{"id":992,"date":"2023-12-04T13:19:17","date_gmt":"2023-12-04T12:19:17","guid":{"rendered":"https:\/\/baptistetellier.fr\/?p=992"},"modified":"2023-12-04T13:19:17","modified_gmt":"2023-12-04T12:19:17","slug":"vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites","status":"publish","type":"post","link":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/","title":{"rendered":"VBR 12.1 &#8211; D\u00e9mystifier l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s"},"content":{"rendered":"<p>Bonjour \u00e0 tous !<\/p>\n<p>Avec un titre comme celui-ci, bien francis\u00e9 comme on aime, vous ne savez pas \u00e0 quoi vous attendre hein ? Nous allons simplement continuer le <a href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/01\/guide-de-detection-des-logiciels-malveillants-dans-veeam-backup-replication-12-1\/\" target=\"_blank\" rel=\"noopener\">guide de d\u00e9tection des logiciels malveillants de la V12.1<\/a> avec un deep dive sur le \u00ab\u00a0Guest Indexing Data Scan\u00a0\u00bb \ud83d\ude01<\/p>\n<h2>Introduction<\/h2>\n<p>Veeam Backup &amp; Replication 12.1 introduit un outil puissant : l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s. Examinons ses subtilit\u00e9s:<\/p>\n<h2>Comprendre l&rsquo;approche bas\u00e9e sur les signatures<\/h2>\n<p>Lors d\u2019une t\u00e2che de sauvegarde, Veeam utilise une approche bas\u00e9e sur les signatures pour analyser les donn\u00e9es d\u2019indexation des invit\u00e9s \u00e0 la recherche d\u2019activit\u00e9s malveillantes potentielles. La d\u00e9tection s&rsquo;\u00e9tend au-del\u00e0 des m\u00e9thodes conventionnelles, englobant :<\/p>\n<h3>Signatures de logiciels malveillants<\/h3>\n<p>&#8211; La d\u00e9tection implique l&rsquo;examen du fichier SuspiciousFiles.xml, r\u00e9sidant dans le chemin par d\u00e9faut : C:\\Program Files\\Veeam\\Backup and Replication\\Backup\\SuspiciousFiles.xml.<\/p>\n<h3>Fichiers renomm\u00e9s<\/h3>\n<p>&#8211; Un \u00e9v\u00e9nement de d\u00e9tection de malware se d\u00e9clenche s&rsquo;il y a au moins 200 fichiers renomm\u00e9s avec des extensions non sp\u00e9cifi\u00e9es dans le fichier SuspiciousFiles.xml.<\/p>\n<h3>Fichiers supprim\u00e9s<\/h3>\n<p>&#8211; De m\u00eame, un \u00e9v\u00e9nement de d\u00e9tection se produit lorsqu&rsquo;un malware supprime au moins 25 fichiers avec des extensions sp\u00e9cifiques ou 50 % des fichiers avec des extensions particuli\u00e8res.<\/p>\n<p>*Remarque\u00a0: les logiciels malveillants \u00ab\u00a0en veille\u00a0\u00bb ne rel\u00e8vent pas de cette m\u00e9thode.*<\/p>\n<h2>Sc\u00e9narios pris en charge<\/h2>\n<p>L&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s \u00e9tend sa port\u00e9e de protection \u00e0 divers sc\u00e9narios, notamment\u00a0:<\/p>\n<p>&#8211; Machines virtuelles VMware, y compris les machines virtuelles VMware Cloud Director<br \/>\n&#8211; Machines virtuelles Hyper-V<br \/>\n&#8211; Machines avec Veeam Agent pour Microsoft Windows en modes g\u00e9r\u00e9 et autonome<br \/>\n&#8211; Machines sauvegard\u00e9es sur des p\u00e9riph\u00e9riques de bande<\/p>\n<h2>Fonctionnement<\/h2>\n<p>Le processus de d\u00e9tection des logiciels malveillants se d\u00e9roule comme suit\u00a0:<\/p>\n<p>1. <strong>M\u00e9canisme de notification :<\/strong><br \/>\n&#8211; Une fois une t\u00e2che de sauvegarde avec indexation du syst\u00e8me de fichiers invit\u00e9 termin\u00e9e, les donn\u00e9es sont stock\u00e9es dans le dossier VBRCatalog.<br \/>\n&#8211; Le service Veeam Guest Catalog Service informe le service Veeam Data Analyser des nouvelles donn\u00e9es \u00e0 analyser.<\/p>\n<p>2. <strong>Lancement de la session d&rsquo;analyse :<\/strong><br \/>\n&#8211; Le service Data Analyzer v\u00e9rifie les r\u00e9sultats de l&rsquo;analyse pr\u00e9c\u00e9dente dans GuestIndexAnalyzeState.xml, lan\u00e7ant ainsi une nouvelle session d&rsquo;analyse.<\/p>\n<p>3. <strong>D\u00e9tection des logiciels malveillants :<\/strong><br \/>\n&#8211; Les r\u00e9sultats de l&rsquo;analyse sont compar\u00e9s aux signatures de logiciels malveillants, mettant \u00e0 jour le fichier GuestIndexAnalyzeState.xml.<br \/>\n&#8211; Si une activit\u00e9 de logiciel malveillant est d\u00e9tect\u00e9e, un \u00e9v\u00e9nement de d\u00e9tection est cr\u00e9\u00e9, marquant les objets comme suspects.<\/p>\n<h2>Configuration de l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s<\/h2>\n<p>Pour activer cette analyse\u00a0:<\/p>\n<p>1. Acc\u00e9dez \u00e0 <strong>D\u00e9tection des logiciels malveillants<\/strong> &gt; <strong>G\u00e9n\u00e9ral<\/strong> dans le menu principal.<br \/>\n2. Cochez la case \u00ab\u00a0<strong>Activer l&rsquo;analyse de l&rsquo;activit\u00e9 du syst\u00e8me de fichiers<\/strong>\u00ab\u00a0.<\/p>\n<p><a href=\"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/detection_guest_index.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-993\" src=\"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/detection_guest_index.png\" alt=\"\" width=\"496\" height=\"603\" srcset=\"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/detection_guest_index.png 496w, https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/detection_guest_index-247x300.png 247w, https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/detection_guest_index-222x270.png 222w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/a><\/p>\n<p><strong>&gt; Remarque<\/strong> : cette fonctionnalit\u00e9 est activ\u00e9e par d\u00e9faut dans Veeam Backup &amp; Replication 12.1 (build 12.1.0.2131). Assurez-vous que <strong>l&rsquo;indexation du syst\u00e8me de fichiers invit\u00e9 est activ\u00e9e pour la t\u00e2che de sauvegarde<\/strong>.<\/p>\n<h2>Mises \u00e0 jour et personnalisation de la base de donn\u00e9es<\/h2>\n<p>1. <strong>Mises \u00e0 jour automatiques :<\/strong><br \/>\n&#8211; Gardez la base de donn\u00e9es de signatures de logiciels malveillants \u00e0 jour en s\u00e9lectionnant \u00ab Mettre \u00e0 jour automatiquement les d\u00e9finitions de logiciels malveillants \u00bb.<br \/>\n&#8211; Veeam communique quotidiennement avec le serveur de mise \u00e0 jour (<span class=\"T_Filenames\">vbr.butler.veeam.com)<\/span>, garantissant que la derni\u00e8re base de donn\u00e9es au format XML est t\u00e9l\u00e9charg\u00e9e.<\/p>\n<p>2. <strong>Personnalisation :<\/strong><br \/>\n&#8211; Adaptez votre strat\u00e9gie de s\u00e9curit\u00e9 en ajoutant des signatures de fichiers suspects ou fiables.<br \/>\n&#8211; Les masques de fichiers peuvent \u00eatre ajust\u00e9s avec * et ? caract\u00e8res g\u00e9n\u00e9riques. (<a href=\"https:\/\/helpcenter.veeam.com\/archive\/backup\/120a\/vsphere\/malware_detection_guest_index.html#customizing-malware-signatures\" target=\"_blank\" rel=\"noopener\">lien vers la doc<\/a>)<\/p>\n<p><strong>Remarque<\/strong> : des mises \u00e0 jour manuelles de la base de donn\u00e9es sont disponibles pour les serveurs disposant d&rsquo;un acc\u00e8s Internet limit\u00e9 via une demande au support.*<\/p>\n<h2>Conclusion<\/h2>\n<p>Dans un paysage de menaces en constante \u00e9volution, Guest Indexing Data Scan de Veeam est votre alli\u00e9. Renforcez votre environnement avec des mesures de s\u00e9curit\u00e9 proactives, garantissant ainsi la r\u00e9silience contre les menaces \u00e9mergentes.<\/p>\n<p>\u00e0 bient\u00f4t !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bonjour \u00e0 tous ! Avec un titre comme celui-ci, bien francis\u00e9 comme on aime, vous ne savez pas \u00e0 quoi vous attendre hein ? Nous allons simplement continuer le guide de d\u00e9tection des logiciels malveillants de la V12.1 avec un deep dive sur le \u00ab\u00a0Guest Indexing Data Scan\u00a0\u00bb \ud83d\ude01 Introduction Veeam Backup &amp; Replication 12.1 introduit un outil puissant : l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s. Examinons ses subtilit\u00e9s: Comprendre l&rsquo;approche bas\u00e9e sur les signatures Lors d\u2019une t\u00e2che de sauvegarde,&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/\">Lire la suite<span class=\"screen-reader-text\"> Lire la suite<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":998,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5,2],"tags":[26,107,114,110,121,118,119,54,101,17,25,109,120,111],"class_list":["post-992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vbr","category-veeam","tag-backup-replication","tag-backupsolutions","tag-cybersecurity","tag-dataprotection","tag-itinfrastructure","tag-malwaredefense","tag-techsecurity","tag-vbr","tag-vbr-12-1","tag-veeam","tag-veeam-backup","tag-veeambackup","tag-vmware","tag-vmwaresecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VBR 12.1 - D\u00e9mystifier l&#039;analyse des donn\u00e9es d&#039;indexation des invit\u00e9s<\/title>\n<meta name=\"description\" content=\"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l&#039;analyse des donn\u00e9es d&#039;indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VBR 12.1 - D\u00e9mystifier l&#039;analyse des donn\u00e9es d&#039;indexation des invit\u00e9s\" \/>\n<meta property=\"og:description\" content=\"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l&#039;analyse des donn\u00e9es d&#039;indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/\" \/>\n<meta property=\"og:site_name\" content=\"Baptiste Tellier\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T12:19:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1175\" \/>\n\t<meta property=\"og:image:height\" content=\"692\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Baptiste Tellier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baptiste Tellier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/\"},\"author\":{\"name\":\"Baptiste Tellier\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"headline\":\"VBR 12.1 &#8211; D\u00e9mystifier l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s\",\"datePublished\":\"2023-12-04T12:19:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/\"},\"wordCount\":719,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"image\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_FrXjszETNe.png\",\"keywords\":[\"backup &amp; replication\",\"BackupSolutions\",\"CyberSecurity\",\"DataProtection\",\"ITInfrastructure\",\"MalwareDefense\",\"TechSecurity\",\"VBR\",\"VBR 12.1\",\"Veeam\",\"Veeam Backup\",\"VeeamBackup\",\"VMware\",\"VMwareSecurity\"],\"articleSection\":[\"VBR\",\"Veeam\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/\",\"name\":\"VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_FrXjszETNe.png\",\"datePublished\":\"2023-12-04T12:19:17+00:00\",\"description\":\"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_FrXjszETNe.png\",\"contentUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/POWERPNT_FrXjszETNe.png\",\"width\":1175,\"height\":692},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/index.php\\\/2023\\\/12\\\/04\\\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/baptistetellier.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VBR 12.1 &#8211; D\u00e9mystifier l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#website\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/\",\"name\":\"Baptiste Tellier\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/baptistetellier.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/#\\\/schema\\\/person\\\/0e3e43784261c58dd916e9f0a1673541\",\"name\":\"Baptiste Tellier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"url\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"contentUrl\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\",\"width\":2025,\"height\":1562,\"caption\":\"Baptiste Tellier\"},\"logo\":{\"@id\":\"https:\\\/\\\/baptistetellier.fr\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/20190315_110256-2.jpg\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s","description":"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/","og_locale":"fr_FR","og_type":"article","og_title":"VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s","og_description":"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !","og_url":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/","og_site_name":"Baptiste Tellier","article_published_time":"2023-12-04T12:19:17+00:00","og_image":[{"width":1175,"height":692,"url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png","type":"image\/png"}],"author":"Baptiste Tellier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Baptiste Tellier","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#article","isPartOf":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/"},"author":{"name":"Baptiste Tellier","@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"headline":"VBR 12.1 &#8211; D\u00e9mystifier l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s","datePublished":"2023-12-04T12:19:17+00:00","mainEntityOfPage":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/"},"wordCount":719,"commentCount":1,"publisher":{"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"image":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#primaryimage"},"thumbnailUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png","keywords":["backup &amp; replication","BackupSolutions","CyberSecurity","DataProtection","ITInfrastructure","MalwareDefense","TechSecurity","VBR","VBR 12.1","Veeam","Veeam Backup","VeeamBackup","VMware","VMwareSecurity"],"articleSection":["VBR","Veeam"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/","url":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/","name":"VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s","isPartOf":{"@id":"https:\/\/baptistetellier.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#primaryimage"},"image":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#primaryimage"},"thumbnailUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png","datePublished":"2023-12-04T12:19:17+00:00","description":"Baptiste Tellier VBR 12.1 - D\u00e9mystifier l'analyse des donn\u00e9es d'indexation des invit\u00e9s - VBR - Focus sur les VCSP - Veeam Cloud Service Provider and more !","breadcrumb":{"@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#primaryimage","url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png","contentUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2023\/12\/POWERPNT_FrXjszETNe.png","width":1175,"height":692},{"@type":"BreadcrumbList","@id":"https:\/\/baptistetellier.fr\/index.php\/2023\/12\/04\/vbr-12-1-demystifier-lanalyse-des-donnees-dindexation-des-invites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/baptistetellier.fr\/"},{"@type":"ListItem","position":2,"name":"VBR 12.1 &#8211; D\u00e9mystifier l&rsquo;analyse des donn\u00e9es d&rsquo;indexation des invit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/baptistetellier.fr\/#website","url":"https:\/\/baptistetellier.fr\/","name":"Baptiste Tellier","description":"","publisher":{"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/baptistetellier.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/baptistetellier.fr\/#\/schema\/person\/0e3e43784261c58dd916e9f0a1673541","name":"Baptiste Tellier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","url":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","contentUrl":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg","width":2025,"height":1562,"caption":"Baptiste Tellier"},"logo":{"@id":"https:\/\/baptistetellier.fr\/wp-content\/uploads\/2020\/09\/20190315_110256-2.jpg"}}]}},"_links":{"self":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/comments?post=992"}],"version-history":[{"count":3,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/992\/revisions"}],"predecessor-version":[{"id":1000,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/posts\/992\/revisions\/1000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/media?parent=992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/categories?post=992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/baptistetellier.fr\/index.php\/wp-json\/wp\/v2\/tags?post=992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}