20 July 2025Andrea Mauro
No comments
Reading Time: 4 minutes
Veeam Backup & Replication has several advanced data security features useful to:
- Built‑in security withaZero Trust Architecture
- Detect threats earlier withproactive threat hunting
- Maintain integrity withimmutability everywhere
- End downtime withincident response
But not all of them are available in all Veeam edition.
In Veeam Data Platform v12 there are three diffent editions: Foundation, Advanced, Premium. If you are not using VUL licensing, the socket based license Enterprise Plus is feature similar to the VUL Foundation.

Security features useful pre-backup
- Security & Compliance Analyzer: a built-in tool to ensure that your backup server configuration follows security best practices for Veeam backup infrastructure components based on Microsoft Windows Server and Linux operating systems.
To automate implementation of Security & Compliance Analyzerrecommendations, just use the script provided by Veeam KB 4525. - Veeam Incident API (feature introduced in v12.1): makes it easy for external CyberSecurity and Analytics tools (including XDR/NDR/MDR/EDR) to notify the backup server of infections at earlier attack stages, ensuring all restore points created after the corresponding moment in time for the given machine are marked as infected. Furthermore, you can enable Veeam to instantly create an out-of-band restore point of the affected machine, before malware has a chance to do much damage.
- MFA autentication (feature introduced in v12): VeeamBackup&Replication supports multi-factor authentication (MFA) for additional user verification. A one-time password (OTP) generated in a mobile authenticator application is used as a second verification method. Combined with login and password credentials, it creates a more secure environment and protects user accounts from being compromised.
- Four-eyes authorization (feature introduced in v12): you can enable four-eyes authorization to reduce the risk of accidental actions affecting sensitive data. This functionality requires additional approval for certain operations in VeeamBackup&Replication given by another user.
- Data Observability & Analtics: provided by Veeam ONE (for this reason an Advanced license is required)
- Recon Scanner by Coveware: with the Recon Scanner as a feature of Veeam Data Platform, customers can proactively identify threats before they can cause damage. By scanning Veeam environments Recon Scanner collects data and recognizes suspicious activity and TTPs, organizations can proactively take defensive and mitigation actions. (Premium license is required)
Security features useful during backup
- 12:
- Entropic inline malware detection: To scan blocks in a data stream, VeeamBackup&Replication uses inline entropy analysis.
- File system activity analysis: To scan guest indexing data, VeeamBackup&Replication uses file system activity analysis.
- IoC Tools Scanner (feature introduced in v12.3): Indicators of compromise (IoC) are non-malware programs. However, their unexpected presence on a system can indicate a security risk. They are selected from and categorized using theMITRE ATT&CK Matrix. (Advanced license is required)
- Repository with soft immutability: to protect backup files from being modified or deleted, you can make them immutable. The feature is supported for any tier of scale-out backup repository.. with the Linux based hardened backup repository or with 3th pary solutions (like S3 Object Lock).
- Backup Data Encryption at rest: Data encryption transforms data to an unreadable, scrambled format. If encrypted data is intercepted, it cannot be unlocked and read by the eavesdropper. Only intended recipients who know the secret key can reverse encrypted information to a readable format.
Security features useful during restore or post-attack
- Backup Scan: limited for Windows machine in v12 (supporting also Linux machine in upcoming v13)
- YARA rule based scanning (Advanced license is required, see also Cannot use YARA rules with Veeam Backup)
- Veeam Threat Hunter signature-based scanning (Advanced license is required): see also How fast is Veeam Threat Hunter?
- 3rd party antivirus signature-based scanning (Advanced license is required)
- Secure Restore and SureBackup: useful to automatically scan you backup
- Orchestrated Restore & Clean Room Recovery using Veeam Recovery Orchestrator (Premium license is required)
- Incident Response by Coveware (only for selected customers)
Security ecosystem
Veeam is not (yet) a security company, they have lot of security related features, but they enable integration with other specialized security solution:

Related Posts
Veeam acquires Covewareto improve security features
Veeam has acquired Coveware, a leading provider in cyber-extortion incident response. Coveware combines aggregated ransomware case data, refined negotiating techniques and sound financial and operational controls to achieve superior ransomware incident response and recovery for our clients. The company created Recon and Unidecrypt, two proprietary…
Cannot use YARA rules with Veeam Backup
One of the interesting new features of Veeam Backup & Replication is the introduction of YARA (Yet Another Recursive Acronym) rules to scan the VM guest files. As explained in this great blog post, YARA is one of the most effective ways to help identify…
YARA exit code 1 in Veeam Backup Scan
Backup Scan using YARA rule is one of the new feature of Malware detection methods in Veeam Backup & Replication 12.1. During the Scan Backup session, does one of the following:Finds the last clean restore pointAnalyzes the content for specific informationDuring the restore session with…
How fast is Veeam Threat Hunter?
Veeam Threat Hunter is a new feature introduced in Veeam Backup & Replication 12.3 that provides the speed of YARA scans and the breadth of malware detection of a classic antivirus. Note: this function is able to scan backups only for VMs with Windows guest…
Scan your backup with Veeam Threat Hunter
Many customers are using backup tools to identify potential dormant threats in their environment and Veeam Backup & Replication adds a lot of malware detection methods starting with v 12. Whether through periodic manual spot-checks, continuous scheduled backup scans (for example with SureBackup), or alert-driven…
Veeam Recon Scanner 2.1byCoveware
Recon ScannerbyCoveware is a security feature of Veeam Data Platform that enable customers to proactively identify threats before they can cause damage. Recon Scanner is a forensic triage utility. It comes equipped with a proactive function,Scanner, which gathers the critical data required for an efficient…
Andrea Mauro

Virtualization, Cloud and Storage Architect. Tech Field delegate.VMUG IT Co-Founder and board member. VMware VMTN Moderator and vExpert 2010-24. Dell TechCenter Rockstar 2014-15. Microsoft MVP 2014-16. Veeam Vanguard 2015-23. Nutanix NTC 2014-20. Several certifications including: VCDX-DCV, VCP-DCV/DT/Cloud, VCAP-DCA/DCD/CIA/CID/DTA/DTD, MCSA, MCSE, MCITP, CCA, NPP.
Veeam, vSecuritynone