Skip to main content

Have search and search and can’t seem to find out what this icon with the red bug on it means. Can anyone give any insight as to what it means?

 

Hi, it means that the VM has suspected malware inside it. You need to go to the main screen, look at the job statistics for the VMs with that symbol, or go to the inventory view to see more information and whether to mark as clean. This could be something as simple as your AV using file extensions that trigger a rule, or it could be something sinister, so you’d best investigate and validate its findings. More details: https://helpcenter.veeam.com/docs/backup/vsphere/malware_detection.html?ver=120


This icon marks suspicious/infected machines as identified by the new malware detection features in Veeam Backup & Replication 12.1.

See details here: How Malware Detection Works - User Guide for VMware vSphere (veeam.com)


Ok, thanks for the information. I know one of our commercial business programs has given a false positives in the past with our AV product. I will dig into it. For future reference, is there a document that has what has all of Veeam’s icons/symbols along with their meaning?


Hi!

 

I hadn’t found this page before but it turns out there is one, here: Restore Points Icons - User Guide for VMware vSphere (veeam.com) and a second for hypervisor icons: Hypervisor Infrastructure Icons - User Guide for VMware vSphere (veeam.com)


It is definitely a surprise icon if you have not used 12.1 for a bit, but as noted by others it is suspicious/infected file detection.  Great new feature and if you use Veeam ONE you can see the Threat Dashboard too.


By the way welcome to the Veeam Community @Heather 


You gave me an idea there @Heather  also → an icon library in UIs...


Hi!

 

I hadn’t found this page before but it turns out there is one, here: Restore Points Icons - User Guide for VMware vSphere (veeam.com) and a second for hypervisor icons: Hypervisor Infrastructure Icons - User Guide for VMware vSphere (veeam.com)

Good find, those will be handy to remember for reference


So how is it possible to browse the infected file(s)?


So how is it possible to browse the infected file(s)?

You would need to determine them from the logs that created during scanning and then go from there.


So I think @Uchenna Bilson ‘s next question is where do I get those logs…

 

 


Comment