Hello Michaelb-2136, Thank you for posting your query on Microsoft Q&A platform.
You want to increase backup vault security and are struggling with several areas:
- Alerts : You want notifications for first backup failures, suspicious activities, and any vault/backup deletions or stoppages.
- Extra job protection : You read about “passwords for jobs” to prevent stopped backups but can’t find it.
- Restricting changes : You want only your account to make any vault changes.
- Immutable vault : You want to understand what enabling it does before locking.
You also feel that simple tasks like email alerts are overly complicated.
Real-Time Email Alerts: Default vault alerts only trigger on PersistentDegraded (multiple failures), not the first failure. Built-in alerts are throttled to reduce noise. For real-time monitoring, you need Log Analytics to catch every event.
Steps:
- Go to your Vault > Diagnostic Settings > Add Diagnostic Setting.
- Select
CoreAzureBackup and AddonAzureBackupAlerts.
- Send these logs to a Log Analytics Workspace.
- In the workspace, go to Logs → New Alert Rule.
- Create a query like:
BackupItemCustomerManaged
| where Status == "Failed"
- Set up an Action Group to receive email/SMS notifications.
Overview of Azure Monitor alerts - Azure Monitor | Microsoft Learn
The "Password" for Jobs (Resource Guard): You want extra protection for critical backup operations. Azure doesn’t have a literal job password. Instead, Resource Guard + Multi-User Authorization (MUA) ensures critical operations cannot be executed without approval from a separate owner.
Steps:
- Create a Resource Guard in a separate subscription or resource group (isolation helps security).
- Go to your Backup Vault > Properties > Multi-User Authorization.
- Link the vault to the Resource Guard.
- Now, any critical operations (disable soft delete, stop backup, delete vault) require approval from the Resource Guard owner.
This is effectively the “password” that prevents a single compromised account from deleting backups.
Multiuser Authorization Using Resource Guard - Azure Backup | Microsoft Learn
Restricting Access to Only Your Account: Prevent anyone else from making changes to your vault. Even Admins can inherit permissions at the subscription level.
Steps:
- Go to Vault > Access Control (IAM) > Role Assignments.
- Look for roles like Backup Contributor, Backup Admin, Owner.
- Remove everyone except your account.
- Ensure you retain the Backup Admin role to manage backups.
Only your account can make vault changes.
What is Azure role-based access control (Azure RBAC)? | Microsoft Learn
Manage Backups with Azure role-based access control - Azure Backup | Microsoft Learn
Manage Backup vaults - Azure Backup | Microsoft Learn
Immutable Vault: Understanding what turning on immutability does before "locking" it.
- In the vault, go to Properties > Security Settings > Immutable Vault.
- Enable immutability prevents deletion/modification of recovery points.
- If locked, immutability becomes permanent cannot be disabled or altered.
- Enabled (not locked): You can still turn it off later.
- Locked: Irreversible, ensures WORM compliance.
Concept of Immutable Vault for Azure Backup - Azure Backup | Microsoft Learn
Hope this helps. and please feel free to reach out if you have any further questions. Thanks