Veeam Blog
Filters (Results: 1576)
Results: 1576
Filters (Results: 1576)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Endpoint Backup: BitLocker support

Today, more and more devices have BitLocker encryption enabled by default. For instance, every Microsoft Surface tablet has an operating system volume protected by BitLocker out of the box. For this very reason, we decided that that Veeam Endpoint Backup FREE should fully support BitLocker encrypted volumes.

Read more

Recovering the Active Directory Domain Services – Best practices for AD administration (part 3)

This blogpost is the third in a three-part series on AD (Active Directory) administration best practices. Have you ever had the horrible realization that you just deleted the wrong computer account from the domain? Or have you ever reset a service-account password for a mission-critical application and the password reset broke an entire application suite and had to rollback? And, worse, you didn't save the old password? Bad moments like these happen to IT pros just like you. The questions are how to recover and do it quickly. Thankfully, you CAN restore service quickly. All you need are the right tools.

Read more

Veeam Endpoint Backup: Moving your backups to a different location

Imagine you've setup your Veeam Endpoint Backups to use an external USB drive as a repository. After a while you set up a brand new NAS for home needs and decide to use it as a backup target. Reasonable question: can I migrate all existing backup files from one location to another without losing any supported functionality? The answer is yes you can! The procedure is pretty simple - let’s take a closer look.

My backups are stored on a removable hard drive in the default location (%volume% VeeamBackup/Backup Job %ComputerName%) because I’ve used the backup job auto configuration from the Endpoint’s setup.

Read more

Veeam Management Pack v8 for System Center is GA!

We announced the Veeam Management Pack (MP) v8 for System Center beta just a couple of months ago and told you about lots of improvements we made. Now, after adding some additional features and performing some intensive QC-department testing because of the always-appreciated feedback of our community, partners and end-users, we are, at last, ready to release the general availability version of MP!

Read more

Read-Only Domain Controller (RODC) — Best practices for AD administration (part 2)

In Part 1, Protecting the Active Directory Domain Services – Best Practices for AD administration, I focused on protection steps to protect your domain service locally. Unfortunately, most environments have multiple locations, otherwise known as ROBOs (Remote Office Branch Offices). Examples include remote, colocation and cloud data centers, retail stores, satellite offices, distribution centers, manufacturing plants and more. These locations are often geographically separated by many hundreds or thousands of miles, require only simple file, print and share services and are often without an IT staff. Server virtualization has drastically improved the way these services are deployed.

Read more

Protecting the Active Directory Domain Services — Best practices for AD administration (part 1)

Every component of the Modern Data Center requires authentication of some form or fashion.  Microsoft's Active Directory Services contains information about individual objects within the forest and stores the necessary information in a relational database (ntds.dit). Domain Controllers are the heads of the infrastructure that controls access to resources through an authentication and login process. When a user attempts to access a file on the corporate domain-based file server, either. Kerberos and NTLM are authentication protocols used to verify the identity of a computer or user. To say the least, authentication is critical to the Always-On Business.

Read more

How to restore a SQL Server Database – Easily!

When we released Veeam Explorer for SQL Server last year, I was very excited about this new Explorer. It truly addresses the database restore situation with ease for virtualized SQL Server systems running as a virtual machine (VM) on VMware vSphere and Microsoft Hyper-V without requiring the expertise of a SQL Server database administrator (DBA). In this blog post, I’ll focus on simply restoring a SQL Server database from a Veeam backup job.

There are three ways Veeam Explorer for SQL Server works to restore SQL Server databases: From the image-based backup restore point, from a log replay to point in time, and from a log replay to a specific transaction.

Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Veeam FastSCP for Microsoft Azure, our free gift to the IT community

Veeam® recently announced the Veeam® FastSCP™ for Microsoft Azure beta at Microsoft Ignite. This new release is a standalone tool that lets you copy your files securely onsite to Microsoft Azure VMs (virtual machines) and from Microsoft Azure VMs to your on-site location.

Hybrid cloud models are becoming more and more important and will continue to be important in the coming years. Using cloud resources like Microsoft Azure VMs s, for specific use-cases will give your business additional benefits and enable you to become more competitive in your industry.

Read more

Enterprise Enhancements in v9: ROBO and Tape

The upcoming Veeam Availability Suite v9, among many new and exciting features, will bring more enhancements for Enterprise environments. In these environments, two main characteristics usually arise, and require proper solutions: scalability and management of multiple remote/branch offices.

Interaction with guest OS of the protected virtual machines for proper backup and restore is a great advanced capability of our software. Being a completely agentless solution, our backup jobs deploy a temporary, runtime process into every virtual machine for which “Application Aware Image Processing” is enabled. This process is responsible for VSS processing orchestration, performing application-specific backup steps such as log truncation, and guest file system indexing.

Read more
Luca Dell'Oca
Luca Dell'Oca

Principal EMEA Cloud Architect