Threat Detection in Azure Backup with Microsoft Defender (MDC) for Cloud Integration (Preview)
💥Introduction
Ransomware has changed the way organizations think about
data protection. It’s no longer enough to simply have backups must be
confident that you restore points are clean, uncompromised, and safe to
recover from. Attackers increasingly target backup data, encrypting it or
silently infecting VMs long before an attack is executed. Restoring from a
compromised recovery point can quickly turn a disaster recovery attempt into an
even bigger crisis.
To address this growing challenge, Microsoft has introduced Threat
Detection for Azure Backup, integrated with Microsoft Defender for Cloud (MDC) currently
available in public preview. This feature enhances Azure Backup by using
Defender advanced threat intelligence to scan and validate restore points,
ensuring organizations can quickly identify safe backups during or after a
security incident.
In this blog, we explore what this capability does, how it
works behind the scenes, how to configure it, and why it matters for your cloud
security posture.
💥Why Threat Detection in Backups Is Critical
Modern attacks often progress through multiple stages, and
compromise can occur gradually. If a workload shows signs of malware or
suspicious behavior, those conditions may also be reflected in its backup
restore points. Without security insights, backup administrators might not know
which restore points were created during a potentially unsafe period. This
leads to two major risks:
- Restoring
malware back into production environments
- Losing
clean restore points because compromised ones were retained
Azure new threat detection capability addresses this by
evaluating each restore point’s "threat health," identifying suspicious
snapshots, and guiding administrators to safer restore options.
💥What Is Threat Detection in Azure Backup?
Threat Detection for Azure Backup introduces a security
layer that analyzes VM backup restore points using Microsoft Defender for
Servers. Instead of looking only at the backup itself, the system correlates:
- Malware
scan results
- Behavioral
alerts
- Ransomware
indicators
- Defender
for Cloud security signals
- VM
security incidents
The result is a restore point health status, highlighting
whether a backup is:
- Clean
/ Safe to restore
- Suspicious
due to detected threats
- Unknown
/ Not applicable if insufficient data exists
This intelligence significantly reduces the risk of
restoring compromised machines.
💥How the Integration Works (Architecture Overview)
The capability relies on a cooperative workflow between Azure
Backup and Microsoft Defender for Cloud:
1. Defender for Servers performs threat scanning
Your Azure VM (or hybrid server via Azure Arc) is
continuously monitored by Defender for Servers. It performs:
- Malware
scanning
- Ransomware
behavior detection
- Advanced
threat analytics
2. Azure Backup captures a restore point
During each backup job, Azure Backup collects metadata
related to the VM’s security state.
3. Backup service queries Defender insights
Azure Backup integrates directly with MDC to retrieve threat
signals from the VM at the time of backup.
4. Restore point health is evaluated
Each restore point is assigned a health status:
- No
Threats Reported
- Suspicious
Restore Points Found
- Unknown
/ Not Applicable
5. Backup Administrator gets visibility
The Azure portal displays both:
- Configuration
Status (is threat detection enabled?)
- Threat
Summary (are any restore points suspicious?)
This gives immediate clarity on whether backups are safe to
use after an incident.
💥Configuring Threat Detection in Azure Backup
Prerequisites
To enable the feature:
- You
must have Microsoft Defender for Servers (Plan 1 or Plan 2) enabled
on the VM or Arc server.
- The
feature must be enabled from:
- Azure
Backup (Recovery Services Vault)
or - Azure
Business Continuity Center
Steps to Enable (Option 1)
- Navigate to your Azure Business Continuity Center.
- Go to Backup Instances and select the VM.
- Under Threat Detection, choose Enable.
- Configuration
Status
- Threat
Detection Summary
Steps to enable (Option 2)
- Go to the Recovery Services vault
- Select the VM backups requiring threat detection, and then
- select Properties
- On the Properties pane, under Security Settings > Threat detection (Preview), select Update.
- On the Threat Detection (Preview) pane, turn on Enable source-scan integration, accept the terms by selecting the checkbox and select Update
💥Understanding the Status Indicators
Azure Backup surfaces two levels of threat information:
Configuration Status
- Configured
– Feature enabled and integrated with Defender
- Not
Configured – Administrator has not enabled the feature
- Configuration
Failed – Integration error or plan not active
- Not
Applicable – Defender plan does not support threat feeds
Summary Status
This reflects health of restore points:
- No
Threats Reported – Backups appear clean
- Suspicious
Restore Points Found – At least one restore point flagged
- Unknown
– No recent Defender scan data
- Not
Applicable – Backup type or region not supported
These indicators guide admins in selecting safe restore
points during DR operations.
💥Monitoring & Alerting
Alerts from Defender for Cloud
If malware or ransomware behavior is detected, Defender for
Cloud raises alerts that can be:
- Investigated
in the Azure Portal
- Exported
to Microsoft Sentinel
- Forwarded
to external SIEM systems
- Used
to trigger automated playbooks
Using Automation / Logic Apps
Organizations can automate containment by:
- Pausing
backup pruning
- Locking
the vault temporarily
- Notifying
Backup and Security teams
- Preserving
snapshots for investigation
This ensures you don’t lose critical evidence or safe
restore points.
💥Limitations (Preview stage)
As the feature is in preview, be aware of:
- Region
availability is limited
- Up
to 48-hour delay in some threat updates
- Aggregated
scan status for VMs backed up to multiple vaults
- Dependency
on Defender for Servers licensing
- Possible
“Unknown” status if scan telemetry hasn’t been generated
These constraints are expected to improve as Microsoft moves
toward general availability.
💥Best Practices
To fully benefit from threat detection:
✔ Enable Defender for Servers on
all protected VMs
✔ Validate “suspicious” restore
points manually
✔ Integrate alerts with
Microsoft Sentinel for correlation
✔ Use automation to preserve
restore points during incidents
✔ Train both Security and Backup
teams on the new workflow
This enhances resilience against ransomware and strengthens
your overall recovery strategy.
💥Conclusion
Backup data represents the last line of defense in a cyberattack but only if the restore points themselves are uncompromised. Azure Backup’s Threat Detection feature, powered by Microsoft Defender for Cloud, adds a crucial layer of intelligence by evaluating backup health through real-time security insights. With ransomware attacks accelerating globally, this integration offers organizations a decisive advantage: the ability to identify safe recovery points quickly and restore confidently, even under active threat. Although currently in preview, the feature already delivers meaningful benefits, and its adoption will become an essential component of cloud-based backup strategies. If you’re using Azure Backup, now is the time to start enabling and testing Threat Detection your future incident response efforts may depend on it.
Comments
Post a Comment