Veeam security features and required licenses (2025)

20 July 2025Andrea Mauro

No comments

Reading Time: 4 minutes

Veeam Backup & Replication has several advanced data security features useful to:

  • Built‑in security withaZero Trust Architecture
  • Detect threats earlier withproactive threat hunting
  • Maintain integrity withimmutability everywhere
  • End downtime withincident response

But not all of them are available in all Veeam edition.

In Veeam Data Platform v12 there are three diffent editions: Foundation, Advanced, Premium. If you are not using VUL licensing, the socket based license Enterprise Plus is feature similar to the VUL Foundation.

Veeam security features and required licenses (1)

Security features useful pre-backup

  • Security & Compliance Analyzer: a built-in tool to ensure that your backup server configuration follows security best practices for Veeam backup infrastructure components based on Microsoft Windows Server and Linux operating systems.
    To automate implementation of Security & Compliance Analyzerrecommendations, just use the script provided by Veeam KB 4525.
  • Veeam Incident API (feature introduced in v12.1): makes it easy for external CyberSecurity and Analytics tools (including XDR/NDR/MDR/EDR) to notify the backup server of infections at earlier attack stages, ensuring all restore points created after the corresponding moment in time for the given machine are marked as infected. Furthermore, you can enable Veeam to instantly create an out-of-band restore point of the affected machine, before malware has a chance to do much damage.
  • MFA autentication (feature introduced in v12): VeeamBackup&Replication supports multi-factor authentication (MFA) for additional user verification. A one-time password (OTP) generated in a mobile authenticator application is used as a second verification method. Combined with login and password credentials, it creates a more secure environment and protects user accounts from being compromised.
  • Four-eyes authorization (feature introduced in v12): you can enable four-eyes authorization to reduce the risk of accidental actions affecting sensitive data. This functionality requires additional approval for certain operations in VeeamBackup&Replication given by another user.
  • Data Observability & Analtics: provided by Veeam ONE (for this reason an Advanced license is required)
  • Recon Scanner by Coveware: with the Recon Scanner as a feature of Veeam Data Platform, customers can proactively identify threats before they can cause damage. By scanning Veeam environments Recon Scanner collects data and recognizes suspicious activity and TTPs, organizations can proactively take defensive and mitigation actions. (Premium license is required)

Security features useful during backup

  • 12:
    • Entropic inline malware detection: To scan blocks in a data stream, VeeamBackup&Replication uses inline entropy analysis.
    • File system activity analysis: To scan guest indexing data, VeeamBackup&Replication uses file system activity analysis.
    • IoC Tools Scanner (feature introduced in v12.3): Indicators of compromise (IoC) are non-malware programs. However, their unexpected presence on a system can indicate a security risk. They are selected from and categorized using theMITRE ATT&CK Matrix. (Advanced license is required)
  • Repository with soft immutability: to protect backup files from being modified or deleted, you can make them immutable. The feature is supported for any tier of scale-out backup repository.. with the Linux based hardened backup repository or with 3th pary solutions (like S3 Object Lock).
  • Backup Data Encryption at rest: Data encryption transforms data to an unreadable, scrambled format. If encrypted data is intercepted, it cannot be unlocked and read by the eavesdropper. Only intended recipients who know the secret key can reverse encrypted information to a readable format.

Security features useful during restore or post-attack

  • Backup Scan: limited for Windows machine in v12 (supporting also Linux machine in upcoming v13)
  • Secure Restore and SureBackup: useful to automatically scan you backup
  • Orchestrated Restore & Clean Room Recovery using Veeam Recovery Orchestrator (Premium license is required)
  • Incident Response by Coveware (only for selected customers)

Security ecosystem

Veeam is not (yet) a security company, they have lot of security related features, but they enable integration with other specialized security solution:

Veeam security features and required licenses (2)

Related Posts

  • Veeam acquires Covewareto improve security features

    Veeam has acquired Coveware, a leading provider in cyber-extortion incident response. Coveware combines aggregated ransomware case data, refined negotiating techniques and sound financial and operational controls to achieve superior ransomware incident response and recovery for our clients. The company created Recon and Unidecrypt, two proprietary…

  • Cannot use YARA rules with Veeam Backup

    One of the interesting new features of Veeam Backup & Replication is the introduction of YARA (Yet Another Recursive Acronym) rules to scan the VM guest files. As explained in this great blog post, YARA is one of the most effective ways to help identify…

  • YARA exit code 1 in Veeam Backup Scan

    Backup Scan using YARA rule is one of the new feature of Malware detection methods in Veeam Backup & Replication 12.1. During the Scan Backup session, does one of the following:Finds the last clean restore pointAnalyzes the content for specific informationDuring the restore session with…

  • How fast is Veeam Threat Hunter?

    Veeam Threat Hunter is a new feature introduced in Veeam Backup & Replication 12.3 that provides the speed of YARA scans and the breadth of malware detection of a classic antivirus. Note: this function is able to scan backups only for VMs with Windows guest…

  • Scan your backup with Veeam Threat Hunter

    Many customers are using backup tools to identify potential dormant threats in their environment and Veeam Backup & Replication adds a lot of malware detection methods starting with v 12. Whether through periodic manual spot-checks, continuous scheduled backup scans (for example with SureBackup), or alert-driven…

  • Veeam Recon Scanner 2.1byCoveware

    Recon ScannerbyCoveware is a security feature of Veeam Data Platform that enable customers to proactively identify threats before they can cause damage. Recon Scanner is a forensic triage utility. It comes equipped with a proactive function,Scanner, which gathers the critical data required for an efficient…

Andrea Mauro

Veeam security features and required licenses (9)

Virtualization, Cloud and Storage Architect. Tech Field delegate.VMUG IT Co-Founder and board member. VMware VMTN Moderator and vExpert 2010-24. Dell TechCenter Rockstar 2014-15. Microsoft MVP 2014-16. Veeam Vanguard 2015-23. Nutanix NTC 2014-20. Several certifications including: VCDX-DCV, VCP-DCV/DT/Cloud, VCAP-DCA/DCD/CIA/CID/DTA/DTD, MCSA, MCSE, MCITP, CCA, NPP.

Veeam, vSecuritynone

Veeam security features and required licenses (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Eusebia Nader

Last Updated:

Views: 6443

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.