Hi guys,
First, I’m not sure if I should be posting here or forums.veeam.com? Either way, here’s my setup:
- Hyper-V host domain-joined to customer infrastructure, running Windows Server 2022, patched with July 2024 cumulative patches. Security software includes S1, Threatlocker, and Huntress. Threatlocker is in “learning” mode and is not blocking anything.
- Backup server is also running Windows Server 2022 patched with the latest July 2024 cumulative update. Security software includes SentinelOne and Duo authentication to enable MFA for local user logins. Backup box is *not* domain joined at all.
I’ve been told this is a UAC issue, but using a domain user bypasses this problem. I feel like I’m taking crazy pills. No matter what I do, I can’t get the backup server to authenticate with the Hyper-V host using a domain account. I can get it to authenticate, browse \\hypervip\ADMIN$ share, and connect with Veeam with the built-in, named Administrator account and I can get it to authenticate, browse \\hypervip\ADMIN$ share, and connect with Veeam using other local user accounts after adding the LocalAccountTokenFilterPolicy registry key to the Hyper-V host.
Using AD\user even after they’ve been added to the local admin group is just not working. It’s not a username/password issue - I’ve tried with a few different accounts including a domain admin account. The goal here is to have things as buttoned down as much as possible.
I was starting to believe this just wasn’t possible. Even Veeam support seemed to think the only option was to use built-in Admin or use registry key above with a different local user account. Then I read this thread last night:
can't use non "administrator" account for connecting to Hyper-V host | Veeam Community Resource Hub
I think a lot of people might have moved on by now, but I’m going to be moving all customers to Hyper-V and want to make sure I get this right out of the gate.
One more interesting point - I’ve tried with other Windows boxes on the same network to see if they can browse to \\hypervip\ADMIN$ and it doesn’t work, but last night, I randomly tried to access the same share with an apple device over VPN using AD\user and it *was* able to browse the share which makes me think it’s a windows-to-windows authentication issue.
Also, I’ve tried disabling firewalls on both devices - I just haven’t tried fully disabling UAC but to me I would rather use a local admin account and just disable remote uac via registry key vs fully disabling UAC and using domain account.