Step 9. Specify Secure Restore Settings

At the Secure Restore step of the wizard, you can instruct Veeam Backup & Replication to scan machine data for malware activity before restoring the machine to the production environment. To scan the data, Veeam Backup & Replication uses the following engines:

To specify secure restore settings, do the following:

  1. Select the method you want to use for data scan:
  • Select the Scan restore points with Veeam Threat Hunter option to use Veeam Threat Hunter.

This option is available if you configured Veeam Threat Hunter as detection engine in Signature Detection settings.

  • Select the Scan restore points with your existing antivirus software to use third-party antivirus software.

This option is available if you configured third-party antivirus in the Signature Detection settings.

Tip

Click Change to open Malware Detection Settings window where you can change your scan engine to Veeam Threat Hunter.

  • Select Scan the restore point with the following YARA rule to use YARA as a scan engine.

For a YARA rule to appear in the drop-down list, it must be placed in the YaraRules folder in the Veeam Backup & Replication product folder.

Tip

To copy the path to the folder with YARA rules, click Copy YARA rules location to clipboard.

  1. Select which action Veeam Backup & Replication will take if the scan finds a virus threat:
  • Proceed with recovery but disable network adapters — restore the VM with disabled network adapters (NICs).
  • Abort VM recovery — cancel the restore session.
  1. Select the Continue scanning all remaining files after the first occurrence check box if you want the antivirus software to continue the VM data scan after the first malware is found. For information on how to view the results of the antivirus scan, see Viewing Antivirus Scan Results.

Step 9. Specify Secure Restore Settings 

Page updated 12/2/2024

Page content applies to build 12.3.0.310