{"id":59258,"date":"2023-11-07T09:00:00","date_gmt":"2023-11-07T08:00:00","guid":{"rendered":"https:\/\/nolabnoparty.com\/?p=59258"},"modified":"2023-11-30T16:08:10","modified_gmt":"2023-11-30T15:08:10","slug":"veeam-v12-1-whats-new-pt-1","status":"publish","type":"post","link":"https:\/\/nolabnoparty.com\/en\/veeam-v12-1-whats-new-pt-1\/","title":{"rendered":"Veeam v12.1 what's new - pt.1"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter wp-image-59291 size-full\" title=\"veeam-v12-1-whats-new-pt-1-01\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-01.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-01\" width=\"602\" height=\"202\" \/><\/p>\n<p>Veeam announced the new upcoming <a href=\"https:\/\/nolabnoparty.com\/en\/veeam-backup-replication-v12-released\/\">Veeam<\/a> v12.1 version that provides several new amazing features and enhancements, mainly focused on security.<\/p>\n<p>In this new version one of the most interesting new feature is perhaps the <strong>Inline Malware Detection<\/strong> that allows the administrators to ensure <strong>malware free<\/strong> backups during the execution of a Backup Job.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2>Blog Series<\/h2>\n<p>Veeam v12.1 what's new - pt.1<br \/>\n<a href=\"https:\/\/nolabnoparty.com\/en\/veeam-v12-1-whats-new-pt-2\/\">Veeam v12.1 what's new - pt.2<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Veeam v12.1 what's new<\/h2>\n<p>Veeam v12.1 provides several new features with particular attention to security concern.<\/p>\n<p>&nbsp;<\/p>\n<h2>Inline Malware Detection<\/h2>\n<p>When an infrastructure suffers a malware intrusion, there are some <strong>scenarios that might occur<\/strong> by putting your data at risk:<\/p>\n<ul>\n<li>A malware can enter the infrastructure and putting itself in a sleeping malware.<\/li>\n<li>A malware can encrypt data in the network without deleting itself.<\/li>\n<li>A malware can encrypt data and delete itself or remaining in memory.<\/li>\n<li>Data can be encrypted remotely via SMB or NFS shares.<\/li>\n<\/ul>\n<p>To protect backups from possible malware infections, <a href=\"https:\/\/nolabnoparty.com\/en\/veeam-v11-whats-new-and-upgrade-procedure\/\">Veeam Backup and Replication v11<\/a> already introduced the <strong>Secure Restore in SureBackup<\/strong> to allow the administrators to scan backups against malware before performing the recovery.<\/p>\n<p>With Veeam v12.1 is now possible to <strong>a<span class=\"fontstyle0\">nalyzes block-level data during backup<\/span><\/strong> leveraging the new <strong><span class=\"fontstyle0\">Inline Malware Detection<\/span><\/strong> feature. You can enable this feature from the menu <strong>Settings &gt; Malware Detection<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59293 size-full\" title=\"veeam-v12-1-whats-new-pt-1-02\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-02.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-02\" width=\"471\" height=\"336\" \/><\/p>\n<p>During the backup operation, Veeam collects <strong>metadata and statistics<\/strong> and <strong>data are cross-correlated<\/strong>.\u00a0Once the backup has been completed, <span class=\"fontstyle3\">malware <strong>metadata file is stored in the VBRcatalog<\/strong> and <strong>current and previous malware metadata<\/strong> are compared to identify possible unwanted changes.<\/span><\/p>\n<p><span class=\"fontstyle0\">Incremental backup size, <\/span><span class=\"fontstyle0\">encryption (absolute size and percent), c<\/span><span class=\"fontstyle0\">ompression, r<\/span><span class=\"fontstyle0\">emoved data and n<\/span><span class=\"fontstyle0\">ewly encrypted data are the <strong>values analyzed<\/strong> to identify if a <strong>backup is infected<\/strong>.<\/span><\/p>\n<p>When the c<span class=\"fontstyle0\">ross-correlation between <strong>current and historic values<\/strong> produces a h<\/span><span class=\"fontstyle0\">igh score of combined values, the <strong>backup is marked as<\/strong><\/span><strong><span class=\"fontstyle3\">\u00a0<\/span><\/strong><span class=\"fontstyle4\"><strong>suspicious<\/strong>.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59295 size-full\" title=\"veeam-v12-1-whats-new-pt-1-03\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-03.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-03\" width=\"116\" height=\"22\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4>Onion Links<\/h4>\n<p>The Inline Malware Detection feature is also able to a<span class=\"fontstyle0\">nalyze text documents and <strong>find onion links<\/strong>\u00a0(generally composed by<\/span> 56 symbols: [2-7] and [a-z] + <em>.onion<\/em>).<\/p>\n<p>Onion links are links to <strong>websites on the dark web<\/strong> that use the <strong>.onion extension as top-level domain<\/strong> instead of\u00a0 traditional .com, .net, .gov and so forth. Onion sites use <strong>The Onion Router (Tor)<\/strong> software to <strong>encrypt their connections<\/strong> and to make the <strong>communication anonymous<\/strong>. Identifiers such as location, ownership and so on, <strong>are also hidden<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59297 size-large\" title=\"veeam-v12-1-whats-new-pt-1-04\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-04-600x452.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-04\" width=\"600\" height=\"452\" \/><\/p>\n<p>The Inline Malware Detection is <strong>supported for the following systems<\/strong>:<\/p>\n<ul>\n<li>VMware vSphere and Cloud Director, Hyper-V (Windows and Linux VMs)<\/li>\n<li>Veeam Agents for Windows managed by Veeam Server (including cloud native)<\/li>\n<li>NTFS, ext4 file systems<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"fontstyle0\">File Index scan<\/span><\/h4>\n<p>To detect if previously <strong>unencrypted data become encrypted<\/strong> in processed disk images (typical indicator of a ransomware attack), the <strong>In-Guest Index detection<\/strong> can be used to find e<span class=\"fontstyle0\">ncrypted files and malware binaries. <\/span><\/p>\n<p><span class=\"fontstyle0\">To activate this new feature, go to <\/span><strong>Settings &gt; Malware Detection<\/strong> section and select the <strong>Enable inline entropy analysis<\/strong> and <strong>Enable file system activity analysis<\/strong> options from <strong>General<\/strong> tab.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59299 size-full\" title=\"veeam-v12-1-whats-new-pt-1-05\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-05.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-05\" width=\"496\" height=\"603\" \/><\/p>\n<p><span class=\"fontstyle0\">To take benefit of this feature, you must enable the <strong>Enable guest file system indexing<\/strong> option in <strong>Guest Processing<\/strong> tab during the Backup Job configuration.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59301 size-large\" title=\"veeam-v12-1-whats-new-pt-1-06\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-06-600x427.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-06\" width=\"600\" height=\"427\" \/><\/p>\n<p>The In-Guest Index scan is <strong>supported for the following systems<\/strong>:<\/p>\n<ul>\n<li><span class=\"fontstyle0\">VMware vSphere &amp; Cloud Director, Hyper-V (<\/span><span class=\"fontstyle0\">Windows and Linux VMs)<\/span><\/li>\n<li><span class=\"fontstyle0\">Managed and standalone Veeam Agent for <\/span><span class=\"fontstyle0\">Windows<\/span><\/li>\n<li><span class=\"fontstyle0\">All File Systems<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4>YARA rules<\/h4>\n<p>For a deeper analysis to better <strong>detect possible malware infections<\/strong>, Veeam v12.1 leverages the <a href=\"https:\/\/github.com\/Yara-Rules\/rules\" target=\"_blank\" rel=\"noopener\">YARA rules<\/a>, fully customizable patterns used to identify <strong>targeted attacks and security threats<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59303 size-large\" title=\"veeam-v12-1-whats-new-pt-1-07\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-07-600x546.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-07\" width=\"600\" height=\"546\" \/><\/p>\n<p>Downloaded or custom\u00a0<strong>YARA rules must be saved<\/strong>\u00a0to\u00a0<em>C:\\Program Files\\Veeam\\Backup and Replication\\Backup\\YaraRules<\/em>\u00a0folder.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59305 size-large\" title=\"veeam-v12-1-whats-new-pt-1-08\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-08-600x183.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-08\" width=\"600\" height=\"183\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4>Automated malware and content scans<\/h4>\n<p>Antivirus and YARA scan can be automated via SureBackup <strong>without using Virtual Labs<\/strong>. This capability allows to scan entire <strong>Backup Jobs or specific machines<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59307 size-large\" title=\"veeam-v12-1-whats-new-pt-1-09\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-09-600x427.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-09\" width=\"600\" height=\"427\" \/><\/p>\n<p>Enable the <strong>Scan backup content with the following YARA rule<\/strong> option and specify the YARA rule to use. To perform the backup scan operation, Veeam uses the <strong>Mount Server<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59309 size-large\" title=\"veeam-v12-1-whats-new-pt-1-10\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-10-600x427.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-10\" width=\"600\" height=\"427\" \/><\/p>\n<p>Also the <strong>classic SureBackup with Virtual Lab<\/strong> can be configured to scan the backup content with YARA rules or antivirus.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59311 size-large\" title=\"veeam-v12-1-whats-new-pt-1-11\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-11-600x427.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-11\" width=\"600\" height=\"427\" \/><\/p>\n<p>Backups can be <strong>scanned on-demand<\/strong> by right clicking a specific backup and selecting the <strong>Scan backup<\/strong> option.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59313 size-full\" title=\"veeam-v12-1-whats-new-pt-1-12\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-12.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-12\" width=\"433\" height=\"480\" \/><\/p>\n<p>Specify the <strong>Scan mode<\/strong> e <strong>Scan engine<\/strong> to use and click <strong>OK<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59315 size-large\" title=\"veeam-v12-1-whats-new-pt-1-13\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-13-600x489.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-13\" width=\"600\" height=\"489\" \/><\/p>\n<p>The <strong>alert for malware detection<\/strong> is triggered by the following operations:<\/p>\n<ul>\n<li><span class=\"fontstyle0\">Inline scan<\/span><\/li>\n<li><span class=\"fontstyle0\">Guest-index scan<\/span><\/li>\n<li><span class=\"fontstyle0\">SureBackup (scheduled jobs, <\/span><span class=\"fontstyle0\">scan now)<\/span><\/li>\n<li><span class=\"fontstyle0\">Secure Restore<\/span><\/li>\n<li><span class=\"fontstyle0\">Incident API<\/span><\/li>\n<\/ul>\n<p>To easily identify infected backups, suspicious backups are marked with a <strong>bug icon<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59317 size-large\" title=\"veeam-v12-1-whats-new-pt-1-14\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-14-600x302.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-14\" width=\"600\" height=\"302\" \/><\/p>\n<p>When a malware is detected, the warning can be viewed in <strong>History &gt; Malware Detection<\/strong> or notified via <strong>email, Syslog, SNMP <\/strong>and <strong>Windows Event<\/strong>.<\/p>\n<p>In case of <strong>false events<\/strong>, right click the backup and select <strong>Mark as clean<\/strong> to remove the alert associated to that VM in <strong>Inventory<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59319 size-large\" title=\"veeam-v12-1-whats-new-pt-1-15\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-15-600x402.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-15\" width=\"600\" height=\"402\" \/><\/p>\n<p>It is also possible to <strong>mark a backup as infected or clean<\/strong> by selecting the corrisponding option in <strong>Backups<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59321 size-large\" title=\"veeam-v12-1-whats-new-pt-1-16\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-16-600x402.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-16\" width=\"600\" height=\"402\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4>KMS support<\/h4>\n<p>To <strong>increase the security level<\/strong> in the Veeam infrastructure, Veeam v12.1 provides support for Key Management Servers (KMS). To configure the KMS Server, go to <strong>Settings &gt; Credentials &amp; Passwords<\/strong> and select <strong>Key Management Servers<\/strong> option.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59323 size-full\" title=\"veeam-v12-1-whats-new-pt-1-17\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-17.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-17\" width=\"471\" height=\"586\" \/><\/p>\n<p>Click <strong>Add<\/strong> and enter the KMS Server details then click <strong>OK<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59325 size-large\" title=\"veeam-v12-1-whats-new-pt-1-18\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-18-600x447.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-18\" width=\"600\" height=\"447\" \/><\/p>\n<p>This solution brings several advantages in terms of security:<\/p>\n<ul>\n<li>Passwords can be <strong>changed automatically<\/strong> on regular basis avoiding the risk of having <strong>weak and old passwords<\/strong> used by Veeam.<\/li>\n<li>To implement KMS, Veeam supports <strong>KMIP version 1.2+<\/strong>.<\/li>\n<\/ul>\n<p>During the Backup Job configuration, administrators can now <strong>encrypt Backup Jobs<\/strong> with a higher level of security leveraging the KMS capability by entering the <strong>KMS FQDN instead of the password<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59327 size-full\" title=\"veeam-v12-1-whats-new-pt-1-19\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-19.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-19\" width=\"496\" height=\"603\" \/><\/p>\n<p>Currently Veeam v12.1 KMS feature is <strong>unsupported<\/strong> for the following workloads:<\/p>\n<ul>\n<li>Managed by Agent policies<\/li>\n<li>Standalone agents<\/li>\n<li>Veeam Backup for AHV, RHV, AWS, Azure, Google<\/li>\n<li>Configuration backup<\/li>\n<li>Database plugins<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4>Four-eyes authorization<\/h4>\n<p>To <strong>prevent backups deletion<\/strong> (accidental or unauthorized), it is now available in Veeam v12.1 the capability of <strong>requiring a second authorization<\/strong> before being able to execute the operation.<\/p>\n<p>From <strong>Settings &gt; Users &amp; Roles<\/strong> select <strong>Authorization<\/strong> tab and enable the <strong>Require additional approval for sensitive operations<\/strong> option and specify the reject period.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59329 size-full\" title=\"veeam-v12-1-whats-new-pt-1-20\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-20.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-20\" width=\"596\" height=\"703\" \/><\/p>\n<p>When the four-eyes authorization feature is enabled in Veeam v12.1, you need a <strong>second approval by a Backup Administrator<\/strong> to perform the following tasks:<\/p>\n<ul>\n<li><span class=\"fontstyle0\">Deleting backups, repositories, storage snapshots, Veeam Cloud Service Provider<\/span><\/li>\n<li><span class=\"fontstyle0\">Disable four-eyes authentication<\/span><\/li>\n<li><span class=\"fontstyle0\">User and roles modification<\/span><\/li>\n<\/ul>\n<p>When you try deleting a Backup for example, you need to <strong>create a deletion request<\/strong> that must be approved by another Backup Administrator.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59331 size-large\" title=\"veeam-v12-1-whats-new-pt-1-21\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-21-600x387.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-21\" width=\"600\" height=\"387\" \/><\/p>\n<p>The report for operations with second approval enabled can be found in <strong>Home<\/strong> (Pending approvals)<strong>, Veeam History<\/strong>, <strong>Windows event logs<\/strong> or sent via <strong>email<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59333 size-large\" title=\"veeam-v12-1-whats-new-pt-1-22\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-22-600x240.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-22\" width=\"600\" height=\"240\" \/><\/p>\n<p>When using four-eyes authorization, keep in mind the following:<\/p>\n<ul>\n<li><span class=\"fontstyle0\">No deletion via <strong>PowerShell or REST API<\/strong>.<\/span><\/li>\n<li><span class=\"fontstyle0\">No deletion via <strong>Enterprise Manager<\/strong> (including Cloud Director portal).<\/span><\/li>\n<li><span class=\"fontstyle0\"><strong>Expired license<\/strong>: existing events can be handled, but no new ones created.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4>Integration with SIEM Systems<\/h4>\n<p>In Veeam v12.1 is now possible to centralize all the events by <strong>sending Veeam logs to Syslog systems<\/strong> using the standard protocols UDP, TCP, TLS and port.<\/p>\n<p>Syslog can be configured from <strong>Settings &gt; General Options &gt; SIEM Integration<\/strong>. Under <strong>Syslog servers<\/strong>, click <strong>Add<\/strong> and specify the <strong>Server<\/strong> to use then click <strong>OK<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59335 size-full\" title=\"veeam-v12-1-whats-new-pt-1-23\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-23.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-23\" width=\"496\" height=\"603\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"fontstyle0\">Security &amp; Compliance Analyzer<\/span><\/h4>\n<p>The Best Practice Analyzer introduced with version 12 has been <strong>renamed and now offers additional features<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59337 size-large\" title=\"veeam-v12-1-whats-new-pt-1-24\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-24-600x371.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-24\" width=\"600\" height=\"371\" \/><\/p>\n<p>To run Security &amp; Compliance Analyzer, the <strong>operation can be scheduled<\/strong> by accessing the <strong>Schedule Settings<\/strong> window.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59339 size-large\" title=\"veeam-v12-1-whats-new-pt-1-25\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-25-600x338.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-25\" width=\"600\" height=\"338\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4>Warning on short encryption passwords<\/h4>\n<p>Veeam v12.1 performs a <strong>check on passwords length<\/strong> (minimum <strong>12 characters required<\/strong>) to avoid the use of passwords too shorts.<\/p>\n<p>The system will analyze the password length only and <strong>not the complexity<\/strong> (in the example the password is <em>123456<\/em>)<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-59341 size-full\" title=\"veeam-v12-1-whats-new-pt-1-26\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2023\/11\/veeam-v12-1-whats-new-pt-1-26.jpg\" alt=\"veeam-v12-1-whats-new-pt-1-26\" width=\"392\" height=\"217\" \/><\/p>\n<p><a href=\"https:\/\/nolabnoparty.com\/en\/veeam-v12-1-whats-new-pt-2\/\">Part 2<\/a> will continue exploring the <strong>new available features<\/strong> in <a href=\"https:\/\/nolabnoparty.com\/en\/veeamover-move-and-copy-backups-in-veeam-v12\/\">Veeam Backup &amp; Replication<\/a> v12.1, such as Immutability enhancements, Continuous Data Protection (CDP), SureBackup and many others.<\/p>\n<p><img decoding=\"async\" title=\"signature\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/images\/firma.jpg\" alt=\"signature\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Veeam announced the new upcoming Veeam v12.1 version that provides several new amazing features and enhancements, mainly focused on security. In this new version one of the most interesting new feature is perhaps the Inline Malware Detection that allows the administrators to ensure malware free backups during the execution of a Backup Job.<\/p>\n","protected":false},"author":3,"featured_media":59291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"linkedin_93tdZWzMZc_93tdZWzMZc":"","facebook_2879994398731222_17841400390232720":"","twitter_113568041_113568041":"","mastodon_115463926174894442_115463926174894442":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[2138,933],"tags":[1888,2696,980,2748],"class_list":["post-59258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-en","category-veeam-en","tag-kms","tag-malware","tag-surebackup-en","tag-yara","has_thumb"],"_links":{"self":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts\/59258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/comments?post=59258"}],"version-history":[{"count":0,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts\/59258\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/media\/59291"}],"wp:attachment":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/media?parent=59258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/categories?post=59258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/tags?post=59258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}