What is Secure Restore?
Secure Restore is a feature in Veeam Backup & Replication designed to protect your environment from malware during the recovery process. It allows you to scan restore points for malware before restoring them to the production environment. This can be achieved using several options: your own antivirus software, Veeam's embedded antivirus Threat Hunter, and YARA rule-based scanning. By leveraging these tools, Secure Restore ensures that only clean data is restored, enhancing the security of your backups and minimizing the risk of reintroducing malware into your systems. This proactive approach strengthens your overall data protection strategy and helps maintain the integrity and safety of your IT environment.
Why is Secure Restore Important?
-
Enhanced Security: It scans restore points with antivirus software and YARA rules before restoration, ensuring that backups are free from malware and other threats. This reduces the risk of reinfecting your production environment by scanning backups before they are restored.
-
Faster Recovery Times: The quick scans enable rapid data restoration without compromising security. This ensures that your systems can be brought back online swiftly, minimizing downtime.
-
Compliance Assurance: It helps meet stringent data compliance standards by ensuring only safe data is restored. This is crucial for organizations that need to adhere to specific regulations and standards.
-
Peace of Mind: Knowing that your backups are clean and free from threats provides confidence in your disaster recovery plan. This assurance helps maintain data integrity and continuity, fostering a robust disaster recovery strategy.
In essence, Veeam Secure Restore ensures that your data recovery process is not only fast and efficient but also secure and compliant with industry standards, giving you confidence in your backup integrity.
How does Secure Restore work?
-
Backup Creation: Veeam Backup & Replication creates restore points during regular backup jobs.
-
Initiating Restore: When initiating a restore operation, you have the option to enable Secure Restore.
-
Selecting Scan Options: You can choose to scan the restore points using your own antivirus software, Veeam's embedded antivirus (Threat Hunter), or YARA rules. These tools help identify any potential malware within the backup data.
-
Temporary Mounting: Veeam temporarily mounts the backup data to perform the scan without making any changes to the production environment.
-
On-Demand Scanning: The selected antivirus software, Threat Hunter, or YARA rules scan the mounted data for malware.
Scan Results
- If no malware detected: The restore process proceeds and the data is restored to the production environment.
- If malware is detected:
Stop the Restore: Cancel the restore process to prevent the infected data from being restored.
Continue with Restore Without Network: Proceed with the restore process, but without network connectivity to isolate the restored data.
By following these steps, Secure Restore ensures that only clean data is restored, protecting your environment from potential malware threats and enhancing the overall security of your backup and recovery processes.