Tom, as always, you are a wealth of helpful information. In my particular instance, our security team has signed off on a hardened server that has this setting enabled. I'm sure that with the right justification, I can disable it, but I wanted to see if there was another solution that wouldn't require me to do that. As I mentioned in my original post, I've been seeing these FIPS errors in one part of VBR or another since 6.1. Does Veeam do any testing with this setting enabled? Even if it's not something that you, Veeam, could fix, at least it could be included in the Known Issues documentation.
I would also like to point out that this came to my attention when I realized that ADE wasn't working as expected. It would seem to mount fine, but when I would select my ntds.dit, I got an error that read:
Code: Select all
The process cannot access the file '<path to ntds.dit>' because it is being used by another process.
This led me to the ADE log for that session which had the FIPS error at the bottom. So if anyone else receives this error message, it's possible that it might not have anything to do with access to the ntds.dit file.