![]() ![]() Also if this domain-user is being logged on to his client and has admin-access to the VBR server, ransomware can also being activated on drives of the VBR server. ![]() Why? If ransomware is nested in a roaming profile of a domain-user connecting to the domain-joined VBR server, this malware can be activated on the VBR server and impact the backups. There are of course more things possible, but it’s a start.ġ – Do not domain-join the backup server in the production domainĪ best-practice is to put the VBR server in a workgroup and not AD domain-joined for smaller environments. ![]() ![]() I will give you here 10 tips you can implement. The first thing that comes in mind, is to harden your Veeam Backup & Replication server as much as possible. Next to this rule, one of the first things to keep in mind is to protect as much as possible your backups because those can save you when you are being attachked and you need them. It is always important to implement the golden 3-2-1-1-0 rule (in detail explained in a former post of me – 3-2-1-1-0 Golden Backup Rule – Orbid365). More en more companies are being a victim of malware, ransomware or even hackers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |