Azure Backup Explained: Architecture, Pricing & Best Practices (2026)

In 2026, Azure Backup remains the default Microsoft-native data protection service for any SMB or enterprise running workloads on Azure. Specifically, it covers Azure VMs, SQL, SAP HANA, Azure Files, and on-premises servers. This guide breaks down the architecture, pricing tiers, PowerShell setup, and best practices — based on what Wintive has observed across 60+ Microsoft 365 and Azure tenant audits.

💡 Why Azure Backup matters in 2026

Three forces explain renewed importance. First, ransomware groups now target backup repositories before encrypting production. As a result, vault immutability is no longer optional. In fact, Azure Backup ships with a 14-day soft delete window that cannot be disabled — a recovery path even when storage credentials leak.

Second, regulatory frameworks tightened: NIS2, SOX updates, HIPAA. Consequently, auditors now request quarterly restore test evidence pulled from vault job logs. On the cost side, the vault-archive tier sits at $0.0024 per GB-month versus $0.10 operational — a 42x gap. Therefore, tiered retention typically saves 60 to 80 percent on multi-year compliance archives.

🛡️ Free: M365 Tenant Security Audit Checklist

17-page PDF with 50 hands-on checks covering Entra ID, Exchange Online, SharePoint, Teams, Intune, license waste, and audit logging. PowerShell commands included. Built from 60+ real tenant audits at Wintive.

📥 Download the free checklist →

🔧 How Azure Backup works

Azure Backup uses a workload-aware extension on each protected resource. The extension snapshots data into a centralized Recovery Services Vault. Specifically, this vault stores recovery points, enforces backup policies, holds RBAC permissions, and replicates data. Furthermore, backups never traverse the public internet for Azure-native resources. As a result, the data path stays on the Microsoft backbone via private endpoints when configured.

Azure Backup architecture flow showing source workloads protected via Recovery Services vault into geo-replicated cloud storage
🔄 The end-to-end flow — from source workload to replicated recovery points across regions.

For Azure VMs, the backup extension takes a snapshot at the storage account level. Therefore, workload downtime stays at zero. Moreover, application-consistent backups are possible on Windows via VSS writers and on Linux via pre/post scripts. As a result, SQL Server, Exchange, and SAP HANA workloads can be backed up without quiescing the application beyond a few seconds.

For on-premises servers, the MARS agent handles the heavy lifting. Specifically, it pushes incremental backups to the vault from Windows file servers. However, MARS only handles files, folders, and system state — not full bare-metal recovery. In particular, full server protection on-premises requires Azure Backup Server (MABS) or System Center DPM. Notably, traffic is encrypted in transit and at rest using AES-256.

📦 Supported workloads & storage tiers

Not every Azure Backup configuration costs the same. Specifically, workload type and storage redundancy drive most of the bill. Furthermore, the matrix below summarizes which redundancy makes sense for each scenario.

WorkloadBackup methodRecommended redundancyVault-archive eligible?
Azure VM (Windows or Linux)VM extension + disk snapshotGRS for productionYes (after 3 months hot)
Azure SQL DatabaseNative automated backupRA-GRS recommendedLong-term retention only
SQL in Azure VMWorkload backup extensionGRSYes
SAP HANA in Azure VMBackint integrationGRSYes
Azure Files (premium tier)Snapshot-basedLRS or ZRSNo (operational only)
Azure BlobsOperational tier onlyLRS + soft deleteNo
Azure Database for PostgreSQLNative incrementalGRSYes
On-premises files / foldersMARS agentGRS for offsite resilienceYes
On-premises full serverMABS or DPM → vaultGRSYes

GRS doubles storage cost vs LRS. However, it offers paired-region replication that survives a full region outage. So the choice comes down to one question. Specifically, would your organization survive a 6 to 48-hour RTO if Microsoft lost an entire region? For SMBs running production workloads with no other DR plan, GRS is the safer default.

💻 Configure Azure Backup with PowerShell

Production environments with more than three VMs deserve PowerShell or Bicep automation. Below is the exact pattern Wintive uses on greenfield Azure tenants. Specifically, the script creates a Recovery Services Vault, applies a daily backup policy with 30-day retention, and enables protection for a Windows VM.

Provision the vault and the policy

# PowerShell: configure Azure Backup end-to-end
# Prerequisites: Az.RecoveryServices module 7.x or later

Connect-AzAccount
Set-AzContext -Subscription 'your-subscription-id'

# Variables
$rgName     = 'rg-prod-backup'
$vaultName  = 'rsv-prod-eastus'
$location   = 'eastus'
$vmName     = 'vm-app-01'

# Create Recovery Services Vault with GRS redundancy
New-AzRecoveryServicesVault -ResourceGroupName $rgName \`
    -Name $vaultName -Location $location
$vault = Get-AzRecoveryServicesVault -ResourceGroupName $rgName -Name $vaultName
Set-AzRecoveryServicesBackupProperty -Vault $vault \`
    -BackupStorageRedundancy GeoRedundant

# Use the default daily VM policy as a starting point
Set-AzRecoveryServicesVaultContext -Vault $vault
$policy = Get-AzRecoveryServicesBackupProtectionPolicy -Name 'DefaultPolicy'

# Enable backup on the target VM
Enable-AzRecoveryServicesBackupProtection -ResourceGroupName $rgName \`
    -Name $vmName -Policy $policy

# Trigger first backup immediately
$item = Get-AzRecoveryServicesBackupItem -Container (Get-AzRecoveryServicesBackupContainer \`
    -ContainerType AzureVM -FriendlyName $vmName) -WorkloadType AzureVM
Backup-AzRecoveryServicesBackupItem -Item $item

This script creates a vault, sets it to GRS, applies the default daily policy, and forces an initial backup. Furthermore, the same pattern adapts to other workloads. To switch context, change the WorkloadType parameter to MSSQL, AzureFiles, or SAPHanaDatabase.

Watch out for the redundancy lock

One trap matters here. Specifically, the BackupStorageRedundancy property can only be modified before any item is registered with the vault. Once you start protecting a VM, the redundancy is locked.

Migration from LRS to GRS later requires a new vault, restored recovery points, and re-registered workloads. Therefore, that is an expensive multi-day operation on large estates. As a result, get the choice right at vault creation time.

🏛️ Recovery Services Vault structure

Understanding the vault as a layered model helps teams troubleshoot. Specifically, every backup operation traverses five distinct layers. Furthermore, each layer has its own configuration surface and failure modes. As a result, misconfigurations at upper layers (RBAC, policy) silently skip backups. However, issues at lower layers (encryption, replication) fail loudly during restore.

Recovery Services Vault stacked layer model: access control, backup policies, retention rules, encryption, and replicated storage
🧱 The five layers of the Recovery Services Vault — from RBAC at the top to replicated storage at the bottom.

The access control layer uses Azure RBAC with three built-in roles. First, Backup Contributor offers full create/manage permissions. Next, the Operator role runs backups but cannot edit policies. Finally, audit-only access goes through the Reader role. Moreover, multi-user authorization adds an approval workflow on critical operations such as vault deletion or policy reduction.

The backup policy layer defines schedule and snapshot type. Indeed, this is the single most important layer for cost optimization. For instance, a daily policy with 7-year retention on a 500-GB SQL database in GRS is vastly more expensive than a tiered policy. Therefore, design retention rules with the vault-archive tier in mind from day one.

The encryption layer defaults to platform-managed keys (PMK). Additionally, it supports customer-managed keys (CMK) stored in Azure Key Vault. Specifically, CMK is the right choice for regulated workloads. However, key rotation must be coordinated with Azure Backup. As a result, losing the key means losing all encrypted recovery points permanently. In practice, most Wintive clients run PMK by default.

💰 Pricing tiers compared

Azure Backup pricing has two components. Specifically, protected instance fees are flat monthly fees per workload, scaled by source size buckets. Additionally, backup storage fees vary by tier and redundancy. Indeed, storage is where most of the optimization opportunity sits. Notably, vault-archive in 2022 changed the economics meaningfully.

Bar chart comparing Azure Backup pricing tiers - Operational, Vault-standard, and Vault-archive - with restore latency tradeoffs
📊 Indicative US East prices — the 42x gap between operational and archive tiers is the central optimization lever.

The operational tier sits closest to the workload. As a result, restores complete in seconds because recovery points stay attached to the source storage account. However, the price is the highest at roughly $0.10 per GB-month. Furthermore, data is not geo-redundant by default. Therefore, the operational tier is appropriate only for short retention windows. In particular, use it for the most recent 5 to 30 days when instant restore matters.

Next, the vault-standard tier is the workhorse. Specifically, recovery points move to vault-managed storage with LRS, ZRS, or GRS redundancy. Moreover, restore latency rises to minutes — acceptable for most disaster scenarios. As a result, the price drops to about $0.0224 per GB-month for LRS. Typically, retention beyond 30 days lives in vault-standard.

Finally, the vault-archive tier lands at $0.0024 per GB-month. Indeed, that is a 42x reduction versus operational. However, restore latency stretches to roughly 15 hours because data sits in cold storage. So vault-archive is the right home for compliance retention. In practice, move recovery points older than 6 months into vault-archive on long-term-retention policies.

✅ Best practices for SMBs

Across 60+ tenant audits, Wintive compiled a short-list of patterns. Each item has fixed an actual incident or recurring cost overrun.

PracticeWhat to doWhy it matters
Lock the vault + soft deleteARM lock on vault resource. Soft delete enabled (14d, non-disableable).Survives accidental or malicious deletion attempts on backup repository.
Tier retention deliberately30d operational + 11mo standard + years 2-7 archive.Saves 60-70% vs flat vault-standard policy on multi-year retention.
Private endpoints for sensitive dataEnable private-link for regulated workloads (health, finance, legal).Compliance auditors increasingly demand network segmentation evidence.
Quarterly restore testsSchedule recurring restore-to-isolated-environment exercise. Document RTO.Auditors do not care backup ran — they care restore worked.
Tag by application ownerApply CostCenter, Application, Owner, Environment tags consistently.Monthly cost reports allocate cleanly. Outliers surface immediately.
Diagnostic logs to Log AnalyticsSend vault logs to workspace. Alert on failed jobs + off-window changes.Detect silent backup failures and unauthorized policy modifications.

Of these six items, retention tiering is the single most impactful for typical SMBs. Switching a flat 7-year policy to tiered (30 days operational, 12 months standard, 6 years archive) on 1 TB saves roughly $850 to $1,100 per month. Pull this lever first during cost optimization.

↻ Restore & test workflows

Restores work in three modes for VM workloads. First, full-VM restore rebuilds from scratch in a new resource group. Next, disk restore reattaches a recovery-point disk to an existing VM. Finally, file-level restore mounts the recovery point as a temporary drive. In particular, file-level recovery is the most common scenario. For example, a user lost a folder yesterday and needs it back today.

# PowerShell: file-level restore from a VM recovery point
# Connects an iSCSI mount to access individual files without restoring the full VM

$rgName    = 'rg-prod-backup'
$vaultName = 'rsv-prod-eastus'
$vmName    = 'vm-app-01'

$vault = Get-AzRecoveryServicesVault -ResourceGroupName $rgName -Name $vaultName
Set-AzRecoveryServicesVaultContext -Vault $vault

# Find the latest recovery point
$container = Get-AzRecoveryServicesBackupContainer -ContainerType AzureVM \`
    -FriendlyName $vmName
$item = Get-AzRecoveryServicesBackupItem -Container $container -WorkloadType AzureVM
$rp = Get-AzRecoveryServicesBackupRecoveryPoint -Item $item | \`
    Sort-Object RecoveryPointTime -Descending | Select-Object -First 1

# Generate a temporary script that mounts the recovery point disks
$mount = Get-AzRecoveryServicesBackupRPMountScript -RecoveryPoint $rp
Write-Host "Run this script on a target machine to access files:"
Write-Host $mount.Filename
Write-Host "Password (valid 12 hours): $($mount.Password)"

# After file copy, dismount the recovery point
Disable-AzRecoveryServicesBackupRPMountScript -RecoveryPoint $rp

The mount script approach is preferred for file-level restore. Indeed, it does not consume the full VM disk. Specifically, only the iSCSI link to the recovery-point storage is used. As a result, the restore workflow takes minutes rather than hours. However, the mount has a 12-hour expiry and a single-machine constraint. Therefore, plan the restore session within that window.

For SQL workloads, the equivalent is Restore-AzRecoveryServicesBackupItem. Furthermore, use the RestoreToOriginalLocation switch or AlternateLocation. In particular, restoring SQL to an alternate location is the recommended pattern for quarterly test restores. As a result, production stays untouched. Moreover, the restored copy can be opened, queried, and dropped without operational risk.

❓ Azure Backup — FAQ

Is Azure Backup enough as my only DR strategy in 2026?

For most SMBs running a single Azure region, Azure Backup with GRS redundancy provides adequate disaster recovery. Specifically, GRS replicates recovery points to a paired region, so data survives a full region outage. However, Azure Backup does not orchestrate failover of compute or networking. Therefore, organizations with strict RTO requirements typically pair Azure Backup with Azure Site Recovery for the compute failover layer.

How much does Azure Backup actually cost for 1 TB of VMs?

A typical 1-TB Azure VM estate with daily backups, 30-day operational retention, 12-month vault-standard in GRS, and 5-year vault-archive costs roughly $250 to $350 per month. Furthermore, this assumes a 30 percent daily change rate. Notably, the biggest cost driver is retention duration in vault-standard. As a result, reducing standard retention from 12 to 6 months and shifting earlier to vault-archive saves another 25 to 35 percent.

Can Azure Backup protect Microsoft 365 mailboxes and SharePoint?

No. Azure Backup is for Azure resources and on-premises servers via MARS. Specifically, Microsoft 365 data (Exchange Online, SharePoint Online, OneDrive, Teams) is not in scope. As a result, M365 data protection requires a third-party SaaS backup product such as Veeam, Acronis, AvePoint, or Rubrik. Indeed, Microsoft itself does not provide a backup product for M365 despite the shared responsibility model.

What is the difference between Azure Backup and Azure Site Recovery?

Azure Backup creates point-in-time recovery copies for data restoration. By contrast, Azure Site Recovery (ASR) replicates entire workloads continuously for failover. So Backup answers “recover data from yesterday” and ASR answers “resume operations in another region within 15 minutes”. In practice, production environments use both: ASR for compute failover with sub-hour RPO, and Backup for granular file restoration with longer retention.

🔗 Keep exploring

Need help auditing or optimizing Azure Backup for your environment? Book a free 30-minute consultation with our Microsoft 365 and Azure experts.

Scroll to Top