Category: Backup

Kerberos Authentication with Veeam v12

Kerberos Authentication with Veeam v12. NTLM authentication is still mandatory for communication between all Veeam infrastructure servers in v11. However, NTLM authentication is still required for communication between Veeam backup infrastructure servers (backup server, backup proxies, backup repositories, guest interaction proxies, log shipping servers, and mount servers). NTLM was subject to several known security vulnerabilities …

Continue reading

Advertisement

Play ransomware infection routine

A ransomware gang named “Play” was discovered on the Dark Web. Along with them, a list of 22 victims has been revealed. There is a piece of evidence that points to a possible connection between Play ransomware and Quantum ransomware, which is an offshoot of the notorious Conti ransomware group. The Cobalt Strike beacons that …

Continue reading

Advertisement

Veeam v12 Platform Overview

Veeam Platform v12 advances enterprise-grade recovery capabilities that ensure confidence in the face of disaster or cyber attack. New direct-to-object storage, advanced cloud application backups (Veeam Backup for Salesforce), greater cyber security protection, and operational efficiencies allow you to protect mire and recover faster, all from a single platform, and new features in v12.

Continue reading

Advertisement

Veeam v12 Linux Without SSH And SUDO

In Veeam B&R v11, Veeam introduced the ability to build your own immutable (Veeam Immutable Backup), hardened backup repositories on Linux. In the upcoming Veeam Availability Suite v12 release, Veeam announced some new features. Here’s a blog post about Linux permissions management in v12.

Continue reading

Hardened Repository in Veeam v12

In Veeam B&R v11, Veeam introduced the ability to build your own immutable (Veeam Immutable Backup), hardened backup repositories. This can be accomplished using any Linux server with storage and the XFS file system. As a reminder, immutability in this context means, a backup file cannot be changed, altered, or deleted without having root access …

Continue reading

error

Enjoy this blog? Please spread the word :)