BackupSecurityVeeam Backup

Malware detection methods in Veeam Backup & Replication 13

Malware detection methods in Veeam Backup & Replication 13
41views

Veeam Backup & Replication version 13 (for Linux Appliance and Windows) includes significant improvements in malware detection compared to version 12.3, and several new features have been added. The different malware detection methods in this version, although different in function and purpose, can be used in combination to increase the level of security. These methods provide different results depending on when they are run (during backup or after) and the type of analysis.

The role of malware detection capabilities

Malware detection is a key part of the security and anti-ransomware mechanisms in this release. However, it should be noted that these capabilities are designed more to detect infections after they occur and are not a replacement for proactive security solutions. For complete protection, different layers of security should be used simultaneously.

Malware detection methods fall into two main categories:

1. Detection during backup (Inline)
In this method, data is checked during processing and transmission, and an alert is issued if suspicious behavior is observed.

2. Post-Processing Detection
In this case, the saved restore points are analyzed to identify infections that may not have been active at the time of the backup.

Different methods of malware detection

In version 13, several methods are available for detecting threats:

Guest Indexing Data Scan

This method checks file system activity during backup. Things like:

  • Suspicious files
  • Change file extensions
  • Bulk deletion of files
  • Unusual characters in the file structure

If these cases are identified, a “suspicious” status is recorded.

Inline Scan (Entropy Analysis)

In this method, data blocks are analyzed for their entropy level. An abnormal increase in entropy can be a sign of extensive encryption by ransomware. Onion links and ransomware notes can also be identified. The result of this check will also usually be “suspicious.”

YARA-based Scan Backup and Secure Restore

This method uses YARA rules to check recovery points. This check can:

  • Identify the last healthy restore point.
  • Detect infected files during recovery

If infection is confirmed, the status is recorded as “Infected.”

Scan Backup and Secure Restore with Veeam Threat Hunter

This method is signature-based and detects known threats based on a database of signatures. If malware is detected, the recovery point is marked as infected.

Using a third-party antivirus

In this case, the user-selected antivirus engine is used when restoring or scanning the backup. The scan result can indicate the infection status of the Restore Point.

Veeam Incident API

This feature allows for integration with other security solutions. If an external security system detects a threat, it can communicate the result to Veeam via an API so that the recovery point can be marked as infected.

How to check the results

If a scan result is “suspicious,” it means there is unusual behavior and not necessarily a definite infection. In such cases, additional investigation should be performed:

  • Encrypted files should be examined with more detailed analytical tools.
  • Onion links or ransomware notes require rules-based analysis.
  • Details of file changes, deletions, and intrusion indicators are recorded in the backup server log files.

New features in version 13

Proactive Investigation

This feature automatically checks for suspicious items with signature-based scanning. If no threats are found, the Restore Point is marked as “clean.” This feature reduces the need for manual review and speeds up decision-making.

Recon Scanner integration

The Recon Scanner tool, previously offered separately, is now available integrated into the platform, enabling more advanced threat analysis.

Conclusion

Version 13 offers a full suite of malware detection methods that work both during and after backup. These methods range from behavioral and entropy analysis to signature-based scanning and integration with other security tools. Features like Proactive Investigation also make the process of identifying and managing threats more automated and efficient

Leave a Response

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock