Step 6. Specify Secure Restore Settings

 

At the Secure Restore step of the wizard, you can instruct Veeam Backup & Replication to perform secure restore — scan restored disk data with antivirus software before restoring the disk. To learn more about secure restore, see the Secure Restore section in the Veeam Backup & Replication User Guide.

To specify secure restore settings:

  1. In the Content scan section, specify the following:
  1. If you want to scan the restored volume with a scan engine or antivirus software, select the method you want to use for data scan:
  • Select the Scan restore points with Veeam Threat Hunter option to use Veeam Threat Hunter.

This option is available if you configured Veeam Threat Hunter as the detection engine in the malware detection settings. To learn more, see the Signature Detection section in the Veeam Backup & Replication User Guide.

  • Select the Scan restore points with your existing antivirus software option to use third-party antivirus software.

This option is available if you configured a third-party antivirus as the detection engine in the malware detection settings. To learn more, see the Signature Detection section in the Veeam Backup & Replication User Guide.

Tip

Click Change to open the Malware Detection Settings window where you can change the detection engine to Veeam Threat Hunter.

  1. To use a YARA rule as a scan engine, select the Scan the restore point with the following YARA rule check box and choose a YARA rule from the drop-down list. By default, the YARA rules are located in the folder by the following path: C:\Program Files\Veeam\Backup and Replication\Backup\YaraRules.

 

  1. Instruct Veeam Backup & Replication what to perform in case malware is found:
  • Select Proceed with recovery if you want to continue the recover process, despite the found malware threat.
  • Select Abort disk recovery if you want to stop the recovery process after the first malware threat is found.
  1. In the Scan options section, select the Continue scanning all remaining files after the first occurrence check box if you want the antivirus software to continue volume scan after the first malware threat is found. For information on how to view results of the antivirus scan, see the Viewing Malware Scan Results section in the Veeam Backup & Replication User Guide.

Step 6. Specify Secure Restore Settings

 

Page updated 12/3/2024

Page content applies to build 6.3.0.177