Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Azure VM corrupted

Home Forums Cloud Computing Microsoft Azure Azure VM corrupted

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author

  • GaryQuay

    Hi Folks ,

    I am new to azure and have recently build a Win 2012 DC server in Azure .
    Notice that recently after removing the roles and feature for IIS maangemnt .
    When I Logon to the VM I cant launch the etc Explorer ,exe file .
    Anyone can help on any way to restore the VM .


    Anybody can exercise this new capability by choosing the Replace existing tab in the Restore Configuration blade. The prerequisite for replacing disks operation is an existence of source IaaS VM. This operation is comprised of the following steps:

    • Azure Backup first takes the snapshot of the IaaS VM before replacing the disks as the replace operation modifies the production VM. The snapshots taken are stored in the Staging location provided by the user.
    • On successful completion of step 1, the existing disks connected to the VM are replaced using the selected restore point.
    • In parallel to the step 2, the snapshot created in step 1 is copied to the vault and retained as per the customer specified retention policy.

    Replace existing option is currently supported for unencrypted managed VMs. It is not supported for generalized VMs and for VMs created using custom images. We are also looking forward to add a capability to replace Azure VMs when restoring.

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: