Requirements and Limitations

Veeam Threat Hunter has the following requirements and limitations:

  • Veeam Threat Hunter only supports HTTPS connections. As such, Veeam Threat Hunter does not support the HTTP proxy or No proxy for options on Veeam Infrastructure Appliances. If you want to use a proxy, you must specify a HTTPS proxy.
  • To get malware signature updates, a backup server and a mount server must have an internet connection. The following outgoing connections must be allowed:
  • From the backup server to the Veeam License Update Server on ports 80 and 443. For more information, see backup server connections.
  • From the mount server to the Veeam Signature Update Server on port 443. For more information, see mount server connections.

Note

Some files may not be scanned because of the file access problems caused by the conflict between Veeam Threat Hunter and third-party antivirus software. If you use Veeam Threat Hunter as a default scan engine, make sure that no third-party antivirus software is installed on the mount server. Alternatively, you can add exclusions for Veeam Backup & Replication to the third-party antivirus software configuration. For more details, see this Veeam KB article.

Page updated 7/10/2025

Page content applies to build 13.0.1.1071