Tech Forward: Elevating Women, Engaging Allies
Top technical сommunity program
Run by users, for users
Start on-demand training
Hello,I have a question regarding how Veeam uploads backup files to Azure Blob Storage, and I’m a bit confused by the behavior. I believe the documentation might not be fully accurate or clear on this point.Here’s the scenario: I created an Azure Storage Account and set the default access tier to Hot. I also created a container inside that storage account. On the Veeam side, I configured an Azure object storage repository, and I left the "Use cool blob storage tier (may result in higher cost)" checkbox unchecked. Use cool blob storage tier My First question is: In this case, what access tier does Veeam use when uploading backup files to the container? Will the backups be uploaded with the Hot tier (as per the storage account default), or does Veeam explicitly set a tier regardless of the default?My Second question is: same scenario but with default access tier (Azure Side) set to Cool.My Third question is: same scenario but with default access tier (Azure Side) set to Cold.
Ok all...a bit late posting end of (my) day..apologies, but here’s this week’s 2nd Community-provided VMCE Practice Question. This week’s question is provided by Community member @Airless . Thank you!For those new to the VMCE page, please hide your comment (guess). To do so → before typing your response, click the ellipsis (3 dots) icon on the far right of the format toolbar at the top in your comment box and select the Spoiler option. This will place a ‘hide comment’ text box in your comment box area. Click inside this hide comment text box and start typing your answer (guess). Be careful to not click outside of the box or your comment will show after saving. We want your comment to not show after clicking the Send button so others can take full advantage of these practice questions. Also, please no need to do a ‘quote’ comment of this question; I would like to keep these practice questions neat. Let me know if you have issues. Good luck on the question!~~~~~~~~~~~~~~~~~~~~~~~Your co
If you’re looking to protect your Microsoft Entra ID (which you might remember as Azure Active Directory) with Veeam Backup & Replication, it’s actually pretty straightforward with version 12.3 and above. You’ll need to make sure you’ve got enough Veeam licensing (one unit per 10 users, all-or-nothing), and have the right infrastructure in place—Veeam will auto-install a local PostgreSQL database for tenant backups, and tenant logs can go to NAS or S3 storage like the 11:11 Cyber Vault. The protection process involves adding your Entra tenant to the Veeam inventory using your Tenant ID, setting up separate backup jobs for tenant data and logs (with encryption and tailored retention), and then scheduling them as needed. Once your jobs run, you can easily check exactly how many Veeam license units you need, thanks to a 30-day grace period. This setup gives you coverage for users, groups, devices, apps, role assignments, conditional access policies (if enabled), and all the relevant l
This is part three of three addressing general topics of environmental architecture for backup systems.In part XVI, we examined considerations for the placement of individual backup components, hardware configuration, and fault tolerance (Point 1 and 2 of the following list of major threats).In part XVII, we examined considerations for locations and site redundancy (Point 3 to 5 of the list of major threats).In this part, we address the aspects of ransomware, malware, theft and threats by insiders. These are points 6 to 8 on the list of major threats to backup environments that we identified in the last part. What are the main threats to backup data? Wrong placement of backup environment components Hardware damage to backup systems Power outages or disasters at one location Power outages or disasters at multiple locations External locations for backup data Ransomware attacks Theft of access data and unauthorized access Intentional or unintentional damage by insidersAs with the topics i
Microsoft has announced that after 15 years, the Secure Boot certificates built into Windows systems are starting to expire. To stay protected and keep devices running smoothly, new certificates will need to be installed. These certificates form the foundation of trust for the operating system.So, what exactly is Secure Boot?Secure Boot is a security feature built into UEFI (Unified Extensible Firmware Interface) that ensures only trusted software is allowed to run when your computer starts up. It does this by checking the digital signature of each piece of boot software like drivers and the operating system against a list of trusted keys stored in the system’s firmware.As an industry standard, Secure Boot defines how firmware manages these certificates, verifies firmware integrity, and how the operating system interacts with this process.This whole trust system is based on Public Key Infrastructure (PKI), which uses Certificate Authorities (CAs) to manage and store digital certificate
Hi!! Everyone knows that OCI currently has some limitations.But we can protect workloads in OCI or for OCI. In this architecture, we deliver protection for your OCI workloads to another region of the OCI cloud. Each workload is separated via a VCN.All machines have Veeam Agent to treat the machine as bare metal and use the "Entire Computer" copy method.The green lines refer to data transfer.Blue lines refer to metadata or delta traffic.The Pool allows a VM in a private subnet to send or fetch data from Object Storage over the Oracle private network using a Service Gateway. The design is super simple, just to share the structure's functionality. We also left snapshots of the machines to enable fast restores.This architecture has already undergone some changes, such as offloading to an on-premises appliance to enable on-premises restores via backup copies. That's all for today. Thank you!
I just passed the VMCA v12 exam. Thanks for the unofficial Study guide. 🙂
I upgrade my VBR then when try to upgrade the component for my hyper-v i got error the destination file already exists.How we can solve this?
Hello,i would like to know if regkey for updating automatically thread hunter is workingKey Location: HKLM\ SOFTWARE\Veeam\Veeam Threat Hunter\Value Name: VTHInternetProxyValue Type: String Value (REG_SZ)Value Data: <proxy>:<port> could you please advise how to check easily that is working update of signatures? thank you
Hi Hello everyone,I am here to share with you my experience configuring VBR for the Azure Local environment, a step-by-step guide to configuration.Link:KB4047: Veeam Support for Azure Stack HCIRenaming Azure Stack HCI to Azure Local - Azure Local | Microsoft LearnAzure Local solution overview - Azure Local | Microsoft LearnPrerequisites:Veeam Backup & Replication v11a or later (v12 or later recommended). Azure Stack HCI\ Azure Local registered in Azure. PowerShell and Azure modules installed. Administrative access to Veeam Server and the HCI environment. Azure Arc enabled (optional but recommended).Ensure PowerShellGet is updated (recommended)Install-Module -Name PowerShellGet -Force -AllowClobberSet-ExecutionPolicy RemoteSigned -Scope CurrentUserInstall the Az moduleInstall-Module -Name Az -Scope AllUsers -Repository PSGallery -ForceUpdate-Module -Name Az -ForceDuring the process of adding the Azure Local cluster dedicated to the HyperV environment, you will receive the following
Already have an account? Login
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.