots, difference reports, and targeted restores work together to reduce recovery time and simplify troubleshooting. While the functionality improves immediate recoverability, the video underscores the need to plan around retention limits, performance characteristics, and role assignments. Therefore, teams should evaluate the tool as a fast recovery option within a broader, tested protection strategy.
Microsoft 365 Admin | Azure DataCenter | Microsoft Purview | Administrator | Microsoft Graph
Entra Backup and Recovery overview, Microsoft Entra backup guide, Entra identity backup best practices, Entra recovery and restore tutorial, Entra backup solutions for organizations, how to backup Microsoft Entra ID, Entra disaster recovery planning, Entra backup compliance and security