Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Blocky Security, SQL Server Protection & Entra ID Risks

Veeam
03/12/2026
32
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Blocky for Veeam offers Windows-based repository hardening for organizations that cannot support Linux, though community debate continues over whether it matches Linux hardened repository protection levels.
  • Six distinct methods exist for protecting Microsoft SQL Server with Veeam, spanning agent-based, agentless, plugin-based, and cloud-native approaches, with optimal choice depending on infrastructure and recovery requirements.
  • Microsoft Entra ID faces over 600 million daily attack attempts, and compromises often begin subtly before escalating to business-critical disruptions requiring layered prevention, isolation, backup, and employee training.
  • Adding S3-compatible object storage to offline Veeam environments can trigger 503 errors due to time synchronization and certificate validation issues, both resolvable through local NTP configuration and Windows certificate validation adjustments.
  • The Veeam community continues expanding with 169 new members and multiple upcoming educational events, including certification guidance in Portuguese and cloud-native hands-on learning streams.

Community-Driven Security and Protection Strategies

This episode of the Veeam Community Recap explores three critical security and data protection topics surfaced by community members. The discussion opens with Luis's analysis of Blocky for Veeam, a Windows-based security solution from Groud Data that creates a zero-trust environment for Veeam repositories. The team examines the debate between Windows-based hardening solutions versus Linux hardened repositories, acknowledging that some organizations have strict Windows-only policies that make alternatives like Blocky valuable. Chris's comprehensive breakdown of six different methods for protecting Microsoft SQL Server with Veeam follows, emphasizing that there's no one-size-fits-all approach and that the optimal strategy depends on infrastructure type, admin preferences, and recovery objectives.

Identity Security and Technical Troubleshooting

Julia's article on Microsoft Entra ID compromise highlights the hidden costs of identity breaches, noting that Entra ID faces over 600 million daily attack attempts. The discussion emphasizes that breaches often begin subtly through phishing or misconfigurations, with attackers establishing persistence before targeting critical assets. The episode also covers Derek's detailed troubleshooting guide for resolving 503 service unavailable errors when adding S3-compatible object storage to offline Veeam environments. His solution addresses time synchronization issues via local NTP and certificate validation problems in air-gapped deployments, providing a practical resource for organizations running highly secure offline networks.

Community Events and Educational Initiatives

The episode highlights upcoming community-driven educational content, including a Portuguese-language event on Veeam certification hosted by Beth and Andre in Brazil, and the second episode of Michael Cade's cloud-native live stream series with Jeff. The team also announces 169 new community members and previews a special National Intern Day edition of Tech Fights featuring Veeam's summer interns. These initiatives demonstrate Veeam's commitment to global community engagement and hands-on learning opportunities across different technical domains and experience levels.

Chapters

0:00 - Episode Introduction
3:19 - Blocky for Veeam Discussion
6:47 - SQL Server Protection Methods
10:46 - Microsoft Entra ID Security Risks
14:51 - S3 Object Storage Troubleshooting
18:13 - Community Events and News
22:26 - New Community Members
24:52 - Closing and Upcoming Content

Key Quotes

3:42 "... a rather controversial topic from what I can see in the comments ..."
6:18 "I have spoken to some organizations that absolutely cannot support Linux, period. They will not do it."
8:02 "... there is no one-size-fits-all strategy. And the optimal choice really depends on your infrastructure, your admin preferences, and recovery goals."
11:05 "Enter ID is heavily by hackers attacks exceed 600 million daily attempt ..."
12:01 "... a breach does not always announce itself with clear warnings or big alerts. And it can start really as a single phishing email."
13:02 "... a compromised Entry ID is going to cause far more than just, you know, some tech cleanup. And it's going to actually trigger even if you don't think about it's going to trigger a business crisis."
Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Identity & Access
  • Best Practices
  • Technical Deep Dive
  • How-To
  • Windows repository hardening
  • SQL Server backup strategies
  • Microsoft Entra ID security
  • S3-compatible object storage
  • Linux hardened repositories
  • Veeam certification
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Blocky Security, SQL Server Protection & Entra ID Risks

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version