How Veeam Threat Hunter Works
Veeam Threat Hunter is a signature-based scan engine provided by Veeam. It is used as an alternative to third-party antivirus software to scan the restore points. The Veeam Threat Hunter Service is automatically installed on a mount server and runs in the background.
During the Scan Backup session, the Veeam Threat Hunter scan works in the following way:
- On the mount server, Veeam Backup & Replication runs the Veeam Mount Service to perform the following steps:
- Mount machine disks from backups to the mount server under the C:\VeeamFLR\<machinename> folder.
- Initiate a Veeam Threat Hunter scan.
- If Veeam Threat Hunter does not find a clean restore point, the Scan Backup session will be finished with the Failed status. The malware detection event will be created for each restore point. Objects will be marked as Infected.
- If Veeam Threat Hunter finds a clean restore point, the Scan Backup session will be finished with the Success status. The malware detection event will not be created.
Note |
Consider the following:
|