ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Backup File Server to DAS

    IT Discussion
    das storage backup file server
    13
    497
    363.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • IT-ADMINI
      IT-ADMIN
      last edited by

      how to make a NAS not mapped, is it by using username and password right ??

      coliverC scottalanmillerS 2 Replies Last reply Reply Quote 0
      • coliverC
        coliver @IT-ADMIN
        last edited by coliver

        @IT-ADMIN said:

        how to make a NAS not mapped, is it by using username and password right ??

        A UNC for an SMB share would do it. \\NAS01\VeeamShare

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @IT-ADMIN
          last edited by

          @IT-ADMIN said:

          how to make a NAS not mapped, is it by using username and password right ??

          Simply don't map it! 🙂

          IT-ADMINI 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @coliver
            last edited by

            @coliver said:

            @IT-ADMIN said:

            how to make a NAS not mapped, is it by using username and password right ??

            A UNC for an SMB share would do it. \NAS01\VeeamShare

            Only if the ransomware know about it or discover it. Not sure how common that is.

            coliverC 1 Reply Last reply Reply Quote 0
            • coliverC
              coliver @scottalanmiller
              last edited by

              @scottalanmiller said:

              @coliver said:

              @IT-ADMIN said:

              how to make a NAS not mapped, is it by using username and password right ??

              A UNC for an SMB share would do it. \NAS01\VeeamShare

              Only if the ransomware know about it or discover it. Not sure how common that is.

              Would they do that? I've never heard of ransomware digging around for a UNC path. You could also setup the Veeam service to run as a different user account and give write access to that specific user.

              J 1 Reply Last reply Reply Quote 0
              • J
                Jason Banned @coliver
                last edited by

                @coliver said:

                Would they do that? I've never heard of ransomware digging around for a UNC path. You could also setup the Veeam service to run as a different user account and give write access to that specific user.

                CryptoWall will

                coliverC 1 Reply Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  I thought maybe. Any guess what it does to seek it out? Does it look in Veeam config files, just hunt through DNS, etc?

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    I would assume that having an account to access the NAS that is not a normal user or admin account will help so that only if the backup user is compromised that it can attack it?

                    1 Reply Last reply Reply Quote 0
                    • coliverC
                      coliver @Jason
                      last edited by coliver

                      @Jason said:

                      @coliver said:

                      Would they do that? I've never heard of ransomware digging around for a UNC path. You could also setup the Veeam service to run as a different user account and give write access to that specific user.

                      CryptoWall will

                      How does it discover it? If you are just putting the UNC path in the Veeam configuration then it should have no way of finding it. Even if it could find it if you lock it down to one specific user wouldn't that add a layer of protection? I'm asking hypothetically as I really don't know a lot about how this type of malware works.

                      J 1 Reply Last reply Reply Quote 0
                      • IT-ADMINI
                        IT-ADMIN @scottalanmiller
                        last edited by

                        @scottalanmiller said:

                        @IT-ADMIN said:

                        how to make a NAS not mapped, is it by using username and password right ??

                        Simply don't map it! 🙂

                        great, so i shouldn't create a map drive (pointing to NAS) in the server sending the backup to the NAS

                        scottalanmillerS dafyreD 2 Replies Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @IT-ADMIN
                          last edited by

                          @IT-ADMIN said:

                          @scottalanmiller said:

                          @IT-ADMIN said:

                          how to make a NAS not mapped, is it by using username and password right ??

                          Simply don't map it! 🙂

                          great, so i shouldn't create a map drive (pointing to NAS) in the server sending the backup to the NAS

                          We've made that clear from the beginning of the thread that mapping the NAS would instantly expose it like a DAS to Ransonware. That's been repeated over and over.

                          1 Reply Last reply Reply Quote 0
                          • J
                            Jason Banned @coliver
                            last edited by

                            @coliver said:

                            How does it discover it?

                            UNC is easily discoverable, all it has to do is turn on network discovery and look for shares, and many companies likely leave it on.

                            1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender
                              last edited by

                              Would hiding the shares with a $ make any difference in this situation?

                              J 1 Reply Last reply Reply Quote 0
                              • J
                                Jason Banned @Dashrender
                                last edited by

                                @Dashrender said:

                                Would hiding the shares with a $ make any difference in this situation?

                                doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

                                scottalanmillerS 1 Reply Last reply Reply Quote 1
                                • scottalanmillerS
                                  scottalanmiller @Jason
                                  last edited by

                                  @Jason said:

                                  @Dashrender said:

                                  Would hiding the shares with a $ make any difference in this situation?

                                  doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

                                  Which means that the ransomeware code is not going to hide it either. Likely it won't even notice that you've attempted to hide something. Much like MS Office security, open those files with something other than MS Office and that private data hidden in there is exposed in such a way that the people using it are not even aware that you thought that you were hiding it.

                                  DashrenderD 1 Reply Last reply Reply Quote 1
                                  • IT-ADMINI
                                    IT-ADMIN
                                    last edited by

                                    wow, those ransomware are scary, did anyone experience them ?? i think it is very rare to get affected by them ??

                                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @IT-ADMIN
                                      last edited by

                                      @IT-ADMIN said:

                                      wow, those ransomware are scary, did anyone experience them ?? i think it is very rare to get affected by them ??

                                      Very common, actually. Go on Spiceworks and someone gets one nearly once a week. They are the biggest threat in IT right now. It's VERY scary.

                                      There is a reason why people are moving to fully decoupled backup systems across the board (never running the backup software from the same system.) Because they need the protection for normal issues like ransonware. Anything talking over DAS, NAS or SAN protocols is vulnerable, extremely vulnerable.

                                      You ideally want stuff that is offline like tape but most make due with systems that at least have an air cap like Unitrends.

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @scottalanmiller
                                        last edited by

                                        @scottalanmiller said:

                                        @Jason said:

                                        @Dashrender said:

                                        Would hiding the shares with a $ make any difference in this situation?

                                        doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

                                        Which means that the ransomeware code is not going to hide it either. Likely it won't even notice that you've attempted to hide something. Much like MS Office security, open those files with something other than MS Office and that private data hidden in there is exposed in such a way that the people using it are not even aware that you thought that you were hiding it.

                                        LOL - wow.. I didn't know that about that feature. I'll try to remember to remind others it's really a pointless feature.

                                        1 Reply Last reply Reply Quote 0
                                        • dafyreD
                                          dafyre @IT-ADMIN
                                          last edited by

                                          @IT-ADMIN said:

                                          @scottalanmiller said:

                                          @IT-ADMIN said:

                                          how to make a NAS not mapped, is it by using username and password right ??

                                          Simply don't map it! 🙂

                                          great, so i shouldn't create a map drive (pointing to NAS) in the server sending the backup to the NAS

                                          You can configure that in Veeam so that it doesn't need the mapped drive. However, as others have mentioned, I would create an AD account specifically for backups. Create your share on the NAS so that only the backup account has access to it.

                                          1 Reply Last reply Reply Quote 1
                                          • IT-ADMINI
                                            IT-ADMIN
                                            last edited by

                                            i think those ransomware engineers attack US businesses, because they know that the core economy reside in USA, they will not spend their time to attack worthless data of business in countries like qatar, lol

                                            scottalanmillerS 2 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 18
                                            • 19
                                            • 20
                                            • 21
                                            • 22
                                            • 23
                                            • 24
                                            • 25
                                            • 20 / 25
                                            • First post
                                              Last post