Veeam Blog
Filters (Results: 200)
Results: 200
Filters (Results: 200)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Size planning for your Office 365 backup job

Having the right account and knowing your backups’ components is a critical first step in the backup process, but you also need to know the scope of the Microsoft Office 365 environment you want to back up. Which services do you plan on including in this backup scope? Knowing the components you plan on backing up will help greatly when it comes to capacity and resource planning. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Office 365 Backup quick start: Initial configuration

Veeam Backup for Microsoft Office 365 is responsible for backing up and restoring Exchange, OneDrive, and SharePoint online data. What most administrators don’t know is that Microsoft protects the underlying hardware where the data sits but not the data itself, meaning if someone was to modify your data through an access point, Microsoft is not responsible for restoring it back to a previous state. The following articles in this series will help you get started with the product so you can start protecting your Microsoft Office 365 environment today. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Powerful tips for AWS cost optimization

“If you’re moving to cloud primarily to save money, you would be terribly surprised with the result,” – that’s quite a popular phrase that’s been floating around in my team talks. While we always agree about cloud advantages such as ease of use, flexibility and so on, it requires some rethinking in terms of how you spend money there. In this article, I’m going to share a few tips based on my experience with AWS cost optimization. Read more
Andrey Stadler
Andrey Stadler

Global Technologist, Product Strategy

Are you prepared when ransomware does happen?

Knowing all the options to help protect your environment is great but it’s time to put the pieces together. The question you should be asking is not "If it will happen?" but "Are you prepared when it does happen?" Are you waiting for ransomware to activate in your environment or are you taking steps to mitigate damage before it happens? This article will help you take the steps today to answer those questions and what tools we offer to make this possible. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

How to capture and inspect network packets in Windows

Microsoft originally offered the Microsoft Network Monitor which was subsequently succeeded by the Microsoft Message Analyzer application. Unfortunately, Microsoft has discontinued the Microsoft Message Analyzer and removed its download links. Therefore, only the older Microsoft Network Monitor is available. In this article, we are going to see how to capture and inspect packets using the latest available version of Microsoft Network Monitor. Read more
Adam Bertram
Adam Bertram

Guest author

3 storage options against ransomware

Everyday ransomware finds a new way to slip into an environment, from clicking on the wrong site to a compromised set of credentials. This leaves the very real feeling that you already are or will be infected. But there are ways to make it easier to sleep at night by implementing what we call the impenetrables – the form factors that are resilient ransomware. Veeam offers three ways to protect your data from even the nastiest ransomware attack. Let’s see how they can help give you peace of mind in the face of disaster. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

3 Critical Strategies for Protecting Remote Workers Data

As many organizations deal with the new rigors of remote-working and the challenge of protecting critical business data on PCs, we wanted to remind you of a few Veeam solutions that can help during stressful times and into the future. In this article, we’ll bring a Veeam perspective on tool configurations as well as provide some advice on business security and successful data protection. Read more
Andrey Stadler
Andrey Stadler

Global Technologist, Product Strategy

The 3-2-1 rule for ransomware protection

Now that your Veeam server is better protected, let’s move on to the 3-2-1 Rule. You may ask yourself what is “The 3-2-1 Rule” and why do I care when it comes to ransomware? It's an industry standard for how to protect data and it is your ultimate line of defense system in the fight against ransomware. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy