Performing Veeam Threat Hunter Scan
To perform Veeam Threat Hunter scan during the restore session, do the following at the Secure Restore step of the restore wizard:
- Enable the Scan restore points with Veeam Threat Hunter option.
- Specify the behavior scenario if malware activity is found. For more information about available options, see the following sections:
- Secure Restore settings for Instant Disk Recovery
- Secure Restore settings for Entire VM Restore
- Secure Restore settings for Virtual Disk Restore
- Secure Restore settings for Disk Export
- Secure Restore settings for Restore to Microsoft Azure
- Secure Restore settings for Restore to Amazon EC2
- Secure Restore settings for Restore to Google Compute Engine
- If you want to continue Veeam Threat Hunter scan after the first malware is found, select the Continue scanning all remaining files after the first occurrence check box.