Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

What's New in Veeam v13 & Security Best Practices

Veeam
03/25/2026
25
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam v13 introduces a Linux-based software appliance (Rocky Linux 9.2) that eliminates Windows dependencies, includes built-in high availability with active-passive failover, and enforces zero-trust security with automatic upgrades and locked-down OS access
  • A new Security Officer role enforces mandatory four-eyes authorization for all critical changes, treating every action as intentional rather than accidental, with enhanced RBAC providing fine-grained permissions at component, workload, and geolocation levels
  • Security Compliance Analyzer performs 35+ automated checks with audit-ready reporting, while Veeam Threat Center scores environments on four pillars (compliance, recovery health, SLA adherence, immutability) with target scores above 80-85
  • SIEM integration is positioned as mandatory, passing 300+ events including administrative activities like deletion attempts, enabling real-time security alerting beyond simple backup job status
  • Network segmentation following zero-trust principles is critical: production, VBR, and repositories must reside in separate network segments with offsite backups in isolated domains to create resilient multi-tier architecture

Veeam v13 Software Appliance Architecture

This session introduces Veeam Backup & Replication v13's most significant architectural shift: a complete move to a Linux-based software appliance model built on Rocky Linux 9.2. The new appliance eliminates Windows dependencies entirely, packaging all backup components—VBR server, proxies, and repositories—into a single, hardware-agnostic ISO that can be deployed on bare metal or as a virtual appliance in VMware or Hyper-V environments. This just-enough OS approach delivers a locked-down, zero-trust platform where only Veeam processes can execute, with no root-level access available to administrators. The appliance includes built-in high availability with active-passive failover using PostgreSQL replication, ensuring seamless continuity if the primary server fails. Automatic upgrades are managed by Veeam's backend, eliminating manual patching downtime. The session emphasizes that while v13 appliance is available now, the Windows-based VBR v13 is expected to release in December, with upgrade paths from v12 to v13 following the same process as previous versions.

Enhanced Security Controls and Role-Based Access

Version 13 introduces a new Security Officer role that implements four-eyes authorization for all critical configuration changes. Unlike v12's optional four-eyes authorization (designed to prevent accidental changes), v13 enforces mandatory approval for any repository modifications, job changes, or permission grants—treating all actions as intentional and requiring explicit authorization. The enhanced role-based access control (RBAC) provides fine-grained permissions at the component, workload, and repository level, with geolocation restrictions that prevent unauthorized data restoration across regions. The appliance enforces STIC policy compliance by default, mandating strong encryption passwords and implementing security hardening out of the box. Host-level management is completely isolated from VBR console management, using separate credentials to prevent privilege escalation. The session strongly recommends combining four-eyes authorization with multi-factor authentication (MFA) integration, noting that unauthorized login attempts represent the first sign of compromise—making MFA the critical first line of defense before four-eyes authorization can protect against malicious actions.

Security Compliance and Threat Detection

The presentation emphasizes Veeam's Security Compliance Analyzer, which performs 35+ automated checks across the backup infrastructure and generates audit-ready reports. Administrators are urged to maximize passed checks rather than leaving items as "not implemented," as these reports provide immediate assurance to auditors and stakeholders. The Veeam Threat Center provides a security score based on four pillars: compliance analyzer results, data recovery health (including CRC validation), backup SLA adherence, and immutability flags. Scores should consistently remain above 80-85 (green zone) to demonstrate a secure posture. SIEM integration is positioned as mandatory for modern enterprises, with Veeam passing 300+ events—not just backup job status, but administrative activities like repository deletion attempts—enabling real-time alerting to security teams. The session advocates for network segmentation following zero-trust principles: production, VBR, and repositories should reside in separate network segments, with offsite backups in an entirely separate domain, creating a resilient multi-tier architecture that survives localized compromises.

Malware Detection and Content Scanning

Veeam v12 and v13 include integrated malware detection capabilities using both antivirus scanning and YARA rule-based content analysis. Windows Defender integration enables inline scanning of backup blocks to ensure guest OS environments remain virus-free, with recommendations to scan backups at least every 15 days using the latest definitions. YARA rules provide content-based scanning for organization-specific threats, with Veeam shipping standard YARA files while allowing administrators to upload custom rules tailored to their security requirements. The session clarifies that v12 supports Windows-based inline scanning, while v13 extends this capability to Linux environments, supporting both operating systems. Third-party antivirus integrations are available through plugins (such as CrowdStrike), providing flexibility for organizations with existing security tool investments. The distinction between antivirus scanning (detecting known malware signatures) and YARA scanning (detecting suspicious content patterns) is emphasized as complementary approaches to backup security.

Chapters

0:00 - Introduction & VUG Community Overview
3:52 - Veeam v13 Overview & Architecture
4:46 - Software Appliance & Rocky Linux Platform
5:55 - High Availability & Zero Trust Model
8:08 - Security Officer Role & Four-Eyes Authorization
10:13 - Enhanced RBAC & Web UI
13:35 - Single Sign-On & Authentication
26:47 - Top Security Features in v12
27:48 - Security Compliance Analyzer
30:41 - Veeam Threat Center Scoring
31:47 - SIEM Integration Requirements
33:13 - Four-Eyes Authorization in v12 vs v13
45:43 - Q&A Session

Key Quotes

4:46 "This is a completely a software appliance. So this comes with a Rocky Linux, which is a just enough OS, which means it comes with backup appliance and components all packaged together as a simple appliance ..."
7:56 "It's completely locked down model. So except the VEEN operation, you cannot do anything else, you cannot make any major voice changes on this one ..."
8:08 "So with this, it came with a new role, security officer. So basically, this is a four-way authorization model where if you want to make any changes in your repository, if you want to make any changes in the configuration of your VEEN setup, so it has to go authorized by the security officer ..."
27:07 "We are losing the battle with the cyber threat, uh, PR cyber criminals. We like, uh, I think like, uh, once in a week or twice in a week, I heard about the cyber attack. It's become a trend now ..."
32:38 "SIM integration is must nowadays. Okay. So that is available already ..."
33:46 "With V12, we were in an impression. Okay. This can be accidental one. Hence where the four is authorization was done, but in V13, we have one force and force for everything. There is no accidental. There is every intentional and you need to take an approval ..."

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Backup & Recovery
  • Security Operations
  • Compliance & Governance
  • Technical Deep Dive
  • Webinar
  • Best Practices
  • Veeam Backup & Replication v13
  • Linux-based backup appliance
  • Rocky Linux platform
  • Zero trust architecture
  • Security Officer role
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: What's New in Veeam v13 & Security Best Practices

              Upcoming Webinar Calendar

              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Findings
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-findings/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                30

                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                04/30/202610:00 AM ET
                • Apr
                  30

                  The New Economics of a VMware Exit

                  04/30/202601:00 PM ET
                  • May
                    06

                    Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                    05/06/202602:00 AM ET
                    • May
                      06

                      World Password Day: Strategies for Managing Your Passwords Effectively.

                      05/06/202610:00 PM ET
                      • May
                        07

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/07/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version