Resolving Pending State During Cluster Removal with k10multicluster Tool
This article helps in finding and deleting long-running finalizers that are waiting on other resources and can cause deletions to appear stuck in terminating...
7AI Score
How to Configure Veeam Intelligent Diagnostics Log Location
This article documents how to change the location where Veeam Intelligent Diagnostics stores the logs it collects—allowing customers to configure both where those logs are stored temporarily on the Veeam Backup Server before being transferred to the Veeam ONE server and where those logs are stored....
6.8AI Score
Veeam Recovery Media for Linux OS, Workarounds
Veeam Support Knowledge Base answer to: Veeam Recovery Media for Linux OS,...
3.5AI Score
Veeam Support Knowledge Base answer to: Troubleshooting '401 - Unauthorized' or 'x509' Errors When Accessing the Veeam Kasten for Kubernetes...
7.2AI Score
What Data Does Veeam Kasten for Kubernetes Include in the Phone Home Reports
This article documents what data is included in the phone home reports sent by Veeam Kasten for...
7.1AI Score
Scale-Out Backup Repository Offload task fails with "There is not enough space on the disk"
Veeam Support Knowledge Base answer to: Scale-Out Backup Repository Offload task fails with "There is not enough space on the...
1.9AI Score
How-To Export Windows Event Logs
This article provides step-by-step instructions to export Windows events for Veeam...
3AI Score
Veeam Agent for Linux - veeamsnap and blksnap Extended Linux Distribution Support
This article describesVeeam Agent for Linux support for distribution versions released after the latest release of Veeam Agent for...
2.5AI Score
How to Connect to an Object Storage Repository via AWS Privatelink / Direct Connect
This article documents how to configure Veeam Backup & Replication to use AWS PrivateLink or AWS Direct Connect for Scale-Out Backup Repository offload to Capacity Tier or Archive...
6.9AI Score
Datastore Named 'VeeamBackup_' Listed as Inaccessible
The datastore appears "inaccessible" because the ESXi host cannot access the NFS share hosted by the vPower NFS Service on the Mount Server listed in the datastore's name. If no restores are actively utilizing the Veeam vPower NFS feature, the datastore's inaccessible state is expected...
3.8AI Score
Release Information for Dell PowerStore Plug-In for Veeam Backup & Replication
Release Information for Dell PowerStore Plug-In for Veeam Backup &...
3.1AI Score
How to Properly Off-Board a Namespace From Veeam Kasten for Kubernetes Backups
This article documents the procedure to properly off-board a namespace in Veeam Kasten for...
7AI Score
How to ‘Transform’ Multiple Resources with Regex
Veeam Support Knowledge Base answer to: How to ‘Transform’ Multiple Resources with...
7.1AI Score
Oracle Installed Software Enumeration (Linux / Unix)
Nessus was able to enumerate installed Oracle software on the remote Linux / Unix...
1.2AI Score
Veeam Backup & Replication support for VMware vSphere
This article provides VMware vSphere compatibility information for the most recent version of Veeam Backup &...
6.5AI Score
Unexpected Snapshot Deletion Failures in the Job Sessions for ONTAP 9.13.1
Due to a change in ONTAP 9.13.1, cloned volumes in this version fall into the recovery queue for 12 hours by default. The parent snapshot receives a 'busy' state and cannot be deleted before the clone leaves the queue and is removed completely from...
6.8AI Score
How to Configure EKS Clusters to Use AWS IAM Users/Roles for Veeam Kasten for Kubernetes Access
Follow this guide to provide appropriate Veeam Kasten for Kubernetes role-based access using AWS IAM users or...
7.1AI Score
Job For .local Domain Fails When Using Ubuntu-base VMware Backup Proxy
This issue occurs because .local is only intended for multicast DNS, and Ubuntu's default configuration prevents the use of .local for unicast DNS. As a result, the Ubuntu-based machine does not contact the network's DNS server when attempting to resolve .local...
7.1AI Score
Error: Skipping VM processing due to insufficient free disk space on datastore
These alerts are related to the Production Datastore Low Free Space notification settings under General...
3.1AI Score
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This...
7.8AI Score
0.0004EPSS
To back up Web Parts with the Modern App-Only Authentication method, Veeam Backup for Microsoft 365 requires setting the "Export Mode" property of the web part from "None" to "All" to make this Web Part exportable and available for...
1.5AI Score
Cisco Integrated Management Controller CLI Command Injection Vulnerability
A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or...
6.9AI Score
0.0004EPSS
Dell PowerPath - Veeam Agent for Linux Limitations
If a Linux server has Dell PowerPath devices attached, all the underlying block devices representing the network paths to the server are skipped from processing. This will result in the error "No objects to backup" or PowerPath devices missing from the backup. If non-PowerPath devices are part of.....
7.1AI Score
How to Collect Logs for Veeam Backup Enterprise Manager
How to Collect Logs for Veeam Backup Enterprise...
7.1AI Score
Antivirus Exclusions for Veeam Plug-ins for Enterprise Applications
This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Antivirus Exclusions for Veeam Plug-ins for Enterprise...
7.1AI Score
1.7AI Score
JA4+ - Suite Of Network Fingerprinting Standards
JA4+ is a suite of network Fingerprinting methods that are easy to use and easy to share. These methods are both human and machine readable to facilitate more effective threat-hunting and analysis. The use-cases for these fingerprints include scanning for threat actors, malware detection, session.....
7AI Score
Intel Chipset Device Software Installed (Windows)
Intel Chipset Device Software is installed on the remote Windows...
7.4AI Score
Detect Unmanaged Software Install Location (Windows)
Locate software that is not managed by standard operating system install techniques. This software is often installed in non-standard directories or packaged with other software. The discovery of this software will allow plugins to determine if the software is vulnerable. Scan settings and how...
1.9AI Score
Increase in API Calls when Performing Direct Backups to Immutable Object Storage
This situation is caused by the way in which backup file immutability is maintained when using Immutable Object Storage as a primary backup destination. Block Generations are used to extend the immutability of groups of backup files in periodic...
7AI Score
HP Application Enabling Software Driver - Privileged File Overwrite
A potential security vulnerability has been identified in the HP Application Enabling Software Driver for certain HP PC products, which might allow escalation of privilege. HP is releasing software updates to mitigate this potential vulnerability. Mitigation is available in HP Application...
7.5AI Score
0.0004EPSS
1.8AI Score
Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support Cases
Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support...
1.5AI Score
Summary The certificate for a remote system in a policy-based replication partnership is not correctly validated in the GUI on IBM Storage Virtualize products. Vulnerability Details ** CVEID: CVE-2023-47700 DESCRIPTION: **IBM SAN Volume Controller, IBM Storwize, IBM FlashSystem and IBM Storage...
7.5CVSS
7.5AI Score
0.001EPSS
Antivirus Exclusions for Veeam Backup & Replication
This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Veeam Backup &...
2.4AI Score
VM Loses Connection During Snapshot Removal
During snapshot removal phase of backup or replication job, VM loses connectivity either momentarily or for extended periods of...
1.6AI Score
How to restore vCenter Server without a vCenter Server
The vCenter Server is not available and the vCenter Server VM needs to be...
1.8AI Score
In Jasper 4.2.2, the jpc_streamlist_remove function in src/libjasper/jpc/jpc_dec.c:2407 has an assertion failure vulnerability, allowing attackers to cause a denial of service attack through a specific image...
6.9AI Score
0.0004EPSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
5.7AI Score
0.0004EPSS
This error occurs when the storage device is formatted with a 4k logical block size and the Veeam Data Mover Service does not have sufficient permissions to determine the logical block...
7AI Score
'Events data collection failure' Issue
This article provides guidance to troubleshooting Veeam Backup and Replication/Hyper-V event collection...
7.1AI Score
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
6.8AI Score
0.0004EPSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
0.0004EPSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
0.0004EPSS
How to Configure PXE Booting of Veeam Agent for Linux Recovery Media
This article documents how to configure Linux to PXE boot the Veeam Agent for Linux Recovery Media over a...
7AI Score
VSS Snapshot Creation Delay on Server with DFSR Enabled
When preparing the DFS VSS writer for backup, the Veeam Agent gets into a recursion while checking the files in the scope of the DFS...
7.1AI Score
By default, these components are only aware of publicly available Certification Authorities. If an Internal CA is used to sign the Cluster or Veeam Backup & Replication certificate, these components will fail to verify the certificate, and communication will...
7.1AI Score
File Level Restore - FUSE mount is not supported on kernel versions 4.0.0-4.1.33.
Recovery from backup on a machine running Linux kernel of one of versions 4.0.0-4.1.33 typically fails with ‘FUSE mount is not supported on kernel versions 4.0.0-4.1.33. Upgrade the kernel and try...
7AI Score
Error: Backup proxy is missing C++ runtime components
This error occurs when the VDDK libraries on the VMware Backup Proxy could not be...
6.9AI Score
Veeam Repair/Reinstall/Update fails with "The following SQL database patches are missed"
When attempting to repair, reinstall, or update Veeam Backup & Replication the process may fail with "The following SQL database patches are missed." This article discusses the cause and effective methods to work around this...
1.7AI Score