Reading Time: 3 minutes

With Veeam Backup & Replication 12.3, the malware detection methods have been improved compared with 12.1 version.

The different malware detection methods are similar, they work in different way and can be used together to reach different scopes, but now there are more options.

As previous, the first main diffecence is that some works inline (during the backup process on the source data) and other works with a post-processing directly on restore points saved on the repositories. They provide different type of results.

Also, the load of those malware detection activities can be on different Veeam components, basically on the proxy servers for inline methods and the mount servers for the post-processing methods.

This table summirizes the different malware detection methods available on Veeam Backup & Replication 12.3 (for more information see: https://helpcenter.veeam.com/docs/backup/vsphere/malware_detection_methods.html?ver=120):

Malware detection featureDetection methodType of objects analyzedObjects ca nbe marked as…Notes
Guest Indexing Data ScanInline file system activity analysisGuest OS indexing dataSuspiciousDuring the backup job, detects the following malware activity: Known suspicious files and extensionsRenamed filesDeleted files, Indicators of compromise
Inline ScanInline entropy analysisBlocks in a data streamSuspiciousDuring the backup job, detects the following malware activity: Encrypted filesOnion links or Ransom notes
Scan Backup and Secure RestoreRule-based detection (YARA)Restore pointsInfectedDuring the Scan Backup session, does one of the following:Finds the last clean restore pointAnalyzes the content for specific informationDuring the restore session with the Secure Restore option, detects malware activity as specified in the YARA rule.
Secure Restore and Scan BackupSignature-based detection (Veeam Threat Hunter)Restore pointsInfectedDuring the Scan Backup session, finds the last clean restore point.
During the restore session with the Secure Restore option, detects malware activity.
During the SureBackup job, detects malware activity.
Secure Restore and Scan BackupThird-party antivirus softwareRestore pointsInfectedDuring the Scan Backup session, finds the last clean restore point. During the restore session with the Secure Restore option, detects malware activity as specified in the antivirus configuration file
Veeam Incident APIThird-party malware protection solutionDepends on the configuration of the malware protection solutionInfectedUses Veeam Incident API to send a request about detected malware activity to Veeam Backup & Replication.
For more information, see Veeam Backup & Replication REST API Reference

Each of them has diffent settings, different limitations, different requirements, different way to investigate on the results.

The main differences from version 12.1 and 12.2 are:

  • Veeam Threat Hunter (added in v 12.3): a signature-based scan engine provided by Veeam. It is used as an alternative to third-party antivirus software to scan the restore points.
    The Veeam Threat Hunter Service is automatically installed on a mount server and runs in the background.
    See also: Scan your backup with Veeam Threat Hunter and How fast is Veeam Threat Hunter?
  • Custom Internet proxy support has been added in version 12.3.1 for downloading updates to the Veeam Threat Hunter threat signatures. Before the mount server was not able to download the new signatures using a proxy server. Note: new signatures are download on each scan operation.
  • Indicators of Compromise (IoC): Indicators of compromise are non-malware programs. However, their unexpected presence on a system can indicate a security risk. Indicators of compromise are specified in the SuspiciousFiles.xml file. They are selected from and categorized using the MITRE ATT&CK Matrix. Version12.3 leverages its file system indexing functionality to detect and report the sudden appearance of utilities from hacker’s toolkit, which are commonly utilized by cybercriminals for lateral movement, data exfiltration, command and control, stored credential access, and more, with the list of tools constantly updated by Veeam.
    See also: Indicators of Compromise
Share