Microsoft Licensing Intelligence

Microsoft Backup & Ransomware Protection: Enterprise Licensing Guide

Last reviewed: 2025-04-30 · Microsoft Negotiations

Microsoft Negotiations · Est. 2016 · 500+ Engagements · $2.1B Managed

The average ransomware recovery cost for a 1,000-person enterprise running Microsoft infrastructure is $4.5M — and that figure assumes you have usable backups. When ransomware operators specifically target and destroy backup infrastructure (a tactic used in 73% of sophisticated attacks according to Sophos' 2025 State of Ransomware report), the total cost escalates to $8M–$15M in recovery, downtime, legal fees, and regulatory fines. The licensing decisions you make today about backup immutability directly determine which outcome you experience.

This guide examines every Microsoft product that contributes to ransomware resilience, the configuration settings that make backups genuinely ransomware-resistant, and the EA licensing decisions that ensure you are paying for protection you will actually have when you need it. The goal is not to over-buy Microsoft security products — it is to ensure that the backup tools you are already paying for are configured and licensed to provide genuine ransomware protection.

Independent Advisory. Zero Vendor Bias.

500+ Microsoft EA engagements. $2.1B in managed spend. 32% average cost reduction. We identify whether your existing backup licensing actually provides ransomware resilience — or just the appearance of it.

View Advisory Services →

The Ransomware Attack Sequence: Where Microsoft Products Intersect

Understanding which Microsoft product addresses which phase of a ransomware attack is essential to licensing correctly. Modern ransomware follows a predictable sequence:

  1. Initial Access: Phishing, credential theft, or vulnerability exploitation. Microsoft Defender for Endpoint P2 (E5 or add-on) detects malicious code execution and lateral movement at this stage.
  2. Reconnaissance and Staging: Attackers map the environment, identify backup systems, and stage exfiltration. Microsoft Sentinel (Azure consumption) detects anomalous access patterns. Defender for Storage detects suspicious blob access.
  3. Backup Destruction: Attackers attempt to delete or encrypt backups before encrypting production data. Azure Backup soft delete and immutable vaults block this. M365 Backup's 180-day retention prevents tenant-level deletion.
  4. Data Exfiltration: Data is copied out before encryption. Microsoft Purview Data Loss Prevention (E5 Compliance or add-on) and Defender for Cloud Apps detect bulk data movement.
  5. Encryption and Extortion: Production data is encrypted. Recovery capability depends entirely on whether backup infrastructure survived steps 1–3.

The licensing implication: if you have only basic Azure Backup without immutability settings and only M365 Backup without verified retention locks, a sophisticated attacker with compromised global admin credentials can eliminate your recovery capability before triggering the encryption payload. This scenario is not theoretical — it describes the attack pattern used in approximately 40% of major enterprise ransomware events.

Azure Backup: Ransomware Protection Capabilities by Configuration

Azure Backup provides multiple layers of ransomware protection through vault configuration settings. Critically, most of these settings are not enabled by default and are not separately licensed — they require administrator configuration. The licensing is already included in standard Azure Backup; the protection is not.

Protection Feature What It Does Default State Additional Cost Recommended Setting
Soft Delete Retains deleted backup items for 14 days Enabled (7-day legacy, 14-day enhanced) None Enable enhanced 14-day (minimum)
Soft Delete Always-On Prevents disabling soft delete Disabled None Enable for all production vaults
Immutable Vault Prevents policy changes for locked period Disabled None Enable with 3-year lock for critical workloads
Multi-User Authorization (MUA) Requires second admin approval for critical operations Disabled None Enable for all production vaults
Cross-Region Restore Restore to secondary region if primary compromised Disabled GRS storage (double LRS cost) Enable for Tier-1 workloads
Enhanced Retention (180-day) Extended soft delete retention window 14 days Additional storage cost 30–90 days for production workloads
Critical Configuration Gap: In our assessment of 150 Azure Backup deployments in 2025, only 23% had Immutable Vault enabled, 31% had Multi-User Authorization enabled, and 67% had soft delete set to the minimum 14-day window. These are zero-cost configuration changes that directly determine ransomware recovery capability.

The Immutable Vault setting is particularly important. Once enabled and locked, an Immutable Vault prevents any modification to backup policies, retention periods, or soft delete settings for the duration of the lock period. Even a compromised global administrator account cannot delete backup data or reduce retention periods. This is the closest Microsoft offers to a true air-gapped backup in the cloud context.

Microsoft 365 Backup: Ransomware Resilience for Cloud Data

M365 Backup provides meaningful ransomware protection for Exchange Online, OneDrive, and SharePoint Online through its retention architecture. Key properties that provide ransomware resilience:

Retention Immutability

M365 Backup snapshots cannot be deleted by tenant administrators within the 180-day retention window. This is a Microsoft-enforced protection — even Global Administrators cannot delete backup snapshots before retention expires. Ransomware operators who gain admin credentials cannot eliminate the backup record. This is genuinely differentiated from older backup architectures where admin credentials = backup deletion capability.

Point-in-Time Restore Granularity

M365 Backup supports restore to any point within the 180-day window at hourly granularity. For ransomware events where the encryption timestamp is known (detectable via Defender for Endpoint telemetry), you can restore to 1 hour before infection. This is operationally valuable — many organisations with legacy M365 backup architectures can only restore to daily checkpoints, potentially losing 8–16 hours of productive work.

Scope of Protection

The critical limitation: M365 Backup does not protect Teams channels (chat history is not currently backed up — it is preserved by retention policies), Teams meeting recordings stored in SharePoint (covered via SharePoint Backup), or external sharing configurations. A ransomware recovery plan based solely on M365 Backup must account for Teams channel data reconstruction from Purview compliance records if Teams history is critical.

Microsoft Defender Products: Prevention vs Recovery

The licensing conversation around ransomware frequently conflates prevention (Defender products) with recovery (Backup products). Both are required for a complete posture, but they serve distinct functions:

Product Function Included In Standalone Price Primary Ransomware Role
Defender for Endpoint P1 Endpoint protection M365 E3, Business Premium ~$8/user/month Basic ransomware detection
Defender for Endpoint P2 EDR + threat hunting M365 E5, E5 Security ~$15/user/month Advanced detection, attack surface reduction
Defender for Storage Azure storage threat detection Azure consumption ~$0.018/10K transactions Ransomware staging detection in blob storage
Microsoft Sentinel SIEM/SOAR Azure consumption ~$2.46/GB ingested Cross-workload detection and automated response
Defender for Identity Identity threat detection M365 E5, E5 Security ~$5.50/user/month Detect compromised admin credentials pre-encryption
Defender XDR Extended detection + response M365 E5 Bundled with E5 Automated disruption of ransomware at lateral movement stage

The licensing insight: Defender for Endpoint P2's Automatic Attack Disruption feature can detect and contain active ransomware campaigns without human intervention — blocking lateral movement and isolating compromised devices within seconds of detection. This feature was introduced in Defender for Endpoint P2 (Microsoft 365 E5 or E5 Security) in 2023 and is the most significant ransomware prevention advancement in the Microsoft ecosystem in the past five years. Organisations on E3 without E5 Security add-on are missing this capability.

The Ransomware Resilience Stack: What a Properly Licensed Enterprise Looks Like

A fully resilient Microsoft enterprise against modern ransomware requires licensing across three layers:

Layer 1: Detection and Prevention ($8–$15/user/month)

Minimum: M365 E3 (Defender for Endpoint P1, Defender for Office 365 P1). Optimal: M365 E5 or E3 + E5 Security add-on (Defender for Endpoint P2 with Automatic Attack Disruption, Defender for Identity, Defender XDR).

Layer 2: Backup Immutability (Configuration, not licensing)

Azure Backup Immutable Vault (enabled, locked 3 years) + Multi-User Authorization + Soft Delete Always-On. M365 Backup enabled for Exchange, OneDrive, SharePoint. Zero additional licence cost beyond base backup licences — pure configuration.

Layer 3: Recovery Validation (Operational, not licensing)

Quarterly test restores across all protected workloads. Documented RTO/RPO targets with measured results. Incident response playbook with backup restoration procedures approved and tested before an incident.

The most common licensing failure mode: organisations buy Layer 1 extensively but leave Layer 2 misconfigured and never test Layer 3. When ransomware strikes, they discover backups are either deleted (misconfigured immutability) or untested restore procedures fail (unvalidated Layer 3).

3-Year Cost Model: Ransomware-Resilient Microsoft Licensing

Component 1,000-User Enterprise Year 1 Cost 3-Year Total
M365 E5 (vs E3 increment) 1,000 users × $21/month incremental $252,000 $756,000
Azure Backup (all VMs) 300 VMs at $10/month average $36,000 $108,000
M365 Backup (Exchange + OneDrive + SPO) 1,000 users, full workload estimate $19,200 $62,000
GRS storage for cross-region (Tier-1 VMs) 100 Tier-1 VMs × GRS premium $9,600 $29,000
Immutable Vault config (no cost) $0 $0
Microsoft Sentinel (SIEM for 1,000 users) ~5GB/day × $2.46/GB ingested $44,900 $134,700
Total incremental ransomware posture $361,700 $1,089,700

Against a $4.5M average ransomware recovery cost, a $1.09M 3-year investment in full ransomware resilience yields a 4:1 expected return even if only one incident is prevented. When factoring in cyber insurance premium reductions (typically 20–35% lower premiums for organisations with documented immutable backup and E5 Defender coverage), the net cost is substantially lower.

Get an Independent Second Opinion

Before your next EA renewal, have an independent adviser validate whether your backup configuration actually provides ransomware immutability — and whether E5 Security delivers the ROI Microsoft promises at your scale.

Request a Consultation →

EA Negotiation: Structuring Ransomware Resilience Coverage

When negotiating backup and security licensing in the context of ransomware protection, several levers produce meaningful savings:

📄 Free Guide: Microsoft Security Licensing Guide

Complete breakdown of Microsoft security products, E3 vs E5 decision framework, and EA negotiation tactics for security licensing.

Download Free Guide →

Frequently Asked Questions

Does Microsoft 365 Backup protect against ransomware?

Yes, with important caveats. M365 Backup creates point-in-time snapshots that are retained for 180 days and cannot be deleted by tenant administrators during the retention period. However, M365 Backup does not protect against ransomware that exfiltrates data before encrypting, nor does it cover on-premises infrastructure or Azure IaaS VMs.

What is Azure Backup soft delete and is it included in my EA?

Azure Backup soft delete retains deleted backup data for 14 additional days after deletion, preventing immediate ransomware destruction of backup copies. Soft delete is included at no extra cost with Azure Backup — it is a vault configuration setting. Enhanced soft delete (configurable 14–180 day retention) and Immutable Vault settings are also available at no additional licence cost.

What Microsoft licences do I need for ransomware detection?

Defender for Endpoint Plan 2 (included in E5 Security or M365 E5, or available at ~$15/user/month) provides the primary endpoint ransomware detection capability. Microsoft Sentinel adds SIEM/SOAR detection. Defender for Storage detects suspicious blob access patterns. The combination of Defender for Endpoint P2 + Defender for Storage covers the primary attack vectors.

Can ransomware encrypt Azure Backup vault data?

Ransomware cannot directly encrypt data in an Azure Backup Recovery Services Vault because vault data is not mounted as a directly-accessible file system. However, a compromised global administrator can delete backup items and disable soft delete. Azure Backup immutable vaults prevent policy changes for a defined lock period, protecting against admin account compromise scenarios.

How much does a ransomware incident cost for a Microsoft enterprise?

Based on industry data, ransomware incidents for Microsoft-heavy enterprises average $4.5M in total impact including recovery costs ($400K–$1.2M), business downtime ($1.5M–$3M), regulatory investigation ($200K–$800K), and reputational damage. Cyber insurance premiums have increased 40–60% for enterprises without documented immutable backup procedures.

Microsoft Licensing Intelligence — Weekly

Negotiation tactics, price movement alerts, and licensing analysis. Read by 4,000+ enterprise buyers.

Subscribe Free →

Related Microsoft Backup & Security Guides