3. HI GIO M365 BaaS
Last updated
Last updated
This is a document on how to:
Add New Organizations
Create a Backup Job
Restore on Self-service Restore Portal
Step 1: Log in to HI GIO Portal https://portal-hcmc02-backup.higiocloud.vn/ with your company account.
In the Enter Company\User and Enter password fields, specify the credentials of an authorized user.
The user name must be provided in the Company Name\User format.
Click Log in.
Step 2: At the top right corner of the HIGIO Portal., click Configuration
Step 3: In the configuration menu on the left, click Plugin Library, then Click the Veeam Backup for Microsoft 365 plugin tile.
Step 4: In the menu on the left, click Organizations, then at the top of the list, click New.
Step 5: At the Protected Services step of the wizard, select Microsoft services that you want to protect (Exchange Online, SharePoint Online and OneDrive for Business, Microsoft Teams, Teams chats).
You can select Microsoft Teams and Teams chats check boxes only if both Exchange Online, SharePoint Online, and OneDrive for Business check boxes are selected.
Attention: Backing up Teams chats requires using protected APIs and additional billing charges from Microsoft. For details, see Microsoft Docs. For details on configuring your backup infrastructure to back up Teams chats, see this Veeam KB article.
Step 6: At the Connections Settings step of the wizard, select Microsoft Azure region is Default
Step 7: At the Application Settings step of the wizard, select the Register a new Azure AD application automatically option and specify the name of the new Azure AD application.
[If you have selected to protect SharePoint Online and OneDrive for Business] Select allow this application to enable export mode for SharePoint Web Parts check box to allow Veeam Backup for Microsoft 365 to back up web parts of your Microsoft SharePoint sites. For details on web parts, see Microsoft Docs.
Step 8: At the Microsoft 365 Logon step of the wizard, log in to your Microsoft 365 organization:
Click Copy code to copy an authentication code.
Consider that the code is valid for 15 minutes. You can click Refresh code to request a new code from Microsoft.
Click the Microsoft verification portal link.
A web browser window will open.
On the Sign in to your account webpage, paste the code you have copied and sign in to Microsoft Azure.
Make sure to sign in with the user account that has the Global Administrator role. For details on this role, see Microsoft Docs.
Return to the wizard and click Next when the Verification status: Verified
Step 9: Review organization settings and click Finish at the Summary step of the wizard.
From now on, these steps below just need to be done one time
Step 10: Register AzureADServicePrincipal for Tenant
Azure AD application that end users and restore operators from tenant organizations will use to access Restore Portal must be created for a Microsoft 365 organization on a service provider side.
Open the Powershell
Update PowerShell with Winget by below command
Run the Install-Module cmdlet to install the Azure Active Directory PowerShell for Graph module. For more information, see this Microsoft article.
Open a Windows PowerShell Command Prompt window. Depending on the permissions of your logged-in account, you may need to open the PowerShell window in Administrator mode.
To install the v1 module of the SDK in PowerShell Core or Windows PowerShell, run the following command:
This process may take some time to complete.
Run this command to install the beta module:
Run this command to install AzureAD module:
Register AzureADServicePrincipal with Power Shell
Connect to Organization and register AzureADServicePrincipal using the command below.
Connect-AzureAD
This command to log in to Azure Organization, the please user account that has Global Administrator permission
New-AzureADServicePrincipal -AppId "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
The AppId support team will provide for customers.
Example: New-AzureADServicePrincipal -AppId "514abb4a-63c9-44b9-9f88-2b188b32a3cf"
Step 11: Grant admin consent to this application on behalf of all users in the tenant organization
Access Azure Portal https://portal.azure.com/ with a user account that has Global Administrator permission
Find AzureADServicePrincipal by application ID.
Choose tab permission to Grant admin consent.