{"id":972,"date":"2023-12-01T17:11:55","date_gmt":"2023-12-01T16:11:55","guid":{"rendered":"https:\/\/baptistetellier.fr\/?p=972"},"modified":"2023-12-14T13:24:16","modified_gmt":"2023-12-14T12:24:16","slug":"guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1","status":"publish","type":"post","link":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/","title":{"rendered":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &#038; Replication 12.1"},"content":{"rendered":"<p>Dans le domaine dynamique de la cybers\u00e9curit\u00e9, Veeam Backup &amp; Replication 12.1 fait un grand pas en avant gr\u00e2ce \u00e0 ses fonctionnalit\u00e9s int\u00e9gr\u00e9es de d\u00e9tection des logiciels malveillants. .<\/p>\n<h2>1. Comment fonctionne la d\u00e9tection des logiciels malveillants<\/h2>\n<ol>\n<li><a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/\" target=\"_blank\" rel=\"noopener\"><strong>Analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s :<\/strong><\/a>\u00a0Identifie l&rsquo;activit\u00e9 des logiciels malveillants dans les donn\u00e9es d&rsquo;indexation des invit\u00e9s et les flux de donn\u00e9es.<\/li>\n<li><strong><a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/03\/vbr-12-1-fonctionnement-de-linline-malware-detection\/\" target=\"_blank\" rel=\"noopener\">Analyse Inline des donn\u00e9es par les proxy:<\/a>\u00a0 <\/strong>Identifie l&rsquo;activit\u00e9 des logiciels malveillants par un model d&rsquo;IA et de Machine Learning durant le transite des donn\u00e9es par les proxy de sauvegarde.<\/li>\n<li><a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/07\/vbr-12-1-scannez-vos-sauvegardes-avec-yara\/\" target=\"_blank\" rel=\"noopener\"><strong>Analyse YARA pendant la restauration s\u00e9curis\u00e9e :<\/strong><\/a>\u00a0Assure la s\u00e9curit\u00e9 et prot\u00e8ge contre l&rsquo;exfiltration des donn\u00e9es en effectuant des analyses YARA pendant le processus de restauration &#8211; \u00e0 la demande ou automatis\u00e9.<\/li>\n<li><a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/12\/vbr-12-1-incident-api-gestion-des-malwares\/\" target=\"_blank\" rel=\"noopener\"><strong>Int\u00e9gration tierce :<\/strong><\/a>\u00a0S&rsquo;int\u00e8gre de mani\u00e8re transparente aux solutions tierces de protection contre les logiciels malveillants via l&rsquo;API Veeam Incident.<\/li>\n<\/ol>\n<h2>2. Tableau r\u00e9capitulatif (en anglais)<\/h2>\n<table class=\"Blue_Table\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<th>Malware detection method<\/th>\n<th>Scan objects<\/th>\n<th>Notes<\/th>\n<\/tr>\n<tr>\n<td>Signature-based detection<\/td>\n<td>Guest indexing data<\/td>\n<td>During the backup job, detects the following malware activity:<\/p>\n<ul>\n<li class=\"Table_List\"><span class=\"Table_List\">Malware signatures<\/span><\/li>\n<li class=\"Table_List\"><span class=\"Table_List\">Renamed files<\/span><\/li>\n<li class=\"Table_List\"><span class=\"Table_List\">Deleted files<\/span><\/li>\n<\/ul>\n<p>Marks objects as\u00a0<span class=\"T_Emphasis\">Suspicious<\/span>.<\/p>\n<p>For more information, see\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_guest_index.html\">Guest Indexing Data Scan<\/a>.<\/td>\n<\/tr>\n<tr>\n<td>File entrophy analysis<\/td>\n<td>Blocks in a data stream<\/td>\n<td>During the backup job, detects the following malware activity:<\/p>\n<ul>\n<li class=\"Table_List\"><span class=\"Table_List\">Encrypted files<\/span><\/li>\n<li class=\"Table_List\"><span class=\"Table_List\">Onion links<\/span><\/li>\n<li class=\"Table_List\"><span class=\"Table_List\">Ransom notes<\/span><\/li>\n<\/ul>\n<p>Marks objects as\u00a0<span class=\"T_Emphasis\">Suspicious<\/span>.<\/p>\n<p>For more information, see\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_data_blocks.html\">Inline Scan<\/a>.<\/td>\n<\/tr>\n<tr>\n<td>Rule-based detection (YARA)<\/td>\n<td>Restore points<\/td>\n<td>During the Scan Backup job, does one of the following:<\/p>\n<ul>\n<li class=\"Table_List\"><span class=\"Table_List\">Finds the last clean restore point<\/span><\/li>\n<li class=\"Table_List\"><span class=\"Table_List\">Analyzes the content for specific information<\/span><\/li>\n<\/ul>\n<p>During the restore session with the Secure Restore option, detects malware activity as specified in the YARA rule.<\/p>\n<p>Marks objects as\u00a0<span class=\"T_Emphasis\">Infected<\/span>.<\/p>\n<p>For more information, see\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_scan_backup.html\">Scan Backup<\/a>\u00a0and\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/av_scan_about.html\">Secure Restore<\/a>.<\/td>\n<\/tr>\n<tr>\n<td>Antivirus scan<\/td>\n<td>Restore points<\/td>\n<td>During the Scan Backup job, finds the last clean restore point.<\/p>\n<p>During the restore session with the Secure Restore option, detects malware activity as specified in the antivirus configuration file.<\/p>\n<p>Marks objects as\u00a0<span class=\"T_Emphasis\">Infected<\/span>.<\/p>\n<p>For more information, see\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_scan_backup.html\">Scan Backup<\/a>\u00a0and\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/av_scan_about.html\">Secure Restore<\/a>.<\/td>\n<\/tr>\n<tr>\n<td>Third-party malware protection solution<\/td>\n<td>Depends on the configuration of the malware protection solution<\/td>\n<td>Uses Veeam Incident API to send a request about detected malware activity to Veeam\u00a0Backup\u00a0&amp;\u00a0Replication.<\/p>\n<p>Marks objects as\u00a0<span class=\"T_Emphasis\">Infected<\/span>.<\/p>\n<p>For more information, see\u00a0<a href=\"https:\/\/helpcenter.veeam.com\/docs\/backup\/vbr_rest\/reference\/vbr-rest-v1-1-rev1.html?ver=120\" target=\"_blank\" rel=\"noopener\">Veeam\u00a0Backup\u00a0&amp;\u00a0Replication REST API Reference<\/a>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left;\">Extrait de : <a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_methods.html\" target=\"_blank\" rel=\"noopener\">https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_methods.html<\/a><\/p>\n<h2>3. Configuration et gestion de la d\u00e9tection des logiciels malveillants<\/h2>\n<p>&#8211; <strong>Exigences et limitations :<\/strong><br \/>\n&#8211; Prise en charge compl\u00e8te disponible dans la licence Veeam Data Platform Advanced ou dans <strong>l&rsquo;\u00e9dition Enterprise Plus<\/strong>.<br \/>\n&#8211; Fonctionnalit\u00e9 exclusive pour les <strong>administrateurs<\/strong> Veeam Backup.<\/p>\n<p>&#8211; <strong>\u00c9tapes pour activer :<\/strong><\/p>\n<ol>\n<li>Mettez \u00e0 niveau vers Veeam Backup &amp; Replication 12.1.<\/li>\n<li>Configuration via le \u00ab\u00a0Security &amp; Best Practice analyzer\u00a0\u00bb<\/li>\n<li>???? profitez ! ou cliquez sur les liens dans la doc du tableau ci-dessus \ud83d\ude0b<\/li>\n<\/ol>\n<h3>Restez inform\u00e9 et prot\u00e9g\u00e9<\/h3>\n<p>Recevez des rapports en temps opportun sur les \u00e9v\u00e9nements de logiciels malveillants et g\u00e9rez efficacement l&rsquo;\u00e9tat des machines.<\/p>\n<p>La d\u00e9tection des logiciels malveillants est g\u00e9r\u00e9e par le service Veeam Data Analyser. Le service red\u00e9marre une fois par jour \u00e0 minuit et effectue les op\u00e9rations suivantes\u00a0:<\/p>\n<ul>\n<li>V\u00e9rifie les mises \u00e0 jour pour la liste des signatures de logiciels malveillants. Pour plus d\u2019informations, consultez <a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_guest_index.html#update_database\" target=\"_blank\" rel=\"noopener\">Mise \u00e0 jour de la base de donn\u00e9es des signatures de logiciels malveillants<\/a>.<\/li>\n<li>Envoie une notification par e-mail sur tous les \u00e9v\u00e9nements de d\u00e9tection de logiciels malveillants cr\u00e9\u00e9s lors de la session de service pr\u00e9c\u00e9dente. Pour plus d&rsquo;informations, voir <a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_notifications.html\" target=\"_blank\" rel=\"noopener\">Notifications<\/a>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/11\/13\/plongee-profonde-dans-les-nouveautes-vbr-12-1\/\" target=\"_blank\" rel=\"noopener\">D\u00e9couvrez les fonctionnalit\u00e9s de s\u00e9curit\u00e9 am\u00e9lior\u00e9es de Veeam Backup &amp; Replication 12.1.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le domaine dynamique de la cybers\u00e9curit\u00e9, Veeam Backup &amp; Replication 12.1 fait un grand pas en avant gr\u00e2ce \u00e0 ses fonctionnalit\u00e9s int\u00e9gr\u00e9es de d\u00e9tection des logiciels malveillants. . 1. Comment fonctionne la d\u00e9tection des logiciels malveillants Analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s :\u00a0Identifie l&rsquo;activit\u00e9 des logiciels malveillants dans les donn\u00e9es d&rsquo;indexation des invit\u00e9s et les flux de donn\u00e9es. Analyse Inline des donn\u00e9es par les proxy:\u00a0 Identifie l&rsquo;activit\u00e9 des logiciels malveillants par un model d&rsquo;IA et de Machine Learning durant&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/\">Lire la suite<span class=\"screen-reader-text\"> Lire la suite<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":976,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5,2],"tags":[26,107,106,104,105,108,54,101,17,25],"class_list":["post-972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vbr","category-veeam","tag-backup-replication","tag-backupsolutions","tag-cybersecuritytips","tag-datasecurity","tag-malwaredetection","tag-techinsight","tag-vbr","tag-vbr-12-1","tag-veeam","tag-veeam-backup"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &amp; Replication 12.1 - Baptiste Tellier<\/title>\n<meta name=\"description\" content=\"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &amp; Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &amp; Replication 12.1 - Baptiste Tellier\" \/>\n<meta property=\"og:description\" content=\"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &amp; Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Baptiste Tellier\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-01T16:11:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-14T12:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1153\" \/>\n\t<meta property=\"og:image:height\" content=\"703\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Baptiste Tellier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baptiste Tellier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/\"},\"author\":{\"name\":\"Baptiste Tellier\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"headline\":\"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &#038; Replication 12.1\",\"datePublished\":\"2023-12-01T16:11:55+00:00\",\"dateModified\":\"2023-12-14T12:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/\"},\"wordCount\":625,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"image\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_kMSlfiSEv2.png\",\"keywords\":[\"backup &amp; replication\",\"BackupSolutions\",\"CybersecurityTips\",\"DataSecurity\",\"MalwareDetection\",\"TechInsight\",\"VBR\",\"VBR 12.1\",\"Veeam\",\"Veeam Backup\"],\"articleSection\":[\"VBR\",\"Veeam\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/\",\"name\":\"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - Baptiste Tellier\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_kMSlfiSEv2.png\",\"datePublished\":\"2023-12-01T16:11:55+00:00\",\"dateModified\":\"2023-12-14T12:24:16+00:00\",\"description\":\"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_kMSlfiSEv2.png\",\"contentUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_kMSlfiSEv2.png\",\"width\":1153,\"height\":703},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/01\\\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/baptistetellier.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &#038; Replication 12.1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#website\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/\",\"name\":\"Baptiste Tellier\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/baptistetellier.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\",\"name\":\"Baptiste Tellier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"contentUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"width\":2025,\"height\":1562,\"caption\":\"Baptiste Tellier\"},\"logo\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - Baptiste Tellier","description":"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/","og_locale":"fr_FR","og_type":"article","og_title":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - Baptiste Tellier","og_description":"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !","og_url":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/","og_site_name":"Baptiste Tellier","article_published_time":"2023-12-01T16:11:55+00:00","article_modified_time":"2023-12-14T12:24:16+00:00","og_image":[{"width":1153,"height":703,"url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png","type":"image\/png"}],"author":"Baptiste Tellier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Baptiste Tellier","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#article","isPartOf":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/"},"author":{"name":"Baptiste Tellier","@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"headline":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &#038; Replication 12.1","datePublished":"2023-12-01T16:11:55+00:00","dateModified":"2023-12-14T12:24:16+00:00","mainEntityOfPage":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/"},"wordCount":625,"commentCount":5,"publisher":{"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"image":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#primaryimage"},"thumbnailUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png","keywords":["backup &amp; replication","BackupSolutions","CybersecurityTips","DataSecurity","MalwareDetection","TechInsight","VBR","VBR 12.1","Veeam","Veeam Backup"],"articleSection":["VBR","Veeam"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/","url":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/","name":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - Baptiste Tellier","isPartOf":{"@id":"https:\/\/baptistetellier.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#primaryimage"},"image":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#primaryimage"},"thumbnailUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png","datePublished":"2023-12-01T16:11:55+00:00","dateModified":"2023-12-14T12:24:16+00:00","description":"Baptiste Tellier Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup & Replication 12.1 - VBR - Focus sur les VCSP - Veeam Cloud Service Provider about Veeam Cloud Connect and more !","breadcrumb":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#primaryimage","url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png","contentUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_kMSlfiSEv2.png","width":1153,"height":703},{"@type":"BreadcrumbList","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/baptistetellier.fr\/"},{"@type":"ListItem","position":2,"name":"Guide de d\u00e9tection des logiciels malveillants dans Veeam Backup &#038; Replication 12.1"}]},{"@type":"WebSite","@id":"https:\/\/baptistetellier.fr\/#website","url":"https:\/\/baptistetellier.fr\/","name":"Baptiste Tellier","description":"","publisher":{"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/baptistetellier.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541","name":"Baptiste Tellier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","contentUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","width":2025,"height":1562,"caption":"Baptiste Tellier"},"logo":{"@id":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg"}}]}},"_links":{"self":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/comments?post=972"}],"version-history":[{"count":10,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/972\/revisions"}],"predecessor-version":[{"id":1037,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/972\/revisions\/1037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/media\/976"}],"wp:attachment":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/media?parent=972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/categories?post=972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/tags?post=972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}