Signature Detection

You can configure default engines to scan restore points. To do this, perform the following steps:

  1. From the main menu, select Malware Detection > Signature Detection.
  2. Specify a detection engine:
  1. To additionally scan restore points marked as Suspicious after guest indexing data scan or inline scan, select the Perform signature-based scan when malware event appears check box. In this case, a Scan Backup session will run automatically:
    • If malware activity is detected,  the Veeam Analyzer Service will create a new malware detection event and mark the restore point and the machine as Infected.
    • If malware activity is not detected, the Veeam Analyzer Service will create a new malware detection event with the Informative status. After that, you can mark a restore point and a machine as Clean. For more information, see Managing Malware Status.
    • If a restore point contains encrypted disks, such backups cannot be mounted and will not be scanned. In this case, a scan session will display mount errors in the log file and will be finished with Warning. The Veeam Analyzer Service will not create any malware detection events.

To automatically mark a restore point and a machine as Clean, select the Mark backups as clean if no threats are detected by signature-based scan check box. In this case, a malware detection event with the Informative status will not be created and a Clean event will be created instead.

Note

Consider the following when you use a proactive signature-based scan:

  • Only the following Suspicious malware detection events trigger a scan session:
    • File encryption
    • Ransomware notes and .onion files
    • Known malware extensions
    • Bulk file renaming
    • Bulk file deletion
  • The mount server must be compatible with the guest OS file system to perform a signature-based scan for the guest indexing data properly.
  • Maximum 5 scan sessions can be run simultaneously per mount server.
  • Scanning backups kept in object storage repositories may lead to additional costs.
  • Signature-based scan is not supported for backups kept in Cloud Connect repositories.
  • It is recommended to double-check restore points and machine automatically marked as Clean as these events may be false positive.
  • If you selected third-party antivirus software as a detection engine but it is not installed on the mount server or the configuration file is improperly configured, a scan session will fail. A failed session will be retried three times.

Signature Detection 

Page updated 11/24/2025

Page content applies to build 13.0.1.180