Enabling MFA in Veeam BR 12

 

Veeam is now supporting OTP App MFA in their console application with the release of Veeam Backup and Replication v12. There is some preliminary work required. It requires a read through understanding first, but it works.

 

High level - While you can only do so much with access to the server, you can block RDP to it (best practice) and force MFA on local accounts in Veeam.

 

The snag is to turn on MFA you cannot use groups, so you need to add your Administrator or anyone else individually, set Veeam permissions and remove the default Administrators group.

 

To skip/block any account from requiring MFA you click on "this is a service account" and it won’t force MFA.

 

You then turn on MFA for the system. That enables it for the user that needs MFA and everyone else that is not a "service account". It will prompt them with a scannable app code and one you can cut and paste into an app such as mobile authenticator or ITGlue.

 

If access to that account is lost, you can reset MFA with another Veeam admin account. While this might not necessarily stop a malicious 3rd party from trashing the on-premises server. It  can help protect from remote access and your cloud repositories and credentials with another layer.

 

Here is a deep dive of how to enable Veeam 12 MFA on a Standalone Server:

 

Step one make sure you have an recent backup of your Veeam Configuration before you start.

 

Then Open the Veeam v12 Console and go to Users and Roles.


 




You will notice the Veeam Backup Administrator is automatically assigned to Veeam Backup Administrators group. From here if you have not already defined different roles to users you can add them now as well:

 

 



 

Here is list of the Groups:



Here is a link to Veeam Support defining what those group roles are:

https://helpcenter.veeam.com/docs/backup/vsphere/users_roles.html?ad=in-text-link&ver=120

 

 

Now we will add a user that is the Veeam Backup Administrator and once the user is added close Veeam:

 



 



 

Note: you can also set it to log off users due to inactivity which is another easy step to make sure a malicious user will not take over an account that was not logged out properly.

 

 

When we reopen it we will change the Authentication method and use the local account and password we already have on the local server:



 

Notice we have not enabled MFA till we know we have access.

 

After you add the users exit and log back on as the users individually to test, before you enable MFA.

 

Now I am adding a secondary account as a fall back if things go south with my initial MFA setup.  And repeat the log off and on process.

 



 

Now I will delete the BuiltIn\Administrators group.

 

Caution: If you did not do the above steps and TEST your access you could lock yourself out soon and be forced to reload. See Veeam configuration backup note above.

 



 

Now I will enable “Require two-facto authentication for interactive logon” but DO NOT Click OK yet. You need to Edit your users to setup your non MFA account in case.
For this example we will use Administrator and select “Edit”:

 



 

You will see “this is a service account… is no longer grayed out” so we will select that for this account so it does not require MFA:

 



 

For the VeeamAdmin account we will keep it as is:



Note how the Administrator account icon has changed above

I will now log out and log back in as the VeeamAdmin and I should immediately be prompted to setup MFA using an authenticator app:

 



  

 

Congratulations MFA is now setup on that account. Repeat as needed for other accounts. Whether you leave a “service account” without MFA enabled for a back door is your security call but if you do think through how you will strengthen it without Veeam MFA.

 

If someones MFA needs reset you can simply open up the Users and Groups with an active Administrator. Select the user and "Reset MFA" as shown below:



Comments

Popular posts from this blog

Office 365 Deployment Tool Office Download fails “Could not Install”

FRS to DFSR Post Cleanup “File Replication NtFrs Stopped”

Domain Migration SubinACL /Migratetodomain How To: