Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Blocky Security, SQL Server Protection & Entra ID Risks

Veeam
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Blocky for Veeam offers Windows-based repository hardening for organizations that cannot support Linux, though community debate continues over whether it matches Linux hardened repository protection levels.
  • Six distinct methods exist for protecting Microsoft SQL Server with Veeam, spanning agent-based, agentless, plugin-based, and cloud-native approaches, with optimal choice depending on infrastructure and recovery requirements.
  • Microsoft Entra ID faces over 600 million daily attack attempts, and compromises often begin subtly before escalating to business-critical disruptions requiring layered prevention, isolation, backup, and employee training.
  • Adding S3-compatible object storage to offline Veeam environments can trigger 503 errors due to time synchronization and certificate validation issues, both resolvable through local NTP configuration and Windows certificate validation adjustments.
  • The Veeam community continues expanding with 169 new members and multiple upcoming educational events, including certification guidance in Portuguese and cloud-native hands-on learning streams.

Community-Driven Security and Protection Strategies

This episode of the Veeam Community Recap explores three critical security and data protection topics surfaced by community members. The discussion opens with Luis's analysis of Blocky for Veeam, a Windows-based security solution from Groud Data that creates a zero-trust environment for Veeam repositories. The team examines the debate between Windows-based hardening solutions versus Linux hardened repositories, acknowledging that some organizations have strict Windows-only policies that make alternatives like Blocky valuable. Chris's comprehensive breakdown of six different methods for protecting Microsoft SQL Server with Veeam follows, emphasizing that there's no one-size-fits-all approach and that the optimal strategy depends on infrastructure type, admin preferences, and recovery objectives.

Identity Security and Technical Troubleshooting

Julia's article on Microsoft Entra ID compromise highlights the hidden costs of identity breaches, noting that Entra ID faces over 600 million daily attack attempts. The discussion emphasizes that breaches often begin subtly through phishing or misconfigurations, with attackers establishing persistence before targeting critical assets. The episode also covers Derek's detailed troubleshooting guide for resolving 503 service unavailable errors when adding S3-compatible object storage to offline Veeam environments. His solution addresses time synchronization issues via local NTP and certificate validation problems in air-gapped deployments, providing a practical resource for organizations running highly secure offline networks.

Community Events and Educational Initiatives

The episode highlights upcoming community-driven educational content, including a Portuguese-language event on Veeam certification hosted by Beth and Andre in Brazil, and the second episode of Michael Cade's cloud-native live stream series with Jeff. The team also announces 169 new community members and previews a special National Intern Day edition of Tech Fights featuring Veeam's summer interns. These initiatives demonstrate Veeam's commitment to global community engagement and hands-on learning opportunities across different technical domains and experience levels.

Chapters

0:00 - Episode Introduction
3:19 - Blocky for Veeam Discussion
6:47 - SQL Server Protection Methods
10:46 - Microsoft Entra ID Security Risks
14:51 - S3 Object Storage Troubleshooting
18:13 - Community Events and News
22:26 - New Community Members
24:52 - Closing and Upcoming Content

Key Quotes

3:42 "... a rather controversial topic from what I can see in the comments ..."
6:18 "I have spoken to some organizations that absolutely cannot support Linux, period. They will not do it."
8:02 "... there is no one-size-fits-all strategy. And the optimal choice really depends on your infrastructure, your admin preferences, and recovery goals."
11:05 "Enter ID is heavily by hackers attacks exceed 600 million daily attempt ..."
12:01 "... a breach does not always announce itself with clear warnings or big alerts. And it can start really as a single phishing email."
13:02 "... a compromised Entry ID is going to cause far more than just, you know, some tech cleanup. And it's going to actually trigger even if you don't think about it's going to trigger a business crisis."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Identity & Access
  • Best Practices
  • Technical Deep Dive
  • How-To
  • Windows repository hardening
  • SQL Server backup strategies
  • Microsoft Entra ID security
  • S3-compatible object storage
  • Linux hardened repositories
  • Veeam certification
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Blocky Security, SQL Server Protection & Entra ID Risks

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/

              Upcoming Events

              • Mar
                17

                L'importance cruciale de l'ITDR pour 2026 et au-delà

                03/17/202606:00 AM ET
                • Mar
                  18

                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                  03/18/202601:00 PM ET
                  • Mar
                    19

                    Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                    03/19/202611:00 AM ET
                    • Mar
                      19

                      Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                      03/19/202601:00 PM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version