Share via

Soft-Delete and Redundancy for Recovery Services Vault when protecting Onprem VMWare machines using Site Recovery

Anandha Chandrasekaran 20 Reputation points
2026-05-13T22:26:43.5833333+00:00

Hi,

We are trying to protect OnPrem VMWare Virtual Machines using Azure Site Recovery to Azure. I would like to understand what is the recommended Settings for Soft Delete and Redundancy for Recovery Services Vault ?

Should we enable Soft Delete in this case ?

Should we enable LRS, ZRS or GRS?

I am going though this document https://learn.microsoft.com/en-us/azure/site-recovery/vmware-physical-azure-support-matrix#azure-storage but there are no clear answers from here for Recovery Service Vault Settings

Azure Site Recovery
Azure Site Recovery

An Azure native disaster recovery service. Previously known as Microsoft Azure Hyper-V Recovery Manager.


1 answer

Sort by: Most helpful
  1. Mark Patnaude 160 Reputation points
    2026-05-13T23:14:50.3966667+00:00

    When designing on‑prem VMware disaster recovery to Azure using Azure Site Recovery (ASR), the Recovery Services Vault settings can be confusing because Microsoft documents backup and replication behaviors separately. The following reflects what most enterprise environments actually implement.

    Yes — Soft Delete should be enabled on the Recovery Services Vault.

    Soft Delete provides a safety buffer against:

    accidental deletion of vault items

    malicious deletion or ransomware activity

    administrative mistakes during DR operations

    It ensures you have a recovery window before vault‑related data is permanently removed. Microsoft increasingly treats Soft Delete as a baseline security control. (ref: https://learn.microsoft.com/en-us/azure/backup/secure-by-default)

    Important Clarification

    Soft Delete in a Recovery Services Vault primarily protects:

    backup metadata

    vault‑protected objects

    deleted backup items

    It does not directly protect ASR‑replicated VM data the same way Azure Backup does.

    However, enabling Soft Delete is still considered best practice because:

    it adds a layer of protection with minimal operational impact

    it aligns with governance and security baselines

    most organizations enable it globally for consistency

    Enable Soft Delete

    Retention: keep the default 14 days

    Extend only if:

         regulatory or security policy requires longer retention
         
               you have concerns about ransomware dwell time or delayed detection
               
    

    Microsoft strongly discourages disabling Soft Delete except in temporary lab, testing, or migration scenarios. (ref: https://docs.azure.cn/en-us/backup/backup-azure-security-feature-cloud)

    Was this answer helpful?

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.