No we do not have VeeamOne and it will not happen.
From the management console in the SQL server backup statistics and SQL Server log backup report there is an absence of a date. in the statistics when I move through the prior Log backups it would help to have a date/time for the start of that session making it easier to screen shot the session for documentation as well as proving to a DBA a log backup was completed. In the report details we get a listing of times. But not dates for that line. Even though the date is at the top of the report each line would be helpful.
-
- Lurker
- Posts: 1
- Liked: never
- Joined: Feb 14, 2020 7:15 pm
- Full Name: Timothy Leerhoff
- Contact:
-
- Product Manager
- Posts: 20406
- Liked: 2298 times
- Joined: Oct 26, 2012 3:28 pm
- Full Name: Vladimir Eremin
- Contact:
Re: Enhancement request
Can you post a screenshot of the statistics window or report you want us to enhance? Should help us to understand your request better. Thanks!
-
- Lurker
- Posts: 1
- Liked: never
- Joined: Mar 16, 2018 6:00 pm
- Full Name: Patrick Vanderlind
- Contact:
Re: Enhancement request
When managing cloud connect backups, please implement multi-factor authentication when doing critical functions like delete. With the uptick in ransomware attacks, adding an additional layer of security could go a long way to ensure unauthorized deletion of an entire chain of backups does not take place. Send a failure email if the second authentication factor fails. This email could serve as an early warning of the attack.
Even though the backup COULD be infected, locking down the deletion of these backups would at least preserve a resolution path, and give us an additional window of time to realize the infection.
If an attack happens, much, if not all the data would be changed. Veeam Backup and Replication would see this data as new, and a huge increase in backup time would take place. This increase would be evident in the daily status emails to the admin.
PLEASE realize, if the attack is not able to delete the backups because of the multi- factor authentication, recovery time of the attack could be significantly decreased! If the backups are deleted, recovery would be nearly impossible without paying the ransom.
Even though the backup COULD be infected, locking down the deletion of these backups would at least preserve a resolution path, and give us an additional window of time to realize the infection.
If an attack happens, much, if not all the data would be changed. Veeam Backup and Replication would see this data as new, and a huge increase in backup time would take place. This increase would be evident in the daily status emails to the admin.
PLEASE realize, if the attack is not able to delete the backups because of the multi- factor authentication, recovery time of the attack could be significantly decreased! If the backups are deleted, recovery would be nearly impossible without paying the ransom.
-
- Chief Product Officer
- Posts: 31806
- Liked: 7300 times
- Joined: Jan 01, 2006 1:01 am
- Location: Baar, Switzerland
- Contact:
Re: Enhancement request
To protect against unauthorized deletions, we recommend that you use a Cloud Connect provider with the Insider Protection feature enabled.
Who is online
Users browsing this forum: Bing [Bot], esteven, restore-helper, Semrush [Bot] and 343 guests