Home > About AvePoint Cloud Backup for IaaS + PaaS

Export to PDF

About AvePoint Cloud Backup for IaaS + PaaS

AvePoint Cloud Backup ensures the resiliency of service in the event of a disaster and quickly recovers lost or corrupted content from your backup.

AvePoint Cloud Backup for IaaS + PaaS (formerly, Cloud Backup for Azure) offers data recovery capabilities for your Virtual Machines (Azure VMs, Amazon EC2 instances, and Google VM instances), Microsoft Entra ID, Azure Storage (blob storage and file share), Admin Portal Settings, Azure SQL (for Azure SQL databases), Azure DevOps, Azure AD B2C, and AWS Platform Configurations (Private preview).

The new redesigned user interface, available since the February 2024 release, is now the primary UI of the solution.

The Home page of the new UI.

The new Home page UI.

AvePoint Cloud Backup for IaaS + PaaS is now only available in the following data centers: Australia Southeast (Victoria), Canada Central (Toronto), Germany West Central (Frankfurt), West Europe (Netherlands), UK South (London), North Europe (Ireland), Japan West (Osaka), East US (Virginia), Southeast Asia (Singapore), Switzerland North (Zurich), France Central (Paris), Korea Central (Seoul), US Gov Virginia (Virginia), and United Arab Emirates (Dubai).

In addition, if your browser’s first preferred language is Japanese, French, or German, the Cloud Backup for IaaS + PaaS interface will be displayed in Japanese, French, or German. In other cases, the interface will be displayed in English.

*Note: To access the user guide, expand the Help & Resources section on the left navigation and click User guide. If you encounter any issues when using AvePoint Cloud Backup for IaaS + PaaS services, you can expand the Help & Resources section and click Invite support to go to the AvePoint Online Services interface to submit an issue to AvePoint support for assistance.

The dashboard on the home page provides a comprehensive overview of the latest activities, job status count, backup object summary, restore job summary, storage space usage, and the storage profile usage rank.

- Job status count – Shows the status of different types of jobs for different services and objects. - Latest activities – Shows the 5 most recent jobs in Cloud Backup for IaaS + PaaS. To find more jobs, click the arrow icon to navigate to the **Job monitor** page. - Backup object summary – Shows the ratio of objects in the current backup scope to all the objects detected in your tenant. - Restore job summary – Shows the total number of restore jobs for each service within a specified date range, as well as the number and ratio of restore jobs for each type of objects in the current service. Use the Date range and service drop-down lists to find the data you need. - Storage – Shows the storage space used by each service. - Storage profile usage rank – Shows the top 5 storage profiles by usage.

The Backup page shows the Microsoft Entra ID tile, the Virtual Machine tile, the Azure Storage tile, the Admin Portal Settings tile, the Azure SQL tile, the Azure DevOps tile, the Azure AD B2C tile, and the AWS Platform Configurations (Private preview) tile.

Through each service tile, you can view the backup and restore details of its latest jobs, including backup scope name, job duration, operator, latest restore history, etc. Additionally, you can update the backup scopes and frequency.

View backup and restore details on the new UI (through Backup > View job history).

View backup and restore details on the new UI (through Backup > View job history).

If you are in trial, your experience with the backup services in Cloud Backup for IaaS + PaaS will be limited:

*Note: If you want to have an unlimited trial experience, you can contact AvePoint support for help.

- Your trial instance of Cloud Backup for IaaS + PaaS will use the AvePoint default storage to store your backup data by default, and the data retention period is one month. - Virtual Machine backup service in the trial only allows one backup scope per service (Azure VM, Amazon EC2, and Google VM instance). You can select up to 5 Azure VMs, Amazon EC2 instances, or Google VM instances for each backup scope. - The Microsoft Entra ID backup service in the trial only allows you to protect one Microsoft Entra tenant, and the backup jobs in the trial will not restrict the number of objects to protect in your Microsoft Entra tenant. - Azure Storage backup service in the trial only allows one backup scope for Blob storage and file share, respectively. You can select up to 5 blob containers or 5 file shares for each backup scope. The backup job will protect up to 5 folder-level objects within the selected storage, and the storage space for backup data can be at most 25 GB. - Admin Portal Settings service in the trial only allows one backup scope. - Azure SQL backup service in the trial only allows one backup scope to protect up to 5 databases. - Azure DevOps backup service in the trial only allows one backup scope to protect up to 5 projects. - Azure AD B2C backup service in the trial only allows one backup scope.

Enable Backup

To use Cloud Backup for IaaS + PaaS to protect Microsoft Entra ID, Azure VMs, Azure Storage, Admin Portal Settings, Azure SQL, Amazon EC2 instances, Azure DevOps, Azure AD B2C, or AWS Platform Configurations (Private preview), you must connect your Microsoft or Amazon tenant to AvePoint Online Services. For details, refer to .

Note the following before you enable the backup:

- Before you enable the backup service for Azure VM, Azure Storage, or Azure SQL, you can register a **Microsoft Delegated** app in your tenant or use a custom Azure app with delegated permissions, and then add this app to the subscriptions where the VM, storage, or database to protect resides and grant the app the **Contributor** role or a custom role with equivalent permissions. For details, refer to [Enable Backup for Azure Virtual Machines, Azure Storage, and Azure SQL](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon). Note the following: - If your storage account has disabled the “**Allow storage account key access**” feature, the app must also have the **Storage Blob Data Contributor** role to the subscription or storage account, in addition to the **Contributor** role to protect the Azure Blob Storage, and in this case, the Azure File Storage is not supported. - The Azure virtual machines that can be protected by Virtual Machine service must be hosted by Azure, which may be created with your pre-defined and endorsed settings or using the recommended defaults that match your workload. - If the Azure storage account that you want to protect has enabled the firewall, complete the settings as instructed in [Allow AvePoint Agent Servers to Access Your Storage Account](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon). Note that the data in the Azure storage archive tier cannot be protected as the Cloud Backup for IaaS + PaaS cannot read or download a blob in the Archive tier. You must manually rehydrate the archive data that you want to protect to the online tier (cold, cool, or hot tier). - Before you enable the backup for Amazon EC2 instances or AWS Platform Configurations (Private preview), you must create and consent to a service app for your connected Amazon account. For details, refer to [Enable Backup for Amazon EC2 Instances or AWS Platform Configurations](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon). - Before you enable the backup for Google VM instances, you must create a service account. For details, refer to [Enable Backup for Google VM Instances ](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon). - Before you use the backup service for Microsoft Entra ID or Admin Portal Settings, you must create a **Service** **app** for **Cloud Backup for** **IaaS + PaaS** or use a custom Azure app to grant consent with the required permissions. For details, refer to [Enable Backup for Microsoft Entra ID or Admin Portal Settings.](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon) Note the following: - If you want to back up and restore distribution lists or mail-enabled security groups in **Microsoft Entra ID**, or back up and restore the Microsoft 365 Defender or Exchange settings through **Admin Portal Settings** service, you can choose to prepare a service account profile with a Global Administrator or Exchange Administrator, or you can go to the Microsoft Entra admin center (Azure portal) to assign the Exchange administrator role to this service app. For details on assigning an app the Exchange administrator role, refer to . For details on configuring a service account profile, refer to . Note that the service account with MFA enabled is currently not supported. > ***Note**: If you are using a custom Azure app for Microsoft Entra ID or Admin Portal Settings service and you do not want to assign Global administrator or Exchange administrator role to the app, refer to the instructions in [Create a Custom Role Group](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon) to create a role group with the minimum permissions. This configuration is only applicable to the custom app. - To restore a temporarily deleted user or group that has access to the Microsoft 365 admin center, the service account or the service app must be assigned with a Global administrator role. - To back up and restore the **Self Service** **Group Management** settings for Microsoft Entra ID > Group General, you must have a service account profile configured in the AvePoint Online Services interface and the service account you use must have the **Cloud Application** **Administrator** role. Note that if you only want to back up this property, the **Cloud Application Administrator** role is not required. - To back up and restore the **Attributes and Claims**, **Identifier (Entity ID)**, **currentSingleSignOnMode**, **ParentAppId**, or **IsCustomApp** of the SSO configuration for the enterprise applications, you must have a service account profile configured in the AvePoint Online Services interface and the service account you use must have the **Application Administrator** role. Note that if you only want to back up this property, the **Application Administrator** role is not required. - Before you use the backup service for Azure DevOps, you must create a service app or use a custom Azure app to grant consent with the required permissions. For details, refer to [Enable Backup for Azure DevOps](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon). - Before you use the backup service for Azure AD B2C, you must create a service app or use a custom Azure app to grant consent with the required permissions. For details, refer to [Enable Backup for Azure AD B2C ](about-avepoint-cloud-backup-for-iaas--paas.md#singlesignon).

Single Sign-On

With Single Sign-On(SSO) supported, you can access Cloud Backup for IaaS + PaaS interface via direct URL without providing user credentials, once it is detected that you have signed into the AvePoint Online Services interface.

Beta APIs

Refer to the table below for the beta version API methods of Microsoft Graph that we use in AvePoint Cloud Backup for IaaS + PaaS.

CategoryAPI MethodIs it available in the 1.0 version?Then, why do we use the Beta version?
Microsoft Entra ID > groupsGroups resource typeNoWrite back group configurations
Microsoft Entra ID > EnterpriseApplicationSynchronization APINoFor the backup and restore of the Enterprise Applications > Provisioning.
Microsoft Entra ID > EnterpriseApplicationDelete synchronizationJobYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationCreate synchronizationJobYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationUpdate synchronizationSchemaYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationsynchronizationJob: pausestartYes
Microsoft Entra ID > EnterpriseApplicationAdd synchronization secretsYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationCreate unifiedRoleAssignmentYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationGetAppDefaultClaim(Internal)YesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > EnterpriseApplicationUpdateAppDefaultClaims(Internal)YesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > SignInLogsList signInsYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Microsoft Entra ID > Administrative UnitUpdate administrativeUnitYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsGet authenticationMethodsPolicyYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsList policiesYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsList deviceCompliancePoliciesYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal Settings*Get /deviceManagement/*compliancePoliciesYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsList deviceConfigurationsNo
Admin Portal Settings*GET /deviceManagement/configurationPolicies?$*filter=technologies ne 'mdm,microsoftSense'No
Admin Portal Settings*GET /deviceManagement/configurationPolicies?$*filter=technologies eq 'mdm,microsoftSense'No
Admin Portal SettingsGet deviceConfigurationAssignmentNo
Admin Portal SettingsList deviceManagementConfigurationPolicyAssignmentsNo
Admin Portal SettingsList deviceManagementConfigurationSettingNo
Admin Portal SettingsList groupPolicyConfigurationsNo
Admin Portal SettingsGet groupPolicyDefinitionValueNo
Admin Portal SettingsList deviceManagementScriptsNo
Admin Portal SettingsList deviceShellScriptsNo
Admin Portal SettingsGet deviceManagementScriptRunSummaryNo
Admin Portal SettingsGet deviceManagementScriptDeviceStateNo
Admin Portal SettingsList deviceManagementScriptUserStatesNo
Admin Portal SettingsList managedAppPoliciesYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsGet androidManagedAppProtectionNo
Admin Portal SettingsGet iosManagedAppProtectionNo
Admin Portal SettingsGet mdmWindowsInformationProtectionPolicyNo
Admin Portal SettingsGet windowsManagedAppProtectionNo
Admin Portal SettingsList managedDeviceMobileAppConfigurationsYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsGet managedDeviceMobileAppConfigurationNo
Admin Portal SettingsGet managedDeviceMobileAppConfigurationAssignmentNo
Admin Portal SettingsList targetedManagedAppConfigurationsYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal Settings*GET /deviceManagement/**intents?$**filter=*templateId ne 'e44c2ca3-2f9a-400a-a113-6cc88efd773d'No
Admin Portal Settings*GET /deviceManagement/**intents?$**filter=*templateId eq 'e44c2ca3-2f9a-400a-a113-6cc88efd773d'No
Admin Portal SettingsGet targetedManagedAppConfigurationYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsconditionalAccessPolicy resource typeYesCurrently, there are some missing properties when using the Graph v1.0 endpoint.
Admin Portal SettingsList targetedManagedAppPolicyAssignmentsNo
Admin Portal SettingsList deviceManagementIntentsNo
Admin Portal SettingsList deviceManagementIntegerSettingInstancesNo
Admin Portal SettingsGet deviceManagementTemplateNo
Admin Portal SettingsGet deviceManagementIntentNo
Admin Portal SettingsGet deviceManagementIntentDeviceStateSummaryNo
Admin Portal SettingsGet deviceManagementIntentUserStateSummaryNo
Admin Portal SettingsGet deviceManagementIntentUserStateNo
Admin Portal SettingsList deviceManagementIntentDeviceStatesNo
Admin Portal SettingsList deviceManagementIntentDeviceSettingStateSummariesNo
Admin Portal SettingsCreate conditionalAccessPolicyYesCurrently, there are some missing properties when using the Microsoft Graph v1.0 endpoint.
Admin Portal SettingsUpdate conditionalAccessPolicyYesCurrently, there are some missing properties when using the Microsoft Graph v1.0 endpoint.
Admin Portal SettingsCreate defaultDeviceCompliancePolicyNo
Admin Portal Settingsassign actionNo
Admin Portal SettingsUpdate windows10CompliancePolicyNo
Admin Portal SettingsscheduleActionsForRules actionNo
Admin Portal SettingsCreate deviceManagementCompliancePolicyNo
Admin Portal SettingssetScheduledActions actionNo
Admin Portal SettingsCreate conditionalAccessPolicyYes
Admin Portal SettingsUpdate conditionalaccesspolicyNo
Admin Portal SettingsCreate windows10CustomConfigurationNo
Admin Portal SettingsCreate deviceManagementScriptNo
Admin Portal SettingsUpdate deviceManagementScriptNo
Admin Portal SettingsCreate deviceManagementScriptAssignmentNo
Admin Portal SettingsUpdate deviceManagementScriptAssignmentNo
Admin Portal SettingsCreate deviceManagementConfigurationPolicyNo
Admin Portal SettingsUpdate deviceManagementConfigurationPolicyNo
Admin Portal SettingsCreate androidManagedAppProtectionNo
Admin Portal SettingsCreate iosManagedAppProtectionNo
Admin Portal SettingsCreate windowsManagedAppProtectionNo
Admin Portal SettingsCreate mdmWindowsInformationProtectionPolicyNo
Admin Portal SettingsUpdate androidManagedAppProtectionNo
Admin Portal SettingsUpdate iosManagedAppProtectionNo
Admin Portal SettingsUpdate windowsManagedAppProtectionNo
Admin Portal SettingsUpdate mdmWindowsInformationProtectionPolicyNo
Admin Portal SettingsCreate iosMobileAppConfigurationNo
Admin Portal SettingsUpdate iosMobileAppConfigurationNo
Admin Portal SettingscreateInstance actionNo
Admin Portal SettingsUpdate deviceManagementIntentNo
Admin Portal SettingsupdateSettings actionNo
Admin Portal SettingsCreate deviceManagementConfigurationPolicyNo
Admin Portal SettingsUpdate deviceManagementConfigurationPolicyNo
Admin Portal Settingslist hardwareconfigurationsNo
Admin Portal Settingsget hardwareconfigurationsNo
Admin Portal Settingscreate hardwareconfigurationsNo
Admin Portal Settingsupdate hardwareconfigurationsNo
Admin Portal SettingsGet Presentation of DefinitionNo
Admin Portal SettingsGet Presentation ValueNo
Azure AD B2C > User FlowList UserflowNoFor the backup and restore of user flows.
Azure AD B2C > User FlowGet UserflowNoFor the backup and restore of user flows.
Azure AD B2C > User FlowCreate UserflowNoFor the backup and restore of user flows.
Azure AD B2C > User FlowUpdate UserflowNoFor the backup and restore of user flows.
Azure AD B2C > User FlowDelete UserFlowNoFor the backup and restore of user flows.
Azure AD B2C > User FlowList Identity providerNoFor the backup and restore of user flows.
Azure AD B2C > User FlowAdd Identity providerNoFor the backup and restore of user flows.
Azure AD B2C > User FlowDelete Identity providerNoFor the backup and restore of user flows.
Azure AD B2C > User FlowList user attribute assignmentNoFor the backup and restore of user flows.
Azure AD B2C > User FlowCreate user attribute assignmentNoFor the backup and restore of user flows.
Azure AD B2C > User FlowDelete user attribute assignmentNoFor the backup and restore of user flows.

Backup Scope

When configuring the backup scope for virtual machines, Azure Storage, Azure SQL, or Admin Portal Settings, you can click the Refresh List button to retrieve the latest data information and keep your backup scope updated. It may take a long time. The product also provides a timer job to regularly refresh your data list at 0:00 AM every day, in your local time. The last refreshed time will be displayed next to the button.

*Note: If it is your first time using a service, you can click the Refresh List button to manually initialize the data list that can be added to the backup scope according to your settings.

The backup service for Azure VMs, Azure Storage, and Azure Admin Settings supports you – by grouping the backup of Azure VMs, Blob Storage, File Share, or admin portal settings into separate backup scopes. This will protect them with individual backup schedules or data retention settings. Note that the data in the Azure storage archive tier cannot be protected as the Cloud Backup for IaaS + PaaS cannot read or download a blob in the Archive tier. You must manually rehydrate the archive data that you want to protect to the online tier (cold, cool, or hot tier).

Each backup scope for Microsoft Entra ID can only protect one tenant. In addition, once you have created a backup scope, you cannot add the same tenant to another scope.

The backup services will perform scheduled backups automatically according to the settings of each backup scope. Note that if a backup job for the same backup scope is in progress, the automatic backup job scheduled to run will be skipped.

Storage Location

You can choose to use the default storage hosted by AvePoint to store your backup data or choose to use your own storage. Currently, you can choose from the following supported storage types for AvePoint-hosted default storage or for BYOS (bring your own storage).

AvePoint Default Storage TypeBYOS Storage Type
Microsoft Azure Blob StorageAmazon S3 storageGoogle Cloud Storage*Note: The AvePoint-hosted Amazon S3 storage is only available in the commercial environment.Microsoft Azure Blob StorageAmazon S3 storageAmazon S3-Compatible storageIBM Storage Protect – S3IBM Cloud Object StorageGoogle Cloud Storage

*Note: The supported Azure storage account kinds are Storage and StorageV2 of Standard performance type. Note that the Azure Blob storage that has enabled Data Lake Storage Gen2 capabilities (a hierarchical namespace) is not supported.

For details on how to change from AvePoint default storage to BYOS storage and manage your storage profiles, refer to Manage Your Storage.

If you are using your own Microsoft Azure storage and backup retention period is longer than 45 days, your backup data will be automatically stored to the Cold tier for cost savings after the December 2023 release. For existing customers, your former backup data are still stored in the cool tier. To use your Azure blob storage in the most cost-effective manner, you can store your backup data to archive tier. However, Cloud Backup for IaaS + PaaS currently does not support restoring the backup data from the archive tier automatically. If you want to restore the backup data from the archive tier, you must rehydrate the data first. For details on Azure storage access tiers, refer to the Microsoft article: .

If you use your own Azure storage, AvePoint recommends using the Azure storage account from the same region as the object you want to back up, otherwise, the backup will incur data transfer costs. Data transfer costs are also incurred if you use AvePoint default storage and the Azure VMs or storage that is not in the same region as the AOS tenant that you’ve signed up for. See the information in this for bandwidth pricing that may be incurred due to the data transferred out of Azure data centers.

If you use AvePoint-hosted default storage, Availability Paired Region is now available as an option to replicate your data. To use availability paired region, go to the Cloud Operation Portal and configure your Cloud Backup for IaaS + PaaS settings by enabling the Availability Paired Region option.

Note the following:

- Once enabled, the Availability Paired Region cannot be turned off and will become available for all services. - If you use AvePoint Azure storage and enable the Availability Paired Region, the paired region is only available for the storage region, not for the data region.

If you use the AvePoint-hosted Amazon S3 storage, refer to the following data center mappings between the data center you signed up to AOS with, the data center of the Amazon S3 storage, and the paired secondary region.

If you enable the Availability Paired Region, it will be implemented through the Amazon Cross-Region Replication functionality. For more details, refer to this .

Data Center You Signed Up for AOS(Home Region)Amazon S3 Storage Data Center(Storage Region)Availability Paired Region
East US (Virginia)US East (N. Virginia)US East (Ohio)
North Europe (Ireland)Europe (Ireland)Europe (Stockholm)
Southeast Asia (Singapore)Asia Pacific (Singapore)Asia Pacific (Jakarta)
Australia Southeast (Victoria)Asia Pacific (Sydney)Asia Pacific (Melbourne)
Japan West (Osaka)Asia Pacific (Tokyo)Asia Pacific (Osaka)
UK South (London)Europe (London)Europe (Milan)
Canada Central (Toronto)Canada (Central)Canada West (Calgary)
Germany West Central (Frankfurt)Europe (Frankfurt)Europe (Milan)
Korea Central (Seoul)Asia Pacific (Seoul)Asia Pacific (Tokyo)
France Central (Paris)Europe (Paris)Europe (Spain)
Switzerland North (Zurich)Europe (Zurich)Europe (Spain)
West Europe (Netherlands)Not SupportedNot Supported
United Arab Emirates (Dubai)Middle East (UAE)Middle East (Bahrain)

If you use the AvePoint-hosted Google Cloud storage, refer to the following data center mappings between the data center you signed up to AOS with, the data center of the Google Cloud Storage, and the paired secondary region.

If you enable the Availability Paired Region, it will be implemented through the Google Multi-region configuration. For more details, refer to this .

Data Center You Signed Up for AOS(Home Region)Google Cloud Storage Data Center(Storage Region)Availability Paired Region
Australia Southeast (Victoria)Sydney (australia-southeast1)ASIA
Canada central (Toronto)Canada Toronto (northamerica-northeast2)US
Germany West Central (Frankfurt)Germany Frankfurt (europe-west3)EU
West Europe (Netherlands)Netherlands (europe.west4)EU
UK South (London)United Kingdom London (europe-west2}EU
North Europe (lreland)Finland (europe-north1)EU
Japan West (Osaka)Japan Osaka (asia-northeast2)ASIA
East US (Virginia)South Carolina Moncks Corner (us-east1)US
Southeast Asia (Singapore)Singapore (asia-southeast1)ASIA
Switzerland North (Zurich)Switzerland Zurich (europe-west6)EU
France Central (Paris)France Paris (europe-west9)EU
Korea Central (Seoul)South Korea Seoul (asia-northeast3]ASIA
United Arab Emirates (Dubai)Dammam, Saudi Arabia (ME-CENTRAL2)ASIA

If you signed up to AvePoint Online Services with the data center North Europe (Ireland), Australia Southeast (Victoria), or Germany West Central (Frankfurt), and you have purchased a subscription to use AvePoint Azure storage to store backup data, the following storage regions will be available for selection when you sign into the Cloud Backup for IaaS + PaaS interface for the first time:

If you enable the Availability Paired Region, it will be implemented through the Azure Geo- redundant storage functionality. For more details, refer to this . The specific secondary region paired to your primary region is determined by Azure; you can find this mapping in the official .

*Note: The Availability Paired Region is not available for data region.

Data Center You Signed Up for AOSAvailable Storage Region for Cloud Backup for IaaS + PaaS
North Europe (Ireland)North Europe (Ireland)Qatar Central (Doha)
Australia Southeast (Victoria)Australia Southeast (Victoria)New Zealand North (Auckland)
Germany West Central (Frankfurt)Germany West Central (Frankfurt)
United Arab Emirates (Dubai)United Arab Emirates (Dubai)

Before you provide your storage information to the Cloud Backup interface, you must first add the AvePoint IP addresses to your storage firewall or configure the firewall to allow AvePoint servers running on a dedicated ARM Vnet subnet to access your storage location. For details, refer to Allow AvePoint Agent Servers to Access Your Storage Account.

Once you save the storage location for a specific region in a backup scope, you can no longer update the storage for that region in that scope.

The snapshots for managed disks created by Cloud Backup for IaaS + PaaS will have the following tags: CreateBy: ACBVM_{tenantId}; JobId: {FB or IB}{Date&TimeStamp}; VMName: {VMName}. You can use these tags to filter and manage the snapshots created by Cloud Backup for IaaS + PaaS.

The tags added to the snapshot

Backup Retention

The data retention settings can be applied to your backup data to help save your storage costs. You can configure a custom retention period for your backup data up to the retention policy in your subscription.

Once there is backup data of a backup scope approaching the retention period, your tenant owner will receive the Data Retention Notification. Once the next full snapshot of your backup scope takes place, we will begin pruning the old backup data that met your retention settings. Your subscription capacity will be released after the backup data is deleted.

Data Restore and Export

The Restore page allows you to browse the recovery points of each service type to find the data that you want to restore.

For Microsoft Entra ID and Admin Portal Settings, you can also use the Compare method to generate a comparison report for the backup data of a specific recovery point against the Azure production data to help you easily locate the changes that you may want to revert. Note that if the properties that you have updated for the user or group are currently not supported by Cloud Backup for IaaS + PaaS, the user or group will be tagged as Modified in the report, though the report cannot show the differences.

After you have found the data at a specific recovery point that you want to restore, you can choose to restore the data to its original location or another destination. The data of specific types also supports being exported to a local location. A monthly export limitation of 500GB/Month has been applied to Azure VM and Azure Storage. Data cannot be exported once the limit has been reached.

Refer to the table below for the data types that you can restore and export or export only:

*Note: The data types protected by Cloud Backup for IaaS + PaaS that are not listed in the table below support being restored only. For the Azure VMs, Azure Storage, Microsoft Entra ID, and Amazon EC2 instances, you can choose to restore the backup data to their original location or another destination

Data typesRestore & ExportExport Only
Microsoft Entra ID > UsersYou can download the user properties with a script. You can use the script and the downloaded information to bulk import/update the users to a local directory./
All data types in Azure Storage/
Azure VMs & Disks/
Azure VMs > files/
Admin Portal SettingsFor the list of settings supported by restore or export, refer to Admin Portal Settings./
All data types in AWS Platform Configurations (Private preview)/

Activity and System Auditor

Using the backup statistics of Microsoft Entra ID, Azure VM, Amazon EC2, Google VM instance, Azure Storage, Admin Portal Settings, Azure SQL, Azure DevOps, and Azure AD B2C on the Backup analysis page and the total used storage space on the Subscription page, you will get an overview of the scale of your resources being protected and the storage used for data protection. You can also check user activities on the System auditor page. For details, refer to Reports.

Through Job monitor, you can monitor job status and download job reports to get a better understanding of your backup scope and performance and take responsive actions. For details, refer to Generate and Download a Job Report.

Use Public APIs for Job Information

You can now use the Cloud Backup for IaaS + PaaS Public APIs to get the information of backup and restore jobs. For details, refer to Use Public APIs for Job Information.

Configure Date Format

You can configure the date format for the Cloud Backup for IaaS + PaaS environment and notification emails in AvePoint Online Services > Administration > General settings > Culture settings. For details, refer to .

AVA Chatbot

Click the chatbot icon in the upper-right corner of a page to chat with AVA (AvePoint’s virtual assistant). For any product-related questions, AVA is here to help.

Data Security and Management for Google

The multi-cloud security platform for Google, seamlessly integrates AvePoint’s data protection technologies into a robust and scalable solution. This platform empowers you to manage, govern, and protect Google Workspace and Cloud with confidence in the security and quality of your data.

- **Complete Google Data Protection** – Experience comprehensive protection with Google Workspace Backup, which securely safeguards and swiftly restores your Google Workspace, Directory, and Classroom data. Benefit from granular solutions designed to prevent data loss and ensure business continuity. To learn more, refer to the . - **Proactive Risk Intelligence** – Stay ahead of potential threats with Insights, offering proactive risk intelligence across Google Workspace. Gain powerful data security insights that help reduce the security burden by easily identifying, prioritizing, and rectifying controls for Google Workspace permissions, membership, and sharing. Utilize Google’s DLP engine for advanced sensitivity scanning, risk monitoring, and data leak prevention through smarter permissions control. To learn more, refer to the . - **Command the Entire Information Lifecycle** – Take full command of your information lifecycle with Opus, ensuring a seamless and efficient content management experience across Google Workspace. Centrally manage and control records to achieve operational efficiency and compliance, streamlining your information governance processes. Drive productivity with in-depth analysis by discovering and classifying inactive and ROT (redundant, obsolete, or trivial) data—empowering smarter decisions on what data to keep and what to remove. To learn more, refer to the . - **Build a Modern, Agile Workspace** – Transform your workspace by breaking down data silos and unifying your data with Fly. This solution simplifies even the most complex data migrations, helping you modernize and transform your data with our Azure-hosted SaaS solution for Google Workspace workload migration or tenant restructuring. To learn more, refer to the . - **Reliable Google VM Safeguard** – Attain robust data protection for your Google VM instances with Cloud Backup for IaaS + PaaS, ensuring data is securely backed up and can be rapidly restored. Meet diverse operational needs with flexible mode options: leverage the SaaS infrastructure mode for centralized, policy-driven protection, or opt for the CAP Gateway mode to minimize network latency and enhance backup performance. To learn more, explore this user guide. - **Elevate Google Workspace Security and Governance** – Access a comprehensive, unified control center that strengthens data security, ensures compliance, and simplifies administration across Google Workspace. The platform is built around five core modules – Administration, Governance, Risk intelligence, Policy enforcement, and Information management – it centralizes multi-tenant user and space management with granular, role-based access; automates lifecycle workflows and service templates (including MyHub requests) for users and shared drives; continuously classifies drive content to surface high-risk objects and external exposure; translates organizational rules into monitored, auto-remediated, or approval-routed actions; and orchestrates retention, labeling, and defensible disposal to meet regulatory obligations. Together, these capabilities streamline operations, elevate your security posture, and deliver end-to-end governance across your digital workspace. To learn more, refer to the .

These features collectively enhance the security, management, and efficiency of your Google Workspace and Cloud environments, ensuring robust data protection and streamlined operations.