Topics started by Stabz
Hello guys,One of my customer has encounter the following error message in a backup job.I never saw this message before. The Veeam version is 11 last patch.It’s a linux repository.I asked to my customer to open a support case, but in parallel maybe one of you has already meet this one ?!
Hello guys,I m trying to used the Secure Restore with Sophos Endpoint Agent.Is not an antivirus implemented by default in the configuration files. So I tried to edit the AntivirusInfos.xml but for the moment I got the following error message :Here the part added:<AntivirusInfo Name='SOPHOS Endpoint Agent' IsPortableSoftware='false' ExecutableFilePath='%ProgramFiles%\Sophos\Endpoint Defense\SophosInterceptXCLI.exe' CommandLineParameters= 'scan %Path%' RegPath='' ServiceName='' ThreatExistsRegEx='' IsParallelScanAvailable='false'> <ExitCodes> <ExitCode Type='Success' Description='Command executed successfully'>0</ExitCode> <ExitCode Type='Error' Description='Error during command handling'>1</ExitCode> <ExitCode Type='Error' Description='Unexpected error during CLI setup'>2</ExitCode> </ExitCodes> </AntivirusInfo>Does anyone have already implement Sophos Endpoint Agent with Veeam
URGENT SECURITY ALERT: VMware has issued a warning about a critical and unpatched vulnerability in Cloud Director. Tracked as CVE-2023-34060 with a CVSS score of 9.8, this flaw affects instances upgraded to version 10.5 from an older version.On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console). This bypass is not present on port 443 (VCD providerand tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present.While a fix is pending, VMware has released a shell script (https://kb.vmware.com/s/article/95534) as a workaround. This temporary mitigation won't disrupt Cloud Director installations. More information: https://www.vmware.com/security/advisories/VMSA-2023-0026.html
Hey,As we are many to use this social media, I think it’s important to inform you than data of 35M LinkedIn users freely shared on Hacking Forum.In the latest leak, the user ‘USDoD’ is offering the “Full” LinkedIn database for free, which allegedly contains 35 millions lines. They claim the database shows emails, profile data, phones, full names, and more confidential info.If you want more informations : https://www.troyhunt.com/hackers-scrapers-fakers-whats-really-inside-the-latest-linkedin-dataset/I recommend that you change your LinkedIn password quickly. Below you'll find a list of best practices in social networking security 1. Protect access to your account ( Password quality and MFA)2. Check your privacy settings3. Control your posts (Don't publish sensitive information that could be used by an attacker)4. Be careful who you talk to5. Control third-party applications6. Avoid public computers and Wifi networks7. Regularly check connections to your account8.
Bonjour la communauté française.Je voulais partager avec vous l’expérience Veeam 100 Summit. Ce rassemblement est le lieu où #VeeamVanguard, #VeeamLegends et #VeeamMVP collaborent avec l'équipe R&D de Veeam pour découvrir et échanger autour des nouveautés apportées aux solutions Veeam.Je vais essayer de vous partager cet événement au travers de mes posts sur les temps forts. La première journée a débuté ce matin avec l’équipe RICKATRON. Un vrai plaisir de voir l’ensemble de l’équipe réunie pour nous donner leurs retours sur la communauté et les évolutions à venir.Nous avons enchainé avec les présentations des partenaires/sponsors, le premier Object First par Matt Price. Nous avons eu des infos précieuses sur l’intégration de Veeam avec Object First. Solution très rapide à mettre en oeuvre (Box to Backup => 15 min, en tirant parti des SOS API et des contrôles d’accès au stockage, cela permet à Veeam de stocker les données de façons rapide et intelligemment.Nous avons égalem
Heyhey!I don't think I've seen a post in the community about the HANDS-ON LABs created by Veeam.What do these HOLs offer you?Hands-On Experience: More than just a tutorial, the HOL allows you to put your skills into practice. You can experiment, test, and develop your expertise interactively.Unique Scenarios: the HOL provides a selection of exciting and relevant scenarios, ranging from the latest advances in cyber resilience to cutting-edge multi-cloud management technologies.Expert Guides: Expert guides are there to assist you every step of the way. You'll never feel lost, whether you're a beginner or an expert. You can access to them anytime, from anywhere. There are no time limits or geographical constraints. Hands-On Labs Public With an account on the veeam.com website, you'll have access to https://go.veeam.com/hands-on-lab-experience-htmlPartner Hands-On Labs With an account on the propartner.veeam.com website, you'll have access to https://propartner.veeam.com/hands-on-labs Chee
Hello everyone,I would like to draw your attention to an issue detected following the Veeam upgrade to version 12 at one of my clients. This also applies to new installations.During backup and restoration operational tests, which are crucial to perform during installation/post-upgrade, the following error message appeared when restoring a VM: Unable to use Hot-Add mode.While analyzing the logs of a backup job, the proxies switched from Hot-Add to NBD mode.After analyzing the logs and isolating the issue to a single proxy (Forcing the proxy to use only Hot-Add + creating a test backup job with only this proxy), I was able to obtain a more informative message.There is a Veeam Knowledge Base article available at https://www.veeam.com/kb4460.To resolve the error, it is necessary to disable "multipath" on the Linux proxies, following the procedure outlined in the KB. After applying the fix, backups and restores successfully utilize the Hot-Add mode, resulting in improved performance.I apolo
📷 Retour en images du premier VUGFR en présentiel (Veeam User Group France) au sein des locaux Monaco Digital.Pour résumer cette journée : ✅ Une première édition qui a affiché complet 🎤 De nombreux ateliers ont rythmé cette journée avec des sujets d'actualités :- La protection des nouvelles applications de type Cloud Native- Les bonnes pratiques de sécurité et de résilience face aux #ransomwares- Modernisation et sécurisation des environnements de sauvegarde, stockage objet...🕹 Un quizz qui a permis à nos participants de gagner de nombreux lots ✨La fameuse VBeer pour clôturer cette belle journée Un grand merci aux équipes Veeam Software et Monaco Digital pour avoir permis la création de cet événement ainsi qu'à l'ensemble des partenaires présents Dell Technologies, TD SYNNEX, Monaco Cloud, VMware, VMware Tanzu, Nutanix, ExaGrid, Wasabi Technologies, Kasten by Veeam | #1 Kubernetes Backup pour leurs contributions et partages !Ainsi qu'aux participants pour leur belle énergie ! ☀Vos
Using a password management solution is essential in today's digital landscape, and among the most popular options is the Keepass solution.Choosing KeePass as your password management solution is a commendable first step. However, it's crucial to remember that its inherent security requires, like in any context, a thorough hardening process.In this regard, here's a project for automating the hardening of KeePass: https://github.com/onSec-fr/Keepass-Enhanced-Security-ConfigurationThis project is maintained by Antoine LECOZ; a true gem in the field of cybersecurity with very interesting projects.The script will perform the following actions:Download the latest version of KeePass from its official website. Verify the file's integrity by comparing its hash. Copy the hardened configuration file. Modify permissions on the KeePass installation folder.You can also find the official KeePass hardening guide here: https://keepass.info/help/kb/config_enf.htmlAnd you which password manager do you u
Hello guys 😄Hope everyone are well ! In my side I'm in vacation 🤙. I wanted to share with you some tests done with the beta of Veeam v12 (build 188.8.131.527) and the incredible new feature backup directly to Object Storage.Object StorageFor my test I used Wasabi as cloud object storage. You can find really great posts about Wasabi:Wasabi is now available in the list of providers when you want to add an object storage repositoryWe have less information to enter, it's appreciable You will find your repository with Wasabi Cloud Storage Type. Backup JobThe advantages of this kind of backup are multiple:Financial: you can use on-prem object storage, object storage can be cheaper than SAN Built-in durability & reliability Reduce hardware to manageLet's take a look at the setup, because there are technical side effects.As usual you select your repository, the GFS part still available and you could configure a backup copy job if necessaryIn the advanced options, it’s simplified ! Bye backu
Hello guys,A quick question about the upgrade process for a periodic backup copy job.I have a backup copy job to a NAS repository with Per-Vm option set. To upgrade the chain I have to create a new job and map the backup, during mapping Veeam will synthesize full backup from the current backup and build a per-vm chains for every object.In the case where the repository it’s not a ReFS/XFS partition, Veeam will recreate a Full Backup and I must have enough space on the disk partition right?
Hello guys, I wanted to create a topic on how migrate from MS SQL to PostgreSQL but I’m facing to an issue.I m following the procedure : https://helpcenter.veeam.com/docs/backup/vsphere/vbr_config_migrate_to_postgresql.html?ver=120At the “Target Database” step I choose “Database: PostgreSQL”Then I click to connect and I obtain the following message : For me I don’t have to create a database first, right? For me Veeam should proprose to create the database like this:Did someone else have try the migration process ?
To all users and administrators of Fortinet FortiGate Firewalls & SSL VPN solutions,A critical vulnerability has been discovered that could allow an attacker to exploit the VPN, even if MFA (Multi-Factor Authentication) is enabled.At this stage, all versions could be affected.Fortinet strongly recommends updating your systems to the following versions, which include the necessary patches:- 7.0.12- 7.2.5- 6.4.13- 6.2.15Further details are expected to land June 13.
Hello guys! It’s the first time I got this error message in one of my backup jobs. I got it in random virtual machines, after a retry the backup is ok.I check the logs:On the VBR I have this:“Error Failed to construct ClientAgentProtocol. (Veeam.Backup.Common.CRegeneratedTraceException)[27.03.2023 10:06:42.851] <46> Error at Veeam.Backup.Common.CExceptionUtil.RegenTraceExc(Exception originalExc, String formatString, Object args)[27.03.2023 10:06:42.851] <46> Error at Veeam.Backup.AgentProvider.CClientAgentProtocol..ctor(CBaseAgentService svc, Boolean redirectOutput, Version version, IAgentProtocolLogger logger, IOutputAnalyzer outputAnalyzer)[27.03.2023 10:06:42.851] <46> Error at Veeam.Backup.AgentProvider.CClientAgentProtocol..ctor(CAutoRef`1 svcRef, Boolean redirectOutput, Version version, IAgentProtocolLogger logger)[27.03.2023 10:06:42.851] <46> Error at Veeam.Backup.AgentProvider.CProxyAgent.StartClientInter
Hello,The question is in the tittle :)How do you perform the 3-2-1 golden Rules with Veeam for Microsoft Azure?I read this blogspot https://micoolpaul.com/2021/04/19/veeam-achieving-3-2-1-1-0-protection-for-cloud-native-workloads/ (thanks @MicoolPaul ) but I have some questions !Do you keep all your backup datas in Azure or use another repository for your copy?To be able to make backup copy an VBR must be deploy right ? Where do place you VBR server OnPremise on Azure? If we want to transfer backup data located in the Azure block to another S3 compatible storage, will transaction fees be applied?thanks in advance
Hello guys,Linked to the topic :A deep dive has been released on the exploitation of CVE-2023-27532. I find it really informative and raises awareness about the importance of applying updates. https://www.horizon3.ai/veeam-backup-and-replication-cve-2023-27532-deep-dive/https://github.com/horizon3ai/CVE-2023-27532
Bonjour à tous,Ces derniers temps, les attaques des infrastructures informatique sont devenues plus sophistiqués. Elles ont la capacité de crypter des données en direct et des machines virtuelles entières, mais elles ont également appris à supprimer ou à crypter les fichiers de sauvegardes . Si cela se produit et que vous ne disposez pas d'une sauvegarde hors ligne comme une bande ou une autre méthode d’externalisation vous risquez de vous retrouver dans une situation bien compliquée.Veeam apporte une sécurité supplémentaire pour nos sauvegardes avec la fonctionnalité “Veeam Hardened Linux Repository”. L’immuabilité est désormais accessible à tous. Veuillez trouver ma procédure pas à pas juste ici → https://original-network.com/veeam-hardened-linux-repository-part-i/N’hésitez pas si vous avez des questions.Enjoy it ;)
Cybercriminals from the Play ransomware group carry out computer attacks aimed at companies equipped with a Microsoft Exchange server. To compromise the server, hackers use a new exploit dubbed OWASSRF, this exploit is linked to a security patched in November 2022 by Microsoft.The CrowdStrike company conducted investigations into this attacks where the Exchange server was compromised and used to access the target infrastructure.This exploit has been called “OWASSRF” and which consist in exploit the CVE-2022-41082 via Remote Powershell. This is the same vulnerability exploited with the ProxyNotShell attacks.The difference with the OWASSRF exploit : the hackers exploite another & more recent vulnerability to attack Exchange servers: CVE-2022-41080. According to Microsoft, this is a critical flaw but it has not been exploited in attacks. Except that now it is.With this exploit, hacker deploy some softs for remote control like Anydesk etc…AFFECTED SYSTEMS:Microsoft Exchange Server 2013
Hello guys , I was wondering if one of you know how Veeam selectionne a proxy when you leave the default option in automatic.Cause I have a remote site with a proxy deploy on my standalone ESX during the job is not my remote proxy that is used but my local one, so I let you imagine the backup performance.In my memory Veeam classifies the Proxies in groups : 1.SAN, 2.HotAdd and 3.NBD.Group 1 having the higher priority. If all proxy in group 1 are busy (max tasks used), Veeam switches to group 2. Group 3 is only used if groups 1 and 2 have no responding proxies.But in my case the remote proxy do absolutely nothing...Of course I changed the default settings to selectionne only this proxy in my job, but I curious to know the exact process.
Hello guys,Following the Disable Basic Auth in M365 since Oct. 1, 2022, I m looking for the best practices to implement the Modern App Only Authentication.I ll not explain why it’s important to protect M365 datas @Iams3le already did it very weel right here: To improve security, I would use the least privilege approach and only assign the permissions which are required for the task at hand. But I m a bit confuse with the best way to do it.Regards the required permissions in the help center (https://helpcenter.veeam.com/docs/vbo365/guide/vbo_required_permissions.html?ver=60), we need Veeam Backup Account Permissions and Azure AD application permissions.Is the Veeam Backup Account Permissions mandatory with the Modern App Only Authentication? In my understanding is only needed when we need to use the legacy mode.For the creation of the Azure AD app, we need to provide a user to login to M365. What kind of account do you use as this step? A dedicated service account or an admin user accou
Hello,I have an interrogation, about how Veeam works with Forever forward Incremtal backup job and immuability.I know that’s not possible to use this kind of job with an hardened repository, even if you try to configure it, Veeam will pop up an error message. But how it work with capacity tier with object lock enabled?Veeam doesn’t transfer all data block to the capacity tier but only the new data blocks and metadata from each new backup file. (System similar to ReFS/XFS). I read the documentation about block generation but it’s not really clear in my head.If someone have a schema that would be nice.thanks
Login to the community
Log in with your Veeam account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.