An Azure native disaster recovery service. Previously known as Microsoft Azure Hyper-V Recovery Manager.
When designing on‑prem VMware disaster recovery to Azure using Azure Site Recovery (ASR), the Recovery Services Vault settings can be confusing because Microsoft documents backup and replication behaviors separately. The following reflects what most enterprise environments actually implement.
1. Soft Delete — Enable (Recommended)
Yes — Soft Delete should be enabled on the Recovery Services Vault.
Soft Delete provides a safety buffer against:
accidental deletion of vault items
malicious deletion or ransomware activity
administrative mistakes during DR operations
It ensures you have a recovery window before vault‑related data is permanently removed. Microsoft increasingly treats Soft Delete as a baseline security control. (ref: https://learn.microsoft.com/en-us/azure/backup/secure-by-default)
Important Clarification
Soft Delete in a Recovery Services Vault primarily protects:
backup metadata
vault‑protected objects
deleted backup items
It does not directly protect ASR‑replicated VM data the same way Azure Backup does.
However, enabling Soft Delete is still considered best practice because:
it adds a layer of protection with minimal operational impact
it aligns with governance and security baselines
most organizations enable it globally for consistency
Recommended Configuration
Enable Soft Delete
Retention: keep the default 14 days
Extend only if:
regulatory or security policy requires longer retention
you have concerns about ransomware dwell time or delayed detection
Microsoft strongly discourages disabling Soft Delete except in temporary lab, testing, or migration scenarios. (ref: https://docs.azure.cn/en-us/backup/backup-azure-security-feature-cloud)