Veeam Support - Case # 07545635
I am seeing a number of WinEventLogs coming from our security monitoring, with the source type being XLMWinEventLog, reporting that a destination host is using its computer account to run a parent process C:\Windows\SysWOW64\MSIEXEC.EXE, which in turn runs C:\Windows\SysWOW64\DISKPART.EXE.
For example, SERVER1 is the destination, SERVER1$ is the user and then the parent process, and then the new process.
DISKPART is running a script using the following command: DISKPART /S "C:\ProgramData\Veeam\Setup\Temp\DISKPARTSC.TXT.
I put in a ticket with Veeam to find out why and how Veeam would use DISKPART .
They stated
While DISKPART is a Windows Operating System utility, Veeam may use this utility to request information about components that are being backed up, as well as during specific restore processes:
- Veeam may use diskpart in a few different situations, including:
Restoring a MBR disk to a UEFI system
Checking the SAN policy. You can use the SAN command in diskpart to check the SAN policy of a Windows OS
Checking for a logically locked disk. You can use diskpart.exe to check if a disk is logically locked in the Veeam proxy
Checking the disk status. You can use diskpart to check the disk status if you are having trouble restoring VMs via SAN
When the process finishes the script file is no longer in the TEMP folder, so I do not know what it is doing. It is very concerning that the log states the script originates in the Veeam folder. In the follow up with their engineer he stated that "Veeam Agent for Windows does not utilize diskpart in any way during backup".
I don't feel comfortable with this process or the explanation. Has anyone ever seen this before?
TIA.
Lewis