Troye exposes the Entra ID backup blind spot

Issue 4 and 5 2025 Information Security, Infrastructure

Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra ID – formerly Azure AD – but they do not. Troye argues that relying on Microsoft alone to secure your identity infrastructure is a recipe for disaster.


Helen Kruger.

“That is why we are urging South African businesses to adopt Redstor’s Entra ID Backup, a proactive and comprehensive solution designed to safeguard identity data and recover it in minutes, not weeks,” says Troye CEO, Helen Kruger.

Microsoft Entra ID is central to modern identity and access management, supporting everything from user authentication to conditional access policies. However, as experts have warned, Entra ID’s native tools provide limited backup and recovery options, with logs kept for only 30 days and no way to revert critical changes like permission misconfigurations or deleted roles.

That means a breach, insider threat, misconfiguration, or accidental deletion can cause catastrophic damage - without any reliable way to recover.

Redstor delivers immutable, cloud-native backups of your Entra ID environment, including user accounts, roles, group memberships, admin units, Intune policies, and conditional access configurations. With unlimited retention, you can restore any deleted or modified object at any time - even if months or years have passed - breaking Microsoft’s 30-day limitation.

Kruger says recovery is granular and fast. “You can restore individual user objects, specific permissions, or entire policy sets within seconds, or roll back unwanted changes using built-in change comparison tools.”

Redstor's support for Entra ID offers instant recovery of core identity components, automated change monitoring, and ransomware-resistant backups stored offsite with AES-256 encryption and immutable retention - ensuring compliance with standards like ISO 27001, GDPR, SOC 2, and HIPAA.

A recent MSP case study highlighted how a client's global admin account was compromised, resulting in over 1800 unauthorised changes across their Entra ID tenant. Without Redstor, remediation took days of manual effort and relied heavily on incomplete logs. After adoption, automatic restores eliminated that overhead and significantly reduced downtime.

This solution is essential for organisations using Entra ID - or Microsoft 365 - that cannot rely on Microsoft’s limited native recovery tools:

● Enterprises with high compliance or audit requirements

● Businesses vulnerable to insider threats, misconfiguration, or ransomware

● Organisations lacking built-in identity recovery tools

● MSPs and IT teams that want a multi-tenant, scalable backup solution

As a trusted Redstor partner in South Africa, Troye delivers everything needed to protect Entra ID from identity loss, offering full implementation and seamless integration into your Microsoft 365 and Entra ID environment, along with local support aligned to South African regulatory requirements, and expert training and consultancy to strengthen identity resilience and recovery readiness.

Find out more at www.troye.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.