Comprehensive data protection for all workloads
Post Reply
OMW72
Enthusiast
Posts: 61
Liked: 5 times
Joined: Nov 16, 2022 2:18 pm
Contact:

File mask config (trusted objects)

Post by OMW72 »

Hi all,
I have question regarding the file mask function within the file detection section of the Malware detection settings.
When I put for example the path C:\VeeamFL\ into the section (trusted objects) does it mean that this path is excluded from the file detection scan option and the encryption detection option (enable inline entopy analysis) as well?
Regards
Oliver
vnikiforov
Product Manager
Posts: 41
Liked: 12 times
Joined: Aug 17, 2022 5:03 am
Full Name: Vladimir Nikiforov
Location: Romania
Contact:

Re: File mask config (trusted objects)

Post by vnikiforov »

Hello, Oliver,

No, adding a path like C:\VeeamFL\ to the Trusted objects section does NOT exclude it from the encryption detection (inline entropy analysis). It only excludes it from the file detection scan.

The documentation is clear on this point:
To exclude a file name or file extension listed in the SuspiciousFiles.xml file and ignore it during the scan, do the following: Help Center - Excluding Suspicious Files and Extensions

To ignore a specific file or a folder during the scan: Help Center - Excluding Files and Folders
Excluding files and folders here is applied only to the following malware activity types:
  • Known suspicious files and extensions
  • Renamed files
  • Deleted files
Encryption Detection (Inline Entropy Analysis)
This is a completely different detection mechanism. The inline scan operates at the data block level during backup processing, not at the file-system metadata level. It scans the data stream for
encrypted files, onion links, and ransom notes. The inline scan does not reference the Trusted objects list from the File Detection tab at all (Help Center - Encryption Detection).
---
BR,
Vladimir
Veeam Software
OMW72
Enthusiast
Posts: 61
Liked: 5 times
Joined: Nov 16, 2022 2:18 pm
Contact:

Re: File mask config (trusted objects)

Post by OMW72 »

Hi Vladimir,
thanks for the quick response in this matter.
Finally there is no filter for the inline entropy analysis option availble. The complete VBK/VIB (RestorePoint) will be usedfor the scan it is is not possible to break it down to the file-level.
Regards,
Oliver
vnikiforov
Product Manager
Posts: 41
Liked: 12 times
Joined: Aug 17, 2022 5:03 am
Full Name: Vladimir Nikiforov
Location: Romania
Contact:

Re: File mask config (trusted objects)

Post by vnikiforov »

Hello, Oliver,

On this, you are correct, but the inline entropy scans data as it is read from the source; inline entropy scan does not scan the backup files themselves. The purpose of the entropy scan is to detect common malware indicators in the data read during backup, and as such, there is nothing to "exclude".
---
BR,
Vladimir
Veeam Software
OMW72
Enthusiast
Posts: 61
Liked: 5 times
Joined: Nov 16, 2022 2:18 pm
Contact:

Re: File mask config (trusted objects)

Post by OMW72 »

Hi Vladimr,
again thanks for the quick response and explanation.

Regards,
Oliver
OMW72
Enthusiast
Posts: 61
Liked: 5 times
Joined: Nov 16, 2022 2:18 pm
Contact:

Re: File mask config (trusted objects)

Post by OMW72 »

Hi Vladimir,
just to be sure the only possibility to exlude VM´s from the inline entopy scan is inside the option: burgermenu--> global exclusion--> malware exclusion--add VM , correct?

Regards,
Oliver
vnikiforov
Product Manager
Posts: 41
Liked: 12 times
Joined: Aug 17, 2022 5:03 am
Full Name: Vladimir Nikiforov
Location: Romania
Contact:

Re: File mask config (trusted objects)

Post by vnikiforov »

Hello, Oliver,

As per User's Guide this option excludes the following:
Malware exclusions are applied only to guest indexing data scan and inline scan and do not affect scan using Veeam Threat Hunter, third-party antivirus software, or YARA.
VM scan exclusion types
---
BR,
Vladimir
Veeam Software
Post Reply

Who is online

Users browsing this forum: d.artzen, Google [Bot], Semrush [Bot] and 261 guests